A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

Size: px
Start display at page:

Download "A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS"

Transcription

1 Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer Scence Unversty of Manchester, UK obamasak@cs.man.ac.uk Nng Zhang School of Computer Scence Unversty of Manchester, UK nzhang@cs.man.ac.uk ABSTRACT Ths paper proposes a new dstrbuted reputaton management scheme to support agent-based applcatons. The scheme uses a transacton feedback system and fve metrcs to real-tme evaluate the reputaton of Trusted Thrd Party (TTP) hosts that are selected and employed to support an agent n performng ts transactonal tasks. The scheme exhbts two nterestng features not seen n prevous works: frstly, t offers better effcency and robustness, and secondly, t credts/penalzes a TTP-host accordng to ts transactonal response, the transacton value and the reputaton of the source of feedback. In addton to facltatng TTP-host selecton based upon ts reputaton, ths mechansm of credt and penalsaton s expected to deter dshonesty or msbehavour by the enttes nvolved. Keywords: Dstrbuted reputaton management, e-commerce securty, moble agent securty. 1. Introducton Moble agents offer a new computng paradgm that allows us to gan a greater access to resources on the Internet n a more effcent and automatc manner. By delegatng tasks to moble agents, users can accomplsh extended or complcated tasks that they, otherwse, would rather not or cannot perform themselves. Moreover, by sendng moble agents close to nformaton sources, we can reduce network traffc and applcaton latency. However, the success n usng the moble agent paradgm depends on the level of securty t offers. Wthout adequate securty provson, securty-senstve tasks cannot be delegated to an agent that may execute the tasks n a remote and possbly malcous host. To llustrate the securty rsks faced by a moble agent n the Internet envronment, we here analyse an e- Commerce applcaton scenaro. A busnessman s to search for an arlne tcket for a busness trp on the Web. As the search may take a lttle whle and he s too busy to do the search n person hmself, he has decded to delegate ths task to a moble agent. The busnessman specfes some requrements for ths purchase. For example, he may specfy that the purchase should only proceed f the prce of a tcket s no more than 200, and f such an offer s found, then the agent should book the flght at once on hs behalf. It s clear that, n such a scenaro, a remote arlne host has the ncentve to msbehave or to attack the agent. For example, the host may force the agent to sgn a deal that s above the specfed prce threshold, or the host may forge the agent sgnature(s) altogether by spyng on the sgnature key carred by the agent so that the busnessman wll be lable for the deal(s). Prevous research works [Km et al. 2001, Kotzankolaou et al. 2000, Lee et al. 2001, Mambo et al. 1996a, Mambo et al. 1996b, Reagle 1998] have proposed some solutons to address ths problem, or, n a more generc term, the problem of securng the sgnature key (also called proxy key) carred by a moble agent. However, there are rooms for mprovements n these solutons. Some of these solutons do not support the securty servce of nonrepudaton of sgnature recept [Kotzankolaou et al. 2000, Mambo et al. 1996a, Mambo et al. 1996b, Reagle 1998], whle others do not provde suffcent protecton for the proxy key aganst msuse by a remote malcous (merchant) host [Lee 2001]. In addton, some of the solutons that provde a good level of securty protecton, e.g. the Km s protocol [Km et al. 2001], are neffcent n terms of computatonal costs. Recently, Bamasak and Zhang [Obamasak & Zhang 2004] have proposed a more secure and effcent scheme for sgnature delegaton to a moble agent amed at addressng the weaknesses mentoned above. Ths scheme makes use of a Trusted Thrd Party (TTP) to assst the moble agent n sgnature generaton and dspute resoluton to support the non-repudaton of sgnature recept. The scheme assumes that a sngle host plays the role of ths TTP. The downsde of ths centralzed TTP based approach s that t s a potental performance/relablty bottleneck ntroducng a sngle pont of falure for protocol executon. The fact that t s ncreasngly dffcult to protect any sngle system aganst the sort of attacks prolferatng on the Internet today has made ths assumpton a weakness n our desgn. One way of overcomng ths weakness s to dstrbute the role of the TTP among a set of Page 154

