SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

Size: px
Start display at page:

Download "SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors"

Transcription

1 SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm, martinovi, Computer Siene Department, University of California, Irvine, United States Abstrat Initial deployment of serets plays a ruial role in any seurity design, but espeially in hardware onstrained wireless sensor networks. Many key management shemes assume either manually pre-installed shared serets or keys authentiated with the aid of out-of-band hannels. While manually installing seret keys affets the pratiability of the key deployment, out-of-band hannels require additional interfaes of already hardware-limited wireless sensor nodes. In this work, we present a key deployment protool that uses pair-wise ephemeral keys generated from physial layer information whih subsequently enables an authentiated exhange of publi keys. Hene, this work presents an elegant solution to the key deployment problem without requiring more apabilities than already available on ommon low-ost devies. To justify the feasibility of this solution, we implement and experimentally evaluate the proposed key deployment protool using ommodity wireless sensor motes. I. INTRODUCTION One of the ruial problems in wireless sensor networks is how to establish initial seurity assoiations between wireless sensor motes and a base station. Speifially, how to reate an authentiated hannel that an be used to exhange ryptographi material in a seure, salable, and user-friendly manner. This question is important regardless of available ryptographi primitives, as even an asymmetri key must be proteted from ative adversaries abusing the broadast nature of wireless ommuniation. There are various onventional approahes to this problem. For example, Kuo et al. propose the use of a Faraday age and a wireless jammer to protet seret keys exhanged in the lear [4]. However, this approah requires a well designed Faraday age, a areful handling of sensors and an additional verifiation mehanism to ensure that the Faraday age is not leaking proteted transmissions. Further shemes inlude seure devie pairing protools that use human pereptible outof-band hannels suh as auditory, e.g., [2], [10], visual, e.g., [7], [8] and tatile [6], [9] hannels to authentiate serets by user interation. Yet, implementing suh out-of-band hannels assumes additional hardware interfaes, e.g., mirophones, ameras, displays, or keypads that are not ommonly available on hardware- and battery-limited wireless sensor devies. Additionally, suh shemes plae the seurity burden on the The work in this paper was partially funded by the Carl-Zeiss Foundation and the Landesforshungsshwerpunkt Ambient Systems (AmSys). user, who may not understand the importane of the seurity measures. Reently, there have been researh ontributions that follow an alternative path towards seret generation. They take advantage of multi-path signal propagation as a soure of randomness from whih shared serets an be derived. In partiular, the key generation shemes desribed by Mathur et al. [5], Jana et al. [3], and Wilhelm et al. [12] analyze how the fading behavior of wireless hannels an be used to generate seret material. Suh protools only require an exhange of sampling messages to estimate the wireless hannel state between legitimate transmitters. Interestingly, an adversary who eavesdrops on these sampling messages from another physial position remains ignorant of the generated serets. The reason is that its hannel estimates de-orrelate rapidly with inreasing distane to the legitimate transmitters (for more details on the serey analysis of suh shemes see, e.g., [3]). Hene, if an appliation setting an ensure that an adversary annot be loated in spatial proximity to one of the legitimate transmitters, these shemes an be used as effiient and seure key derivation protools. While existing researh on these protools is foused on identifying and analyzing primitives for suh seret generation, the evaluation of their pratiability in real-world settings remains an open question. The goal of this work is therefore to systematially analyze the appliability of suh shemes to a pratial problem of initial seret deployment in WSNs. In this paper, we take advantage of the protool introdued in [12] to design SUDOKU, a seure and usable key deployment sheme that requires minimal user interation and has minimal requirements on hardware interfaes of wireless devies. Additionally, we augment the key generation protool to support simultaneous key exhanges using broadast transmissions, inreasing its performane with multiple sensors. II. SUDOKU OVERVIEW We introdue the onept and the design goals of the protool in this setion. The role of the partiipants is introdued as well as the sequene of protool phases, and the involvement of the user is desribed /10/$ IEEE 1

