Scalable and Secure Architecture for Digital Content Distribution
|
|
- Gabriel Bates
- 8 years ago
- Views:
Transcription
1 Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel Romana 2 V. Parvan Ave., Tmsoara, ROMANIA 9 Gh. Lazar Ave., Tmsoara, ROMANIA vbocan@dataman.ro mha.fagadar@alcatel.ro Abstract: Ths paper descrbes a scalable and secure archtecture for dgtal content dstrbuton. Our archtecture enables secure cooperaton between content provders whch share dstrbuton rghts, allowng a greater flexblty n realworld scenaros. Furthermore, the new archtecture s hghly scalable as t enables content provders to smultaneously servce several clents who request the same content. Index Terms scalable DRM, dgtal content, dstrbuton, redstrbuton, secure broadcast, cryptography, secret splttng. I. INTRODUCTION Dgtal content dstrbuton has become a wdely dscussed topc n the past years, due to the ncreasng popularty of the Internet and of the personal devces capable of playng dgtal multmeda content. More and more provders offer ther customers the possblty to access, for a fee, large on-lne databases of multmeda content whch they can download on ther personal devces. Due to ntegraton of technologes lke Bluetooth or W- F, personal devces have become capable of sharng nformaton among them n a pont-to-pont manner. Ths has opened the way to dgtal content redstrbuton, a process whch generates revenue loss by excludng the content provder from the data transfer. To preserve the dgtal content from llegal copyng and unauthorzed dstrbuton and to ensure that copyrght laws are respected, content provders have searched for new ways of mplementng secure dstrbuton systems, based on Dgtal Rghts Management (DRM) polces. The greatest challenge posed to such a system s to ensure that these polces are effectve even after the customer came nto the possesson of the dgtal content, especally when he attempts to redstrbute t to another user. The current approach to the above-mentoned problem has been to ntroduce the noton of complant devces, whch, by ther desgn, guarantee to respect the DRM polces assocated wth the multmeda content they are playng. For example, a complant devce wll refuse to share ts contents wth a non-complant devce, or to redstrbute the multmeda content to another complant devce f the assocated DRM polcy forbds t to do so. Systems whch allow dgtal content redstrbuton by enforcng the DRM polces at clent level on peer-to-peer networks have already been proposed [1]. However, they are not scalable, and present a vulnerablty to DoS attacks, whch may render them noperable. These systems also rely on the fact that each content provder has all the necessary rghts to dstrbute the multmeda content to ts customers, whch may not always be true n real stuatons. Such rghts may be dstrbuted among several content provders. In the present paper we propose a scalable dgtal content dstrbuton system, whch reles on secure broadcast for dstrbutng the dgtal content to several clents smultaneously. Thus the sever load s decreased consderably, whle mantanng the same degree of securty as n normal pont-to-pont connectons. We also propose a mechansm to remove the lmtaton of a sngle content provder whch has all the rghts over the dgtal content. In our archtecture, for a dgtal content, there may be several content provders whch share the dstrbuton rghts over that content, and a common consent s requred to dstrbute t. The paper s organzed n sx sectons, as follows. In Secton II we present the system archtecture and the partes nvolved n the dgtal content dstrbuton and redstrbuton. Secton III focuses on the cryptographc technques used to secure the communcaton between the system components. Secton IV descrbes the scalable dstrbuton of dgtal content n both cases: provder to clent and clent to clent, and how the technques presented n Secton III apply to our partcular case. Secton V analyzes the possble threats to ths system and fnally, Secton VI presents the advantages of the proposed soluton and draws the fnal conclusons. II. SYSTEM ARCHITECTURE The system archtecture, presented n Fg. 1, contans two major parts: The authorty and content dstrbuton part composed of one Master Content Provder and several authorzed Content Provders; The consumer network composed of Clents or Content Proxes. The partes nvolved n the dgtal content dstrbuton scheme are as follows:
2 A. Content Provders Content provders (CPs) are partes whch share the rghts to dstrbute the dgtal content to the consumer network. A consumer whch desres to receve the dgtal content wll ssue a request to a content provder whch, n turn wll subject the request to the approval of all the CPs whch share the dstrbuton rghts of the dgtal content. If all CPs approve the request, then the content provder wll send the dgtal content to the clent, otherwse t wll reject the request. redstrbute t. The requrements whch must be fulflled by such a complant devce are outlned n the Trusted Platform Module (TPM) specfcatons [4]. Each complant devce s endowed at manufacturng tme wth a par of keys: a publc key and a prvate key, whch t uses when exchangng nformaton wth a CP or another clent. The redstrbuton process, llustrated n Fg. 1 between clents A and D, takes place n accordance to the DRM polces assocated wth the content (e.g. the content may be redstrbuted only a lmted number of tmes and to a lmted number of complant devces). If DRM polces are not respected by the clent, the CP may revoke ts redstrbuton rghts, by usng the devce revocaton mechansm presented n [1]. D. Content Proxes Content proxes dfferentate from clents n the way that they are actng as relays between the CP and other customers. Any clent may become a content proxy f he desres to do so, by sgnalng ths ntent to the CP. Snce the multmeda content s encrypted, the proxy wll not be able to render t f not addressed to t drectly, but s able to forward the content to ts legtmate destnaton. In Fg. 1, Clent C has the role of content proxy and t dstrbutes the data to clents D and E, through secure broadcast. By makng use of content proxes, a CP can reduce ts server load sgnfcantly, snce clent requests for dgtal content can be servced by the proxy, wthout the nvolvement of content provders. The CP constantly montors proxy actvtes to make sure that they are n accordance wth the DRM polces. Fg. 1. The content dstrbuton system archtecture A sngle pece of dgtal content wll be broadcast to the clents who request t n a gven tme frame. Ths technque greatly reduces the load on the server by servcng several clents at a tme. B. Master Content Provder The Master Content Provder (MCP) represents the organzaton whch controls the actvty of all content provders (CP), and t s nvolved ndrectly n the content dstrbuton process. It can be regarded as the authorty whch supervses the request approval process between the content provders and generates sesson keys for ther actvtes. C. Clents Clents are complant devces whch have the rght to play the multmeda content receved from a content provder, and may optonally purchase the rghts to III. CRYPTOGRAPHIC TECHNIQUES Data transfers between the partes nvolved n the proposed content dstrbuton scheme take place on secure channels, protected by a seres of cryptographc methods, as follows: the cooperaton between the CPs s mplemented by usng the secret splttng technque [2] whle the CP to clent and proxy-to-clent data transfers are based on secure broadcast wth secure locks [3] generated usng the Chnese Remander Theorem [5]. A. Secret Splttng Technque As we prevously stated, the content provders may share dstrbuton rghts, n whch case they must all approve the clent requests. Therefore, the CPs must cooperate for each request approval, n a secure manner. The most secure way to make the CPs cooperate s to share a secret among them, by usng the secret splttng technque [2]. Ths way, no content provder can obtan the secret wthout the help of the other CPs wth whom t shares that secret.