2 Journal of Electronc Commerce Research, VOL 7, NO.3, 2006 trusted hosts rather than relyng on a sngle host. In ths way, the robustness of the protocol s strengthened as a majorty of, or all of, the trusted hosts would have to be compromsed before the system as a whole s compromsed. An mportant queston rased at ths stage s: how can the agent owner decde on the group of hosts that can be trusted to jontly perform the role of the TTP? In other words, what should be the selecton crtera on whch the agent owner makes the decson as whether or not a host should be selected to play the role of the TTP? Obvously, the agent owner should select the TTP-hosts that have an acceptable level of reputaton. Conventonal securty solutons and cryptographc methods, such as the use of passwords and dgtal certfcates, alone are not suffcent for us to evaluate the trustworthness of a TTP-host. They can help us to establsh whether a party s authentcated and authorzed to take certan actons. They can not guarantee that a party (even authorsed) wll perform as promsed and delver a trusted servce. In ths paper, we nvestgate current solutons to reputaton management, and present the desgn of our dstrbuted reputaton scheme suted to the sgnature delegaton model proposed n [Obamasak & Zhang 2004]. The remanng part of ths paper s organzed as follows. Secton 2 presents an analyss of related work n reputaton management. Secton 3 defnes the metrcs for evaluatng the reputaton of a TTP-host n e-commerce context. Secton 4 descrbes our Dstrbuted Reputaton Management scheme along wth the two algorthms used by the scheme. Fnally, Secton 5 draws the conclusons of ths paper. 2. Related Work Reputaton s defned as the amount of trust nspred by a partcular person n a specfc settng or doman of nterest by Marsh [Marsh 1994]. In [Reagle 1996], reputaton s defned as asset creaton and t s evaluated accordng to ts expected economc returns. Recently, a number of trust/reputaton systems and mechansms have been proposed for on-lne tradng and agent systems [Ketchpel & Garca-Molna 1996, Zachara & Maes 2000, Xong & Lu 2003, Bryant & Colledge 2002]. The approach used n [Ketchpel & Garca-Molna 1996] employs one or more TTP-hosts to acheve a far exchange securty servce. Ths work, however, assumes that the TTP-hosts are trustworthy, and never msbehave. The authors n [Zachara & Maes 2000] have developed a collaboratve reputaton mechansm allowng personalzed evaluaton of ratngs assgned to partcpatng enttes. Based upon these ratngs, the relabltes of the enttes are estmated. However, the work does not clearly state the evaluaton metrcs, or on what crtera, the ratngs (.e. reputaton values) are calculated. The methods presented n [Malaga 2001, Xong & Lu 2003, Jøsang & Ismal 2002] only deal wth peer-to-peer trust. They do not provde a soluton for the selecton of a group of TTP-hosts that can jontly performs a securty-senstve task. In the Internet-based electronc marketplace, there are a few workng on-lne reputaton systems. Examples nclude the ebay [ebay 2004] and Yahoo! Aucton [Yahoo 2004] feedback systems. These systems allow partcpants of a transacton to rate each other wth a value of +1 for a postve feedback, 0 for beng neutral, and - 1 for a negatve feedback. Only wnnng bdders and sellers may submt a feedback for ther completed transactons. A ratng from an ebay partcpant only contrbutes once to another partcpant s ratng. For example, f partcpant A gves 3 postve ponts to another partcpant B (for 3 dfferent transactons), partcpant B s ratng can only ncrease by +1. However, f A gves two negatve and one postve ponts to B, the negatve ratng wll count once and so wll the postve ratng. A transacton partcpant s also allowed to submt a wrtten response. The reputaton value of a partcpant s then calculated as the sum of all ponts ths partcpant has receved snce s/he