2 A. Protool Goals We onsider a very ommon appliation of WSNs in residential monitoring and living-assistane senarios. A user wishes to deploy wireless sensors as part of an assisted-living appliation where environmental onditions are olleted and sent to a entral base station (BS), whih makes more sophistiated deisions. One of the main problems in suh senarios is how to initially establish seure assoiations between wireless sensors and the BS to protet the appliation from various impersonation and injetion attaks inherently possible due the broadast nature of wireless ommuniation. Examples of suh attaks are (i) the evil twin attak where a sensor mote is impersonated, (ii) eavesdropping and violating the onfidentiality of the ommuniation, and (iii) the injetion of rogue (attaker-ontrolled) sensor devies into the network. The goals is to mitigate these attaks with the following measures: Devie identifiation: the user an physially identify whih devies are being paired. Authentiated messages: it is not possible for adversaries to injet messages into the network. Confidentiality: a strong seret key is derived to ahieve long-term seurity. The protool is designed to meet these goals in an user-friendly way suh that usage errors are mitigated. B. Protool Partiipants Three different parties partiipate in the SUDOKU protool: the base station that manages the exeution of the protool, a group of sensor motes that wants to establish seure assoiations with the BS, and the user who deploys the network. a) Base Station: The base station is the entral element in the exeution of the protool, it oordinates the partiipating sensor motes and protets them against message injetion attaks by onstantly monitoring the wireless hannel. We assume suffiient performane and a user interfae that enables omfortable interation (suh as a high resolution display and multiple buttons), omparable to desktop-lass omputers. b) Sensor Motes: For the sensor motes ost-effiieny is the most important aspet in the hardware design, whih results in minimal platform apabilities. Therefore, we only require the availability of three ommon interfaes for SU- DOKU: a single LED light, an on/off swith and a wireless transeiver to ommuniate and to measure the reeived signal strength (RSS). The swith an be simulated, e.g., by inserting or removing the battery of the devie. We use the status LED in three different states for user feedbak: OFF shows that the devie is either un-powered, searhing for a BS or in an error state, BLINKING means that the devie is assoiated with the base station but the key is not ready, and ON indiates suessful key deployment. In ontrast to other seure key deployment protools, the LEDs are not used for generation or distribution of seret material, but only as a status-reporting interfae. User Base Station Sensors Setup Wireless Key Generation K 1,...,K n Enrypted Key Exhange K 1,...,K n Verifiation Phase n seure ontexts Figure 1. Key deployment onept of SUDOKU. The protool proeeds in four phases: (i) the user sets up the devies, (ii) ephemeral keys K i are generated from hannel measurements, (iii) enrypted key exhanges are performed to establish long-term serets K i with the help of the ephemeral keys, and (iv) the user verifies that the orret devies are paired by heking the devies LEDs. ) User: The user involvement and interation in the protool must be designed to be simple enough for the user to understand and omplete with minimal errors. In SUDOKU, users are only required to arry out very simple tasks suh as ounting the sensor motes or verifying that their status LEDs are on. The user an abort the protool if an attak is deteted and an initiate ountermeasures suh as a delayed key deployment or even law enforement if the attak persists. C. Protool Overview The protool exeution proeeds in four phases, the oneptual overview is depited in Fig. 1. First, the user sets up the devies, starting with the base station that begins to monitor the wireless hannel and periodially sends out beaon frames with ontrol information. New sensor motes assoiate with the base station, whih detets the number of sensors that are ative in the viinity and displays this number to the user to prevent rogue sensor motes. When all sensors are ready, the user initiates the seond phase, wireless key generation. Ephemeral shared serets are derived from hannel measurements between the base station and the sensors. In the third phase, key deployment, these generated keys are used to protet ryptographi key exhanges with the sensors against ative attaks. The derived long-term serets are then verified by the devies in the last phase, and the sensors indiate suessful key agreement with their LEDs. The user heks if all sensors were suessful, at this point the base station shares pair-wise strong seurity ontexts with all sensors. After this, the nodes an be plaed in their final loations; the derived keys an either be used for seure single-hop ommuniation or to support end-to-end enryption in multi-hop topologies. D. User Perspetive In order to ahieve a seure key deployment by non-expert users, error mitigation and error resistane are major goals of SUDOKU. With our proposed protool, the steps a user must perform an be summarized as follows: 1) The user powers on the base station first, whih starts to assist the user in the progression of the protool. 2