3 Consderng a secret message M of length m and a group of n secret sharers, desgnated P 1, P 2,..., P n, the secret can be splt among the n sharers as follows: 1) Frst, a number of n-1 random bt strngs of length m, R 1, R 2,..., R n-1 are generated. 2) The message M s encrypted, resultng the secret S Κ. = M R1 R2 Rn 1 3) The secret S s dstrbuted to P 1, R 1 s dstrbuted to P 2, R 2 to P 3 and so on, up to R n-1 whch s dstrbuted to P n. It s obvous that the only way to obtan the secret M s by XOR-ng together the peces dstrbuted among the secret sharers. The sharers themselves need not even know who receved S, and who receved the random strngs R. Ths makes the secret splttng technque absolutely secure. In our case, consderng that the dstrbuton scheme contans one MCP and a number of n CPs: CP 1, CP 2,..., CP n, whch share the dstrbuton rghts for the dgtal content, the secret splttng technque works as follows: 1) CP receves a clent request. 2) If CP accepts the request, t asks the MCP, whch s the trusted authorty, to create and dstrbute a secret message M among all the CPs. 3) The MCP generates the secret message M, known only to hmself, splts t n n peces, and shares t among all CPs, by usng the secret sharng technque. 4) CP forwards the clent request to all the other CPs. 5) If a CP agrees to the clent request, t wll share ts part of the secret to CP, otherwse t wll send an empty strng of bytes nstead. 6) Based on the answers from the rest of the secret sharers, CP wll attempt to reconstruct the message M, whch wll be sent to the MCP for valdaton. Only f all the other CPs agreed wth the requests, CP wll be able to reconstruct the message M. 7) The MCP wll compare the message decrypted by CP to the orgnal message M, and f they match, t wll authorze CP to dstrbute the dgtal content to the clent, otherwse t wll nstruct t to reject the request. B. Usng the Chnese Remnder Theorem to generate secure locks A prevous research on dgtal content dstrbuton [1] requred that for each request the CP encrypts the content usng the publc key of the clent whch made the request. A number of n clents requestng content from the CP wll requre n content encryptons, even f the content may be the same for all clents. Ths places a serous burden on the system that servces ncomng requests and therefore represents a scalablty lmtaton. In order to reduce the server load, we propose that the CP use secure broadcastng technques to send the data to all clents whch requested t. In ths case, the dgtal content s encrypted only once, usng an encryptng sesson key known only to the CP, and sent along wth a decryptng sesson key to the clents. To make sure that only legtmate clents can obtan the decryptng key, a secure lock s needed to protect t. The lock can be removed only by the legtmate clents and s generated by applyng a technque known as the Chnese Remander Theorem (CRT) [3]: Let C be a group of n clents C 1, C 2,..., C n servced by a CP, each havng a par of keys e (secret) and d (publc), and N 1, N 2,..., N n a set of n postve ntegers that are mutually prme and publcly known n the system. From the group C, a subset of k clents (k 2) request the same dgtal content from the CP. If we furthermore consder a set of k postve ntegers R 1, R 2,..., R k, the CRT theorem states that the system of congruences: X R1 (mod N1) X R2(mod N 2 ) Λ X R k (mod N k ) has a common soluton X, gven by equaton (2): where: = 1 (1) k L X = ( R f )mod L (2) N L 1 f mod N (3) N k wth L beng defned as N. = For our proposed scheme, the CP wll generate a par of sesson keys, e s and d S, and encrypt the dgtal content only once, usng e S. The CP wll also generate the R 1, R 2,..., R k numbers by encodng the decryptng sesson key d S wth the publc encryptng key e of each requester, as follows: R = Enc d ). e ( S The secure lock X s obtaned by solvng the equaton system (1), and sent to the clents along wth the encrypted dgtal content. Each clent from the group whch requested the dgtal content can obtan R from the receved lock X, accordng to equaton system (1), and by decryptng t wth ts prvate key d, can obtan d S. Once a clent has d S, t can decrypt the multmeda content and use t accordng to ts assocated DRM polcy. From the technque descrbed above, t can be seen that the lock cannot be broken by llegtmate clents. Even f such a clent obtans a remander R, t cannot extract d S, as t does not posses the prvate key d of the legtmate clent. Therefore, ths method s secure.