started dealng n the marketplace. Any partcpant wth a reputaton value of -4 wll be suspended from further dealngs on ebay. Ths approach s lnear and sngle-factor based,.e. postve or negatve feedback, and often fals to capture the behavor of the partes nvolved effectvely. For example, a partcpant who has 100 postve feedback ponts wll have the same ratng as a user who has had 300 postve and 200 negatve ponts. The Dstrbuted Reputaton Management scheme to be proposed n ths paper has addressed these weaknesses. Namely, the scheme has defned clear crtera for reputaton calculaton. It s also embedded wth an algorthm, the TTP-hosts Subset Selecton (TSS) algorthm, that selects one or more (or a subset of) TTP-hosts based upon the crtera such that the aggregated reputaton value of these selected TTP-hosts satsfes the trust level specfed by an agent owner. The trust level s, n turn, determned by the value of the transacton to be performed. In addton, the scheme has also got an algorthm, the Trust and Relablty Updatng (TRU) algorthm, by whch the agent owner calculates and updates reputaton values assocated wth each of the TTP-hosts nvolved n a transacton. The algorthm uses a non-lnear approach to transacton feedback sent by merchant hosts. Fgure 1 shows an overvew of the Dstrbuted Reputaton Management scheme. Page 155

3 Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons (3) Request (4) Response TTP-host1 Agent owner A (1) TSS algorthm (7) TRU algorthm (2) Moble Agent (AS) (6) Moble Agent (TM) Merchant host B (5) Creates TM (3) Request (4) Response (3) Request (4) Response (3) Request TTP-host2 TTP-host3 (4) Response TTP-hostY Fgure 1. An Overvew of the Dstrbuted Reputaton Management Scheme 3. Reputaton Metrcs In our dstrbuted trust model, a TTP-host s reputaton s measured by two values, a trust level and a relablty level. Both values are the results of the TTP-host s aggregated transactonal behavours (reflected by ts responses) over a specfc past perod. The trust level reflects the truthfulness of the TTP-host n performng the transactons and the relablty level reflects ts avalablty n provdng the TTP servce. Both values are the functon of the followng parameters. (1) Transacton outcome feedback. Upon the executon of each transacton, the remote (merchant) host assgns a feedback measured n terms of trust and relablty values to each partcpatng TTP-host. The values assgned are related to the message reply sent by the TTP-host n relaton to ths transacton. For example, f the reply can pass ts verfcaton process postvely, the trust value wll be Yes. Otherwse, f the message reply fals the verfcaton process, perhaps due to a malcous ntent by the TTP-host or due to channel errors (repeated transmssons are appled), then the trust value wll be No. For the relablty value, f the merchant host dd not receve an expected message from the TTP-host after a certan perod of tme, the merchant wll assgn No to the relablty value assocated wth the TTP-host. Otherwse, f the expected message s receved, the relablty value wll be Yes. The per-transacton trust and relablty values reflect how well and relable ths TTP-host has fulflled ts part of the protocol executon n performng ths transacton. The overall trust and relablty values of a TTP-host are the aggregaton of the per-transacton trust and relablty values gven to the host n all the transactons nvolved by the TTP-host over a specfed past tme perod T h. (2) Total number of transactons performed. A smple aggregaton of feedbacks may fal to capture the true record of a TTP-host s transactonal behavour. For example, a TTP-host that has performed dozens of transactons but cheated on 1 out of every 4 occasons wll have a hgher aggregated reputaton value n comparson wth a TTP-host that has only performed 10 transactons and has been fathful n all of these occasons. In other words, the total number of transactons that the TTP-host has performed over the specfc past perod s also an mportant ndcator of ts reputaton and should be taken nto account for the calculaton of ts reputaton value. In our model, the average feedback value, measured as the rato of the sum of the feedbacks the TTP-host has receved