3 A B : M A : M BS S i S n i C m k slots Pub DH Ping,j P ong,j i RSSMAP S i RSSMAP B i T i,p i h() K i a i, b i A i, B i E K (), D K () K i A sends message M to B A broadasts message M to all partiipants Base station, manages the protool exeution Sensor mote i {1,...,n} Set of all legitimate sensors, S = {S 1,...,S n} Number of sensors partiipating in the protool Wireless hannel available for probing, i {1,...,m} Set of available hannels, C = { 1,..., m} Number of available hannels Number of sampling rounds in the KeyGen Phase Number of time slots/assoiated sensor motes Publi parameters for the enrypted key exhange The jth probe message on hannel from BS The jth probe message on hannel from S i Reeived signal strength means of S i on hannel Reeived signal strength at BS from S i on hannel Tolerane and repair values for KeyGen phase Strong ryptographi one-way hash funtion Pair-wise ephemeral key between BS and S i Large random numbers used in the DH key exhange Publi keys used in the DH key exhange Symmetri en- and deryption using key K Pair-wise long-term seret between BS and S i Table I PROTOCOL NOTATION 2) Then, eah sensor devie at a time, the user ativates the sensor motes. A sensor tries to assoiate with the BS, and notifies the user by a blinking LED that it is suessfully assoiated. The user an then plae the sensor in the viinity of the BS and go on with the other sensors until all are ready. 3) Before starting the key deployment, the user ensures that the number of sensors shown on the display of the BS mathes with the number the user wishes to assoiate. He then triggers the key generation phase with a button. 4) After approx seonds, the BS notifies the user that the key deployment has finished and asks him to hek that all sensors have their LEDs onstantly ON. 5) If all sensors indiate suessful ompletion, the user presses OK on the base station to finish the key deployment. Eah of the instrutions require the user to handle the hardware, hek for LEDs or information displayed on the base station; no keying material must be entered by the user manually. And by using the BS to guide him through the proess, many possible further error soures an be avoided. III. THE SUDOKU PROTOCOL This setion presents the key deployment protool in detail, disussing every step of the protool. To assist the reader, the notation used in the protool desription is summarized in Table I. A. Initial Setup Phase This initial phase is used to distribute parameters for the protool exeution. We require a deterministi medium aess sheme in SUDOKU. Any ontention-free MAC an be used; we implemented a simple TDMA-based MAC that divides the medium into 2 ms time slots allotted aording to the number of assoiated sensors. The BS starts sending out beaons periodially that mark the beginning of a new turn. New sensors ontend for the free time slot at the end of a turn, while assoiated sensors transmit in their respetive time slot to show presene to the base station and to laim the medium. This is the only period with ontention in the protool, i.e., the period where ollisions are possible without indiating an attak. User: Power on BS BS : slots, k, C,Pub DH for Si S: User: Turn on S i S i : Find a free time slot using slots S i BS: slots, k, C,Pub DH S i : Start BLINKING User: Put sensor S i near BS User: Confirm the number of sensors n on BS Initiate the key generation phase on BS Figure 2. Setup Phase. As shown in Fig. 2, the user turns on the base station first, whih starts to monitor the wireless hannel to protet against message injetion. Also, it starts sending out beaons with the protool parameters periodially; ontrol information for the key generation phase, i.e., the number of samples k to ollet on eah hannel and the set of hannels C to measure on, the number of urrently assoiated sensors in slots to help new sensor motes aligning into the TDMA sheme and to give them feedbak whether they are suessfully assoiated with the BS, and finally the publi protool parameters Pub DH, in the ase of Diffie-Hellman g and p, that are later used in the key deployment phase (Setion III-C). The user then proeeds to sequentially turn on the sensor motes that he wishes to seurely deploy keys to. A joining sensor starts sanning for beaon frames and assoiates with the BS by re-broadasting the reeived parameters to verify with the BS that no forged parameters were injeted. The BS an detet the presene of a joining sensor, and adjusts the number of assoiated sensors in slots to notify the sensor. In turn, the sensor informs the user that it is assoiated by BLINKING. This ensures the required devie identifiation. The user an then plae the sensor devie in the viinity of the BS and proeed with the next mote. The base station keeps trak of the number n of already deteted sensors and displays it to the user to ensure that no rogue sensors are present that want to enter the network. When everything is set up and ready, the user starts the key generation phase by pressing the respetive button on the base station. At this point, he onfirms that the number of devies talking to the BS mathes the number of sensors present to prevent the pairing of maliious sensors, and to enable the BS to detet the ompletion of the protool. B. Key Generation Phase The goal of this phase is to use the randomness of the wireless hannel to extrat an authentiated seret key without user interation. This is ahieved by the reation of a reeived 3