4 IV. SCALABLE DISTRIBUTION OF DIGITAL CONTENT The content dstrbuton process can be splt nto two parts: The content provder CP dstrbutes the content and ts assocated lcenses to clents (C 1 ) The clent (C 1 ) redstrbutes the content to another clent (C 2 ). Let s ntroduce some notatons: e A /d A the publc/prvate key par of entty A [D]e A data D encrypted under publc key of A [D]d A data D sgned wth the prvate key of A [D] K data D encrypted usng a symmetrc key K h(d) a collson-free hash functon h appled on data D A. Content Provder (CP) dstrbutes content to clents In ths part, the content provder (CP 1 ) dstrbutes the dgtal content M and assocated rghts R to the clents (C ) wth permsson from other content provders (CP 2,, CP n ) and under the supervson of the master content provder (MCP). (1) C 1, C 2,, C n CP 1 : request content (2) C 1, C 2,, C n CP 1 : mutual authentcaton (3) CP 1 CP 2,, CP n, MCP: agreement upon dstrbuton rghts (4) C 1, C 2,, C n CP 1 : payment (optonal) (5) CP 1 C 1, C 2,, C n : [M] K, [K] es, X, η, δ, Λ The content provder wats for ncomng requests and servces them at certan ntervals. Smlar requests are grouped together n step (1) and servced n the same tme n order the soluton to scale by decreasng the server load. In step (2), the content provder and the clents authentcate each other. Unlke the archtecture descrbed n [1], we do not perform payment at ths stage as the content provder that receved the requests s not yet authorzed by the peers to dstrbute the content. In step (3), the content provders agree upon authorzng the content provder who receved the requests and n step (4) the payment s performed. In step (5), the content provder generates the secret lock X, encrypts the content M wth a one-tme symmetrc key K, encrypts K wth the sesson key e S and then sends the encrypted content along wth the lock X, rghts η, metadata δ and the content lcense Λ. The rghts η s a quantty that descrbes how the content s to be handled by complant devces and the metadata δ assocated wth the content (name of the artst, the album, the song ttle, bt rate, etc.). The content lcense Λ s defned as: Λ = [h(m, η, δ, X)] dcp The purpose of Λ s to certfy that the clent has been granted rghts η wth respect to content M. Rghts η can be represented usng authorzaton and access polcy languages such as XACML [6] and XrML [7]. The great advantage of our archtecture s that t s hghly scalable. When certan content s hghly demanded, several dfferent clents may request t almost smultaneously. The content provder wats for a short tme so that several requests accumulate, and then wth a sngle encrypton operaton t servces all clents. B. Clents redstrbute content The rghts η orgnally granted by the content provder may allow the clent C 1 to redstrbute the content to another clent C 2, followng the protocol below (smlar to [1]): (1) C 2 C 1 : request content (2) C 2 C 1 : mutual authentcaton (3) C 1 C 2 : [M] K, [K ] ec2, η, η, δ, Λ, Λ (4) C 2 C 1 : check δ, payment (optonal) (5) C 2 C 1 : φ C 2 starts the transacton n step (1) by requestng a partcular content tem. In step (2), the two partes authentcate each other usng ther publc/prvate key pars. If the authentcaton s successful, C 1 decrypts the content of the requested tem, generates a temporary symmetrc key K and encrypts the content wth ths key. The K key s then encrypted wth C 2 s publc key. C 1 then sends the new encrypted content, the sesson key K encrypted wth C 2 s publc key, the orgnal rghts η and the new rghts η granted to C 2. Also, C 1 sends the orgnal lcense Λ and the new lcense Λ, defned as follows: Λ = [h(e 1, e 2, M, η, δ, X)] dc1 In step (4), C 2 verfes C 1 s sgnature on the new lcense Λ and valdates η and M usng the orgnal Λ lcense. C 2 also makes sure that the η lcense can be derved from η and also checks δ for the type of content beng dstrbuted. If all checks succeed, C 2 approves the transacton n step (5), sendng C 1 a recept φ, defned as: φ = [h(e C1, e CP, [M] K, δ, η ] dc2 The recept φ represents an acknowledgement from C 2 that t receved the content M wth the rghts η. C. Content dstrbuton and relayng schema In ths secton we provde a hgh level schematc of the content dstrbuton archtecture, as llustrated n Fg. 2:
5 6) The proxy wll forward the encrypted message to each of the requestng clents. If an llegtmate clent requests ths message, t wll not be able to use t due to the protecton provded by the secure broadcast protocol. Fg. 2. Scalable dstrbuton of dgtal content 1) A content provder CP receves, n a gven tme frame a number of N requests (marked wth REQ n Fg. 2) for the same dgtal content. The CP wll subject these requests to the approval of the other CPs whch share the rghts over that dgtal content, by usng the secret splttng technque presented n Secton III. If the requests are granted, CP wll obtan a unque par <e S, d S > of sesson keys from the MCP. 2) The CP creates the sent-out message as descrbed n the prevous paragraph then sends t to all N clents who requested t, usng the secure broadcast wth secure lock method (SBC) [3] descrbed n Secton III. When a clent receves the message, t wll send an acknowledgement (ACK) message to the CP. 3) The CP checks f all N clents receved the message. If there are clents who responded wth a NAK (n our case clents N-1 and N) or when the server s under hgh load, CP wll send the orgnal message to one or more regstered content proxes, and delegate the task of dstrbutng t to ths proxy (step DLG n Fg. 2). If there s a regstered proxy among the clents who successfully receved the message, the CP wll skp ths step and go drectly to step 4. 4) CP nforms the clents whch have not receved the message that the proxy selected n step 3 contans a copy of the broadcasted message. From ths pont forward, CP wll not be nvolved any more n the dstrbuton of the dgtal content. 5) The clents notfed by the CP n step 4 wll request the broadcasted message from the content proxy. As stated n prevous sectons, the proxy stores the already encrypted verson of the message n a transparent manner, and s not able to decrypt t f t s not among the legtmate recevers. V. THREATS The proposed archtecture ntroduces a number of threats, some of whch beng shared wth exstng DRM archtecture and some beng new. Whle a full dscusson on the threats on DRM systems s beyond the scope of ths paper, we wll brefly outlne them. One of the most wdespread threats s tamperng wth the complant devce or the tamper-resstant module nsde. Good tamper-resstance s dffcult to acheve [8, 9] so we can assume that securty s effectve aganst all but the most determned attacker. Cryptographc technques are hardly a threat today as attackers are smart enough to attack the weakest pont. Content redstrbuton and collaboraton between content provders are all target ponts for attackers and a whole new lot of attacks are possble: Content masqueradng durng the redstrbuton process. Ths may happen when a clent receves a lesser value content than the one requested or a proxy clent replaces the content to be further dstrbuted. Snce devces are susceptble to falure, they allow backng up the lcenses and the content to unsecured meda. Ths can lead to untrusted storage backup attacks. Crcumvented devces are able to remove the securty mechansms that protect the dgtal content and therefore they can llegally dstrbute the content. Detectng and solatng crcumvented devces s essental to the health of a DRM system. Because of the desgn f the content provder collaboraton protocol, the compromse of a sngle provder leads to total falure of the content dstrbuton. If a sngle content provder msbehaves t s very dffcult to be excluded from the decsonal process. Unlke other systems that deal wth expensve operatons (.e. publc key cryptography), our archtecture s less susceptble to denal of servce attacks as the task of dstrbutng the content can be delegated the cooperatng clents. DoS attacks are nonetheless possble so a number of ways to mtgate such threats are possble [10, 11]. VI. CONCLUSION AND FUTURE WORK Dgtal Rghts Management systems are typcally used by provders to restrct the ways consumers use the content. In ths paper we proposed an archtecture that matches close to