over tme perod T h to the total number of transactons the TTP-host has taken part over the same perod, s used nstead of a smple sum. (3) Transacton value. The value of a transacton undertaken by a TTP-host s another mportant metrc for ts reputaton evaluaton [Km & Benbasat 2003]. Helpng wth a transacton wth a value of 1000 certanly worth more credts than that wth a value of 10. Smlarly, falure to perform a transacton of 1000 should be penalsed more than falng a 10 one. The soluton used by e-bay fal to address ths observaton, whch may let away a TTP-host that develop a sound reputaton value by beng honest n performng small value transactons, but behavng malcously wth large value ones. Our reputaton evaluaton algorthm has overcome ths weakness by havng an embedded rsk factor n the reputaton calculaton. The rsk factor s proportonal to the transacton value, and s used to wegh the feedback of the transacton gven by a merchant to a TTP-host. (4) Total number of faled ncdents. To further enhance farness n assessng transactonal behavour of a TTPhost, we have also ntroduced a counter to record the total number of faled or ncorrect responses made by the TTP-host wthn a specfed perod. A TTP-host wth ths counter value reachng a certan threshold wll have ts reputaton value reduced to the mnmum. In ths case, the TTP-host wll have to perform a consderable volume of honest transactons n order to rebuld ts reputaton. Page 156

4 Journal of Electronc Commerce Research, VOL 7, NO.3, 2006 (5) Source of the feedback. As the author n [Malaga 2001] stated: when consderng reputaton nformaton, we often account for the context and the source of the nformaton, the feedback from a party (.e. a merchant) who has a better reputaton should be weghed more n calculatng reputaton. 4. A Dstrbuted Reputaton Management Scheme To dynamcally select a subset of TTP-hosts among a set of N trusted hosts, {TTP-host, {1,..., N}}, based upon ther real-tme transactonal behavour and relablty to assst a moble agent to perform securty senstve tasks, two algorthms are requred. The frst, called TTP-hosts Subgroup Selecton (TSS) algorthm, allows the agent owner to select a subset of Y (<N) most trustworthy TTP-hosts from N avalable ones. The second algorthm, called Trust and Relablty Updatng (TRU) algorthm, allows the agent owner to evaluate and assgn trust and relablty values to each TTP-host that has taken part n a transacton based upon the feedback receved from hs/her merchant host. The two algorthms consttute our dstrbuted reputaton management scheme. 4.1 Assumptons The Dstrbuted Reputaton Management Scheme s desgned based upon the followng assumptons: The agent owner mantans a table TA (Trust Assessment) contanng trust and relablty values assocated wth each of the TTP-hosts that the agent owner has dealt wth n the past perod T h. An example TA s gven n Table 1. In the table, each row corresponds to one TTP-host contanng eght attrbutes: {TTP -ID, Trust, Rel, Sat, TotalTran, T-C, R-C, Fee}. The TTP -ID s the unque dentfer of host TTP-host, e.g. ts dstngushed name 1 [ITU-T 1997]. Trust and Rel are ts aggregated trust and relablty values, respectvely. The Trust attrbute ndcates the level of TTP-host s trustworthness (or honesty) n performng ts job. The Rel attrbute ndcates ts relablty level n servce provson. It s assumed that the ntal values of Trust and Rel are set to zeros ndcatng that the agent owner has not yet had any experence n dealng wth the TTPhost. These ntal values are greater than the values ndcatng a malcous TTP-host ( -1). In ths way, a newly deployed TTP-host wll not be treated unfarly. Sat refers to the average value of Trust and Rel,.e. Sat = Ω Trust + λ Rel, where Ω + λ = 1. The parameters, Ω and λ, represent the mpacts of Trust and Rel n calculatng the value of Sat, respectvely. The choce of values gven to these parameters s of the agent owner s preferences. For example, f an agent owner feels that Trust should wegh more than Rel, then he may assgn 0.7 for Ω and 0.3 for λ (these values are used n the example gven n table 1). The hgher the value of Sat, the more confdence the agent owner has n the TTPhost. TotalTran refers to the total