4 signal strength (RSS) map ontaining hannel measurements for every sensor in S and every wireless hannel in C. We denote this map RSSMAP Si, it belongs to S i and ontains the RSS means for the BS sensor pair, and RSSMAP Bi for the orresponding measurements by BS. Using this measurement data, an ephemeral pair-wise and symmetri seret key K i is generated, whih is used to authentiate the key deployment in the next phase of the protool. 1) Wireless Key Generation: The ephemeral key is generated using the protool desribed in [12]. Due to the reiproity of the wireless hannel, two devies are able to extrat shared seret information simply by exhanging probing messages over the wireless hannel. These measurements may not be equal as the reiproity is not perfet and measurement errors are introdued, so both devies must perform a seret reoniliation step to orret these deviations. In ontrast to related work that requires devie mobility, the use of multiple hannels in our protool enables the generation of seure keys even in stati senarios. Our previous work shows that wireless key generation an suessfully be applied in the ontext of resoure-onstrained devies in WSNs, enabling the generation of unpreditable keys and a high suess ratio, by experiments in real-world senarios. However, the previous protool is designed for a pair-wise key generation between two devies only; this paper proposes improvements to the basi protool that enable an elegant way to inrease the number of protool partiipants, thus dereasing the duration of the protool, as the hannel sampling is the major fator in the overall runtime. The key idea is that by using the broadast nature of the wireless medium, we are able to run several key generations simultaneously; eah devie broadasts its sampling messages to all other devies, who reord the reeived signal strength. This sheme works beause of the long oherene time of the wireless hannel due to the stati network infrastruture. In Setion IV, we show that this new approah is feasible, even using urrently available sensor mote hardware, to improve the overall performane of SUDOKU. 2) Exeution of the Capturing Phase: In this phase, all devies are still operating aording to the TDMA sheme. In eah time slot, the sensors and the base station broadast their probing message to all other devies. Due to the fixed hannel swithing pattern (the timing, sending pattern, and number of sensors is distributed by the BS), there is no ontention for the medium and the BS an make sure that it an monitor the orret hannel and that no sensor loses its synhronization, whih is ruial to protet the sensor motes from attaks. C, j 1..k S i S BS : S i BS: Figure 3. Ping,j to all sensors in S, update RSSMAP S i P ong i,j to BS, update RSSMAPB i Randomness Capturing Phase. AsshowninFig.3,theBS starts by broadasting Ping,j frames on the first hannel after the user has started the operation. For every reeived frame, eah sensor S i responds with a broadast frame Pong,j i in its time slot. After k rounds, all partiipants know from the deployed parameters the time for hannel swithing. The sampling is repeated until all m hannels have been sampled. The overall number of transmissions required for this phase is in the order of O(kmn). After all samples have been taken, the protool proeeds by orreting the measurements, generating and heking the ephemeral key K i as desribed in [12] with eah of the sensors in S. BS: Generate T i,p i, and alulate K i BS S i : T i,p i S i : Corret the RSSMAP S i and alulate K i S i BS: h(k i ) BS: Chek K i is equal on both sides Figure 4. Key Reoniliation Phase for Sensor S i. The base station hooses a vetor of tolerane values T i = (t 1,...,t m ) with one entry for eah hannel. These values desribe the amount of errors than an be present in the measurements until the protool results in different keys. However, this presents a tradeoff as larger tolerane values lower the unertainty for attakers and therefore the seurity of the generated key. There is a diret onnetion between the preision of the measurements, the number of hannels used for sampling and the length of the generated seret; all aspets influene the seurity of the protool. This interrelation has been quantified in our previous work, whih supports us here to hoose suitable protool parameters. The publi reoniliation string P i sent to S i helps sensor S i to repair its signal measurements. The values (T i,p i ) are generated and broadasted for eah of the sensors S i, whih an in turn orret their RSSMAP Si and generate K i. Then, the keys are heked for equality by exhanging the hash value of the seret. If K i does not math, it is possible to repeat the repair mehanism; this step is omitted in this paper for the sake of larity. After this phase, the base station has suessfully established ephemeral keys K i generated from the wireless hannel with all sensor motes S i, whih an then be used to authentiate key agreements on long-term serets. C. Key Deployment Phase The keys K i generated in the previous phase an diretly be used as authentiated shared serets. However, as urrent hardware platforms only support a small number of hannels and have limited measurement preision, the resulting serets urrently have approximately bit of information entropy as experiments in [12] show, whih is omparable to passwordbased seurity, but not useful as long-term serets. Therefore, we ombine publi key ryptography for onfidentiality and the wireless key generation approah to enable an authentiated key exhange. The ommuniation is authentiated as only devies at the orret positions an know the seret generated by the wireless hannel. 4