6 real-world scenaros where several content provders share the rght over a sngle pece of content. Our archtecture s hghly scalable as t enables smultaneous servcng of several clents that request the same content by usng secure broadcastng and enables clents to become proxes n order to decrease the load on the central server. Our archtecture s also capable of preservng the rghts of the dstrbuted content even when redstrbuted from clent to clent, provded that certan requrements are met on the clent devce. Currently we are workng on addng resstance to denal of servce attacks to the archtecture and devsng some gudelnes for real-world mplementaton. We are also workng on performance metrcs of the archtecture. REFERENCES [1] S. K. Nar, B. C. Popescu, C. Gamage, B. Crspo and A. S. Tanenbaum, Enablng DRM preservng Dgtal Content Redstrbuton, 7 th Internatonal IEEE Conference on E-Commerce Technology, 2005 [2] Bruce Schneer, Appled Cryptography, John Wley & Sons, 1996, pag. 70 [3] G.-H. Chou and W.-T. Chen, Secure Broadcastng Usng the Secure Lock, IEEE Trans. Software Eng., vol. 15, no. 8, pp , August [4] Trusted Computng Group, Trusted Computng Platform Allance Man Specfcaton, October 2003, Verson 1.2, [5] Erc W. Wessten, Chnese Remander Theorem. From MathWorld - A Wolfram Web Resource, [6] extensble Access Control Markup Language (XACML), [7] XrML: extensble Rghts Markup Language, [8] R. Anderson, M. Kuhn, Tamper Resstance A Cautonary Note, Proceednggs of the 2 nd Usenx Workshop on Electronc Commerce, pages 1-11, November [9] Andrew Huang, Keepng Secrets n Hardware: the Mcrosoft XBox TM Case Study, May 2002, [10] Valer Bocan, Threshold Puzzles. The Evoluton of DoS-Resstant Authentcaton, CONTI Perodca Poltehnca, Transacton on Automatc Control and Computer Scence Vol. 49 (63), 2004, ISSN X, [11] Valer Bocan, Mha Fagadar-Cosma, Adaptve Threshold Puzzles, EUROCON The Internatonal Conference on "Computer as a tool", Belgrade, Serba and Montenegro, %20Adaptve%20Threshold%20Puzzles.pdf
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationThresPassport A Distributed Single Sign-On Service
ThresPassport A Dstrbuted ngle gn-on ervce Teru Chen 1, Bn B. Zhu 2, hpeng L 2, Xueq Cheng 1 1 Inst. of Computng Technology, Chnese Academy of cences, Bejng 100080, Chna chenteru@software.ct.ac.cn, cqx@ct.ac.cn
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationYi Mu and Vijay Varadharajan. School of Computing and IT, University of Western Sydney, Nepean, PO Box 10, Kingswood, N.S.W.
Anonymous Internet Credt Cards Y Mu and Vjay Varadharajan School of Computng and IT, Unversty of Western Sydney, Nepean, PO Box 10, Kngswood, N.S.W. 2747, Australa Emal: fymu,vjayg@ct.nepean.uws.edu.au
More informationVembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationMulti-Source Video Multicast in Peer-to-Peer Networks
ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany
More informationSome literature also use the term Process Control
A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com
More information3C-Auth: A New Scheme for Enhancing Security
Internatonal Journal of Network Securty, Vol.18, No.1, PP.143-150, Jan. 2016 143 3C-Auth: A New Scheme for Enhancng Securty Narasmhan Harn and Tattamangalam R. Padmanabhan (Correspondng author: Narasmhan
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationRUHR-UNIVERSITÄT BOCHUM
RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More information1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationScalability of a Mobile Cloud Management System
Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationComplex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationHollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationA Certified Email Protocol using Key Chains
A Certfed Emal Protocol usng Key Chans J. Cederqust SQIG-IT and IST, TULsbon, Portugal M. Torab Dasht CWI, Amsterdam, The Netherlands S. Mauw Unversty of Luxembourg, Luxembourg Abstract Ths paper ntroduces
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationHow To Get A Tax Refund On A Retirement Account
CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual
More informationCompact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
More informationwww.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting
Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...
More informationSEVERAL trends are opening up the era of Cloud
1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor
More informationEnsuring Data Storage Security in Cloud Computing
1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationSEVERAL trends are opening up the era of Cloud
IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student
More informationAccount Transfer and Direct Rollover
CED0105 Amerprse Fnancal Servces, Inc. 70100 Amerprse Fnancal Center Mnneapols, MN 55474 Account Transfer and Drect Rollover Important: Before fnal submsson to the Home Offce you wll need a Reference Number.