number of transactons taken part by the TTP-host wth the agent owner durng the past perod T h. T-C s the total number of transactonal responses sent by TTP-host, whch have faled to pass the ntegrty verfcaton. R-C s the total number of occasons when TTP-host I fals to respond durng the perod. Fee specfes the amount of money TTP-host charges for provdng the TTP servce [Wang et al. 2005]. Ths attrbute may nfluence an agent owner s decson as whether or not a partcular TTP-host should be chosen to jon the AS (Actve Subgroup) lst. We also assume that table TA s sorted n a descendng order accordng to the satsfacton (Sat) values. Thus, the TTP-host wth the hghest satsfacton value shall be n the frst row of the table. The agent owner may decde an upper-lmt for the trust and relablty values accordng to hs/her preferences. Table 1. An example of a sngle row n table TA TTP -ID Trust Rel Sat TotalTran T-C R-C Fee VerSgn Lmted 3. IT Department 4. South Melbourne 5. Vctora 6. AU The agent owner also mantans a table MR (Merchant Reputaton) contanng reputaton values assocated wth each of the merchants that the agent owner has dealt wth n the past tme perod T m. As shown n table 2, each row of the MR table corresponds to one merchant contanng two attrbutes: {Merchant -ID, Rep }. Merchant -ID 1 The dstngushed name specfed n [3] conssts manly of sx felds: Common name (CN), Organsaton Name (O), Organsaton Unt (OU), Localty (L), State (S), and Country (C). Page 157

5 Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons s the merchant s unque dentfer. Smlarly, the dentfer can be the dstngushed name of the merchant. Rep specfes the level of reputaton Merchant has accumulated from ts prevous dealngs wth the agent owner durng perod T m. The ntal value assgned to Rep s zero (neutral), whch ndcates that the agent owner has no experence n dealng wth the Merchant yet. The value of Rep s updated by the agent owner as follows: +1 s added f the transacton outcome s postve, 0 f no response s receved from the merchant, and -1 f the transacton outcome s negatve. Table MR, mantaned by the agent owner, represents only the agent owner s opnon on the merchants he has dealt wth. Alternatvely, table MR may be stored at a publcly accessble server, n whch case the value Rep can be modfed by multple authorzed agent owners or customers. In the latter case, Rep wll represent the accumulated opnon about Merchant among the communty. The choce of the locaton of the MR table,.e. at the agent owner sde or n a publc server, s left to the users preferences. In our scheme, we adopt the former approach where the agent owner mantans ts own table MR. Table 2. An example of a table MR Merchant ID DSG Retal Lmted 3. Sales Department 4. Hemel Hempstead 5. Hertfordshre 6. UK Rep 2 The merchant, once agreed on a deal wth the moble agent, creates a table, TM, contanng the trust and relablty values for all the partcpatng TTP-hosts. Each entry n the table, correspondng to a TTP-host, conssts of three attrbutes: the frst refers to the TTP-host s ID; the second s ts trust value; and the thrd s ts relablty value. The trust attrbute wll be assgned wth one of the followng values (Yes, No, Unknown) and the relablty attrbute wll be assgned wth ether Yes or No, dependng on the outcome of the transacton nvolved wth the TTP-host. Table 3 gves an example of value settngs for table TM. Table 4 summarzes exemplar scenaros for the transacton outcomes and the trust and relablty values assocated to these outcomes. Table 3. An example of table TM Trust Rel TTP 1 -ID No Yes TTP 2 -ID Unknown No. TTP N -ID Yes Yes Table 4. The value settng for Trust and Relablty n varous scenaros Metrc Values Scenaros Trust Rel Yes No Unknown Yes No TTP-host sends a vald expected data to the merchant host. TTP-host sends an nvald expected data, or an unexpected data, or smply a token that cannot pass a specfed verfcaton, to the merchant host. The merchant has not receved a response from the TTP-host durng the protocol run. Therefore, he cannot make judgment whether ths TTP-host s trustworthy or not. The merchant host has receved a response, ether postve or negatve, from TTP-host. The merchant host has not receved any response from TTP-host durng the protocol run even f repeated requests have been made. Ths may be due to that the TTP-host s out of servce or the communcaton lnk between the merchant host and the TTP-host s broken down, etc. Once the values n the table are set, the merchant then passes t to the agent owner, va the moble agent, for hm to update table TA accordngly. Tables TA and MR are controlled by the valdty perods T h and T m, respectvely, to mantan the freshness of the relevant data and to reduce memory and computatonal expenses The TTP-hosts Subset Selecton (TSS) Algorthm Page 158