5 1) Authentiated Key Exhange: There are several ways to establish stronger keys from low entropy shared serets. In the following, we provide a onrete example of how a seret generated from the wireless hannel an be utilized for an authentiated key exhange. The protool in its original form is known as Password-based Enrypted Key Exhange (EKE), whih is originally desribed in [1] and extended in [11]. The general idea is to use the short seret key to enrypt randomly hosen key material. This is an elegant way of avoiding off-line ditionary attaks on weak shared serets, sine an adversary annot guess the random values. We use a Diffie-Hellman approah for key agreement in SUDOKU. BS: BS S i : S i : S i BS: BS: a i = random(), None i = random() A i = g a i mod p Nonei,E Ki (A i ) b i = random() B i = g b i mod p K i = A b i i mod p EKi (None i ),E Ki (B i ) K i = B a i i mod p ( Chek None i = D Ki EKi (None i ) ) Count S i as suessful on math EKi (None i +1) BS S i : ( S i : Chek None i +1=D Ki EKi (None i +1) ) Turn LED ON if suessful Figure 5. Enrypted Key Exhange with sensor S i. Conretely, in this protool the ephemeral seret key K i, generated in the previous protool step, is used to mask the transmission of the ryptographi material A i and B i, whih are then used for the generation of the strong enryption key K i (in ase of Diffie-Hellman, this key an be derived as K i = g aibi mod p, where modulus p and base exponent g are the parameters Pub DH exhanged in the setup phase). The publi parameters A i and B i are exhanged as shown in Fig. 5. At the same time, the Diffie-Hellman key K i is verified for its freshness. The BS hooses None i randomly and sends it to S i, whih in turn shows that it is in possession of the generated ephemeral key K i by extrating the publi parameter B i and using it to ompute K i. The none is send bak by the sensor, enrypted with K i to verify that it has suessfully generated this key. Additionally, BS an now detet the suessful key deployment. BS sends None i +1 bak to S i to ahieve mutual authentiation, and the sensor an report this suess to the user by turning the LED ON. This phase is repeated for all sensors. D. Verifiation Phase The sensors turn their LEDs ON when a suessful key exhange is deteted, and in the last phase it is neessary to ensure that the keys were deployed to the orret devies. The number of LEDs in the state ON must math. BS: User: Chek if the number of suessful key agreements mathes Show SUCCESS on display Verify that all sensor motes in S have LEDs ON Press OK if the number of sensors mathes Figure 6. Verifiation Phase. This phase is a ountermeasure against rogue, missing and impersonated sensors. The base station an also notie if K i = K i or if K i = K i aused by problems in the key generation proess, enabling it to deide if previous phases must be repeated to reah agreement. If the numbers math, the user an be sure that the devies he expets share a seure key with the base station, and in ase of error the BS an identify the possible auses (attaks, strong deviations in the hannel measurements, usage errors), warn the user and suggest ountermeasures. IV. EXPERIMENTS This setion desribes experiments that fous on the feasibility of broadast key generation introdued in Setion III-B. This is an extension to our key generation protool analyzed in [12], the hardware setup for this work is the same, so our previous results for robustness and strength of keys between pairs of devies still apply in this work. A. Channel Reiproity with larger Time Gaps One important aspet of the SUDOKU protool is the feasibility to generate ephemeral serets from the wireless hannel using broadast messages. Our previous work shows that the sheme works for pair-wise senarios, but due to the larger time gaps between the transmission of sampling messages, the hannel reiproity may be diminished in the multi-node ase. This setion desribes the feasibility evaluation in a realisti senario for our proposed extensions. 1) Methodology: The experiment takes plae on a university floor, an indoor loation omparable to assisted-living appliation senarios. The role of BS is taken by a MICAz sensor mote on a programming board, so that the operation an diretly be ontrolled by a host omputer attahed via serial onnetion. The six sensors S i are MICAz sensor motes as well, but operate on battery power. These motes are plaed randomly in a distane of 1 2 meters away from the BS and that the devies are at least 16 m apart to ensure independent wireless hannels [5]. During the experiments, several fators aounted for short-term disturbanes to the hannel. The wireless medium is shared with several wireless aess points using the IEEE g standard, and an operator was near the sensor motes during the sampling phase influening the signal propagation properties, whih is realisti as the normal user will also remain lose during the protool s exeution, and wireless interferene is typial in suh appliations. The experiment was repeated 20 times, and in every experiments, k =32samples were exhanged on m =16IEEE hannels to generate the RSS maps. The sensor motes S 1,...,S 6 are programmed to measure the signal strength and report bak these values to BS where the RSS of these 5