More informationProvably Secure Single Sign-on Scheme in Distributed Systems and Networks
0 IEEE th Internatonal Conference on Trust, Securty and Prvacy n Computng and Communcatons Provably Secure Sngle Sgn-on Scheme n Dstrbuted Systems and Networks Jangshan Yu, Guln Wang, and Y Mu Center for
More informationSPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME
August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000
More information7.5. Present Value of an Annuity. Investigate
7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on
More informationAd-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationQOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS
QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,
More informationUnderstanding the physical and economic consequences of attacks on control systems
I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( 2 0 0 9 ) 7 3 8 3 avalable at www.scencedrect.com journal homepage: www.elsever.com/locate/jcp
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationFast degree elevation and knot insertion for B-spline curves
Computer Aded Geometrc Desgn 22 (2005) 183 197 www.elsever.com/locate/cagd Fast degree elevaton and knot nserton for B-splne curves Q-Xng Huang a,sh-mnhu a,, Ralph R. Martn b a Department of Computer Scence
More informationDISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7
DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or
More informationFast Variants of RSA
Fast Varants of RSA Dan Boneh dabo@cs.stanford.edu Hovav Shacham hovav@cs.stanford.edu Abstract We survey three varants of RSA desgned to speed up RSA decrypton. These varants are backwards compatble n
More informationsscada: securing SCADA infrastructure communications
Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationTrivial lump sum R5.0
Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationA Crossplatform ECG Compression Library for Mobile HealthCare Services
A Crossplatform ECG Compresson Lbrary for Moble HealthCare Servces Alexander Borodn, Yulya Zavyalova Department of Computer Scence Petrozavodsk State Unversty Petrozavodsk, Russa {aborod, yzavyalo}@cs.petrsu.ru
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationEnsuring Data Storage Security in Cloud Computing
Ensurng Data Storage Securty n Cloud Computng Cong Wang, Qan Wang, and Ku Ren Department of ECE Illnos Insttute of Technology Emal: {cwang, qwang, kren}@ece.t.edu Wenjng Lou Department of ECE Worcester
More informationA DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationManaging Resource and Servent Reputation in P2P Networks
Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores guch@sl.ntt.co.jp Masayuk Terada NTT DoCoMo Multmeda Laboratores te@mml.yrp.nttdocomo.co.jp
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationEfficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ
Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationAn ILP Formulation for Task Mapping and Scheduling on Multi-core Architectures
An ILP Formulaton for Task Mappng and Schedulng on Mult-core Archtectures Yng Y, We Han, Xn Zhao, Ahmet T. Erdogan and Tughrul Arslan Unversty of Ednburgh, The Kng's Buldngs, Mayfeld Road, Ednburgh, EH9
More informationMyINS: A CBR e-commerce Application for Insurance Policies
Proceedngs of the 5th WSEAS Internatonal Conference on E-ACTIVITIES, Vence, Italy, November 20-22, 2006 373 MyINS: A CBR e-commerce Applcaton for Insurance Polces SITI SORAYA ABDUL RAHMAN, AZAH ANIR NORMAN
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationMultitone Electronics Plc. delivering certainty
Multtone Electroncs Plc Multtone Electroncs Plc, Multtone House, Shortwood Copse Lane, Basngstoke, Hampshre, RG23 7NL Tel: +44 (0)1256 320292 Fax: +44 (0)1256 462 643 Emal: nfo@multtone.com Web: www.multtone.com
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationA Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks
A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract
More informationCapacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationGlobal innovative solutions You can rely on. www.calyon.com
Global nnovatve solutons You can rely on www.calyon.com CALYON has developed OPTIM SWIFTNet for ts clents. By provdng an extensve range of value-added servces, OPTIM SWIFTNet offers you worldwde connectons
More informationNational Security Agency Information Assurance Directorate
Natonal Securty Agency Informaton Assurance Drectorate Net-Centrc Enterprse Servces (NCES) Profle of Web Servce Securty: Smple Object Access Protocol (SOAP) Message Securty (WSSE) 02 MAY 2008 Prepared
More informationSmall pots lump sum payment instruction
For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested
More information= (2) T a,2 a,2. T a,3 a,3. T a,1 a,1
A set of tools for buldng PostgreSQL dstrbuted databases n bomedcal envronment. M. Cavaller, R. Prudentno, U. Pozzol, G. Ren IRCCS E. Medea, Bosso Parn (LC), Italy. E-mal: gren@bp.lnf.t Abstract PostgreSQL
More informationEVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of
More information