6 Channel deviations (db) on the protool desribed in [12]. In ontrast to previous work, the fous of this paper was to systematially analyze the appliability of this protool in a senario where nonexpert users need to distribute initial serets among wireless sensors in a seure and salable manner. For this reason, this paper presented a detailed analysis of the steps required for suh key deployments. The experiments show that the uniast key generation protool an be further optimized, reduing the message omplexity and runtime. As future work, we are working on a detailed seurity analysis and plan to ondut user studies to show the pratiability of SUDOKU. S 1 S 2 S 3 S 4 S 5 S 6 Figure 7. Deviations in the reiproity of the wireless hannel measurements for six sensors and a base station. The deviations are bounded and allow for a suessful key generation. reports ( are logged. At this point, ) BS has a pair of values RSSMAP Si,k,RSSMAPBi,k for both views of the wireless hannel state. In this experiment, we onsider the deviations between these two measurements. Smaller deviations enables a more robust generation of keys. 2) Robustness w.r.t. Number of Sensors: The result of this experiment is shown in Fig. 7. Eah staked histogram shows the distribution of deviations of the hannel measurements between BS and S i. Due to the timing sheme, the last sensor S 6 has the largest delay between the broadast of BS and the response. The experiments show that the wireless hannel is stable when the sensors stay in position, the deviations are bounded and omparable to the experimental results in [12], even for larger time lags in the hannel measurements. Thus, it is possible to apply the key generation protool with minor modifiations and generate keys with a suess probability of over 95%. However, the experiments also show that the protool is more suseptible to short-term deviations, suh that the number of exhanged samples should be inreased to ensure suessful key agreement. These short-term deviations are aused, e.g., by ollisions with WLAN transmissions that inreases the reeived signal strength, or hanging multipaths due to movement of the operator, leading to oasional large deviations. Additional measures must be taken to ensure suessful key generation, e.g., by filtering out samples that differ signifiantly from the sample mean. To summarize, we an onlude that the key generation phase works with multiple devies at one. As a pratial deployment guideline, a tolerane value of approximately t =2an be used that results in seret bits, whih is enough for the authentiation in the key deployment phase, and ensures a high suess probability. V. CONCLUSION The goal of this paper was to understand how reently proposed key generation protools based on unpreditable signal propagation an be applied to the pratial problem of initial key distribution in WSNs. For this purpose, we designed SUDOKU, a seure and pratial key distribution sheme based REFERENCES [1] Steven M. Bellovin and Mihael Merritt. Enrypted key exhange: Password-based protools seure against ditionary attaks. In Proeedings of the 1992 IEEE Symposium on Seurity and Privay, pages 72 85, May [2] Mihael T. Goodrih, Mihael Sirivianos, John Solis, Gene Tsudik, and Ersin Uzun. Loud and lear: Human-verifiable authentiation based on audio. In ICDCS 06: Proeedings of the 26th IEEE International Conferene on Distributed Computing Systems, page 10, Washington, DC, USA, July IEEE Computer Soiety. [3] Suman Jana, Sriram Nandha Premnath, Mike Clark, Sneha K. Kasera, Neal Patwari, and Srikanth V. Krishnamurthy. On the effetiveness of seret key extration from wireless signal strength in real environments. In MobiCom 09: Proeedings of the 15th annual international onferene on Mobile omputing and networking, pages , New York, NY, USA, September ACM. [4] Cynthia Kuo, Mark Luk, Rohit Negi, and Adrian Perrig. Messagein-a-Bottle: user-friendly and seure key deployment for sensor nodes. In Proeedings of the 5th International Conferene on Embedded Networked Sensor Systems, pages , New York, NY, USA, November ACM. [5] Suhas Mathur, Wade Trappe, Narayan Mandayam, Chunxuan Ye, and Alex Reznik. Radio-telepathy: Extrating a Seret Key from an Unauthentiated Wireless Channel. In MobiCom 08: Proeedings of the 14th ACM International Conferene on Mobile Computing and Networking, pages , New York, NY, USA, September ACM. [6] Rene Mayrhofer and Hans Gellersen. Shake well before use: authentiation based on aelerometer data. In PERVASIVE 07: Proeedings of the 5th international onferene on Pervasive omputing, pages , Berlin, Heidelberg, May Springer-Verlag. [7] Jonathan M. MCune, Adrian Perrig, and Mihael K. Reiter. Seeingis-believing: using amera phones for human verifiable authentiation. International Journal of Seurity and Networks, 4(1/2):43 56, [8] Ramnath Prasad and Nitesh Saxena. Effiient devie pairing using "human-omparable" synhronized audiovisual patterns. In ACNS 08: Proeedings of the 6th international onferene on Applied ryptography and network seurity, pages , Berlin, Heidelberg, June Springer-Verlag. [9] Claudio Soriente, Gene Tsudik, and Ersin Uzun. BEDA: Button-enabled devie pairing. In International Workshop on Seurity for Spontaneous Interation, UbiComp 2007 Workshop Proeedings, Berlin, Heidelberg, September Springer-Verlag. [10] Claudio Soriente, Gene Tsudik, and Ersin Uzun. Hapadep: Humanassisted pure audio devie pairing. In ISC 08: Proeedings of the 11th international onferene on Information Seurity, pages , Berlin, Heidelberg, September Springer-Verlag. [11] Mihael Steiner, Gene Tsudik, and Mihael Waidner. Refinement and extension of enrypted key exhange. ACM SIGOPS Operating Systems Review, 29:22 30, July [12] Matthias Wilhelm, Ivan Martinovi, and Jens B. Shmitt. Seret Keys from Entangled Sensor Motes: Implementation and Analysis. In Proeedings of the ACM Conferene on Wireless Network Seurity (WiSe 2010), pages , Hoboken, NJ, USA, Marh ACM Press. 6

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Traitor Tracing Schemes for Protected Software Implementations

Traitor Tracing Schemes for Protected Software Implementations Published in S. Katzenbeisser and A.-R. Sadeghi, Eds, 11th ACM Workshop on Digital Rights Management (ACM DRM 2011), pp. 15-21, ACM Press, 2011. Traitor Traing Shemes for Proteted Software Implementations

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Wireless Transmission Systems. Instructor

Wireless Transmission Systems. Instructor Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Research Data Management ANONYMISATION

Research Data Management ANONYMISATION ANONYMISATION Sensitive Data Sensitive Data is information overing: The raial or ethni origin of the Data Subjet Politial opinions Religious or other beliefs of a similar nature Membership of trade unions

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

Interaction-Driven Virtual Reality Application Design

Interaction-Driven Virtual Reality Application Design Nar s Parés npares@iua.upf.es Ro Parés rpares@iua.upf.es Audiovisual Institute, Universitat Pompeu Fabra, Pg. Cirumval. laió, 8 08003 Barelona, Spain www.iua.upf.es/, gvirtual Interation-Driven Virtual

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Dataflow Features in Computer Networks

Dataflow Features in Computer Networks Magyar Kutatók 1. Nemzetközi Szimpóziuma 1 th International Symposium of Hungarian Researhers on Computational Intelligene and Informatis Gyula Max Budapest University of Tehnology and Eonomis, Department

More information

protection p1ann1ng report

protection p1ann1ng report f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando Rosa-Velardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7

Table of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7 Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015

PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015 Proeeds of Crime (Business in the Regulated Setor) Order 2015 Artile 1 Statutory Doument No. 2015/0073 Proeeds of Crime At 2008 PROCEEDS OF CRIME (BUSINESS IN THE REGULATED SECTOR) ORDER 2015 Approved

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

ECONOMICS OF SECURITY PATCH MANAGEMENT

ECONOMICS OF SECURITY PATCH MANAGEMENT ECONOMCS OF SECURTY PATCH MANAGEMENT Huseyin Cavusoglu * Hasan Cavusoglu Jun Zhang AB Freeman Shool o Business, Tulane University 7 MAlister Drive, New Orleans, LA 70118, USA Sauder Shool o Business, The

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

Annual Return/Report of Employee Benefit Plan

Annual Return/Report of Employee Benefit Plan Form 5500 Department of the Treasury Internal Revenue Servie Department of Labor Employee Benefits Seurity Administration Pension Benefit Guaranty Corporation Annual Return/Report of Employee Benefit Plan

More information

Strategies for Development and Adoption of ERR in German Ambulatory Care

Strategies for Development and Adoption of ERR in German Ambulatory Care Strategies for Development and Adoption of ERR in German Ambulatory Care Sebastian Duennebeil 1, Ali Sunyaev 1, Jan Maro Leimeister 2, Helmut Krmar 1 1 Department of Informatis 1 Tehnishe Universitat MUnhen

More information

AT 6 OF 2012 GAMBLING DUTY ACT 2012

AT 6 OF 2012 GAMBLING DUTY ACT 2012 i e AT 6 OF 2012 GAMBLING DUTY ACT 2012 Gambling Duty At 2012 Index i e GAMBLING DUTY ACT 2012 Index Setion Page PART 1 INTRODUCTORY 5 1 Short title... 5 2 Commenement... 5 3 General interpretation...

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors

F220 Series. Installation Instructions. Photoelectric Smoke/Heat Detectors F0 Series EN Installation Instrutions Photoeletri Smoke/Heat Detetors F0 Series Installation Instrutions.0 General Information EN.0 General Information. F0-B6 Series Bases Use with the F0 Series Heat and

More information

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential)

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential) Plan Basis The D.C. Long Term Disability Insurane Plan Exlusively for NBAC members Issued by The Prudential Insurane Company of Ameria (Prudential) What does it over? The D.C. Long Term Disability Insurane

More information

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING INTERMAN 7 TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING by Douglas A. Ready, Albert A. Viere and Alan F. White RECEIVED 2 7 MAY 1393 International Labour

More information

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains Effets of Inter-Coahing Spaing on Aerodynami Noise Generation Inside High-speed Trains 1 J. Ryu, 1 J. Park*, 2 C. Choi, 1 S. Song Hanyang University, Seoul, South Korea 1 ; Korea Railroad Researh Institute,

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS 22-24 Setember, Sozool, ULGRI INTELLIGENCE IN SWITCHED ND PCKET NETWORKS Ivaylo Ivanov tanasov Deartment of teleommuniations, Tehnial University of Sofia, 7 Kliment Ohridski st., 1000, hone: +359 2 965

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

A Reputation Management Approach for Resource Constrained Trustee Agents

A Reputation Management Approach for Resource Constrained Trustee Agents A Reputation Management Approah for Resoure Constrained rustee Agents Han Yu, Chunyan Miao, Bo An 2, Cyril Leung 3, and Vitor R. Lesser 4 Nanyang ehnologial University, Singapore 2 he Key Lab of Intelligent

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

The Basics of International Trade: A Classroom Experiment

The Basics of International Trade: A Classroom Experiment The Basis of International Trade: A Classroom Experiment Alberto Isgut, Ganesan Ravishanker, and Tanya Rosenblat * Wesleyan University Abstrat We introdue a simple web-based lassroom experiment in whih

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

Real-Time Communication

Real-Time Communication Adams11 1/6/05 10:24 AM Page 341 Real-Time Communiation 11 hapter Chapter Objetives This hapter helps you understand what instant messaging is. what some of the key features of instant messaging are. what

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS

THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING NURS 6390-004 Introdution to Genetis and Genomis SYLLABUS Summer Interession 2011 Classroom #: TBA and 119 (lab) The University of Texas at Arlington

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

RELATED WORK 1.1 Our Contributions PROBLEM FORMULATIONS

RELATED WORK 1.1 Our Contributions PROBLEM FORMULATIONS Privay-Enhaning k-anonymization of Customer Data Sheng Zhong 1,2 Zhiqiang Yang 1 Rebea N. Wright 1 1 Computer Siene Department, Stevens Institute of Tehnology, Hoboken, NJ 07030, USA 2 DIMACS Center, Rutgers

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

To the Graduate Council:

To the Graduate Council: o the Graduate Counil: I am submitting herewith a dissertation written by Yan Xu entitled A Generalized Instantaneous Nonative Power heory for Parallel Nonative Power Compensation. I have examined the

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Public DNS System and Global Traffic Management

Public DNS System and Global Traffic Management . This paper was presented as part of the main tehnial program at I INFOCOM 211 Publi DNS System and Global Traffi Management Cheng Huang Mirosoft Researh David A. Maltz Mirosoft Researh Albert Greenberg

More information