6 Journal of Electronc Commerce Research, VOL 7, NO.3, 2006 When an agent owner s ready to delegate a sgnature-sgnng task to hs agent, the frst thng s/he needs to do s to decde a subgroup of TTP-hosts that wll take part n performng the task collectvely and jontly wth the agent. Ths subgroup s called the actve subgroup (AS). To select the AS, the agent owner specfes a reputaton threshold Thr1 that s proportonal to the transacton value to be undertaken. Table 5 shows exemplar settngs of Thr1 n relaton to transacton values. Table 5. Exemplar settngs of Thr1 Transacton value Thr1 < From the table, t can be seen that the hgher the transacton value the hgher the threshold Thr1 should be. The TSS algorthm then takes Thr1 and table TA as ts parameters to generate one or more (N>a subset >1)) TTPhosts such that ther aggregated Satsfacton value, computed usng equaton (1), s equal to or greater than Thr1. That s, Agg = j = 1 Sat (1) where, j s the number of TTP-hosts n the AS lst. The selecton process uses a top-down approach choosng the most trustworthy host frst. Ths decson s made ntutvely and other orders of selecton are possble dependng on customers preferences. If the frst TTP-host chosen has the satsfacton level that matches wth the threshold correspondng to the transacton value, then ths sngle TTP-host s suffcent. Otherwse, more TTP-hosts are chosen untl ther aggregated Satsfacton value reaches or exceeds Thr1. The pseudo code for the TSS algorthm s gven below. TTP-hosts Subset Selecton (TSS) Algorthm Input: table TA, Thr1 Output: AS member(s) Method: Intalze Agg to 0 For each row n TA do Compute Agg = Agg + Sat /* the Satsfacton value for TTP-host s added to the aggregated average Agg */ Insert TTP -ID n AS lst Increment TotalTran If Agg equals to or greater than Thr1 then Ext the loop Else Increment and start the next loop teraton As the members of the AS lst are chosen as the most trusted and relable among all N TTP-hosts, they are most lkely to perform the transacton securely and relably. In addton, accordng to the algorthm, the hgher the transacton value, the hgher the threshold Thr 1 wll be. As a result, the more TTP-hosts wll be selected to execute the transacton. It s therefore more dffcult for any sngle TTP-host to successfully forge a proxy sgnature or to manpulate the transactonal process. In other words, the transacton outcome wll be more lkely to come to a satsfactory concluson The Trust and Relablty Updatng (TRU) Algorthm The TRU algorthm s used by an agent owner to update trust and relablty values for each TTP-host upon the completon of each transacton. A merchant, once agreed on a deal wth the moble agent, creates a table TM and flls t wth the trust and relablty values of all the partcpatng TTP-hosts dependng on the transacton outcome, as descrbed n Secton 4.1. The merchant then passes table TM to the moble agent. Page 159

7 Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons The agent then comes back from the shoppng trp wth the TM table and submts t to the agent owner. The agent owner refreshes the contents of table TA accordng to the values receved n table TM by executng the TRU algorthm that takes tables TM, TA and the merchant s ID (Merchant-ID) as ts nput parameters. The algorthm performs a search to fnd a TTP-host n table TA untl a matchng TTP-host s found. Once found, the algorthm updates the Trust and Relablty values assocated wth the TTP-host n TA accordng to the values n TM and the reputaton value Rep k of the merchant Merchant k -ID (extracted from table MR) usng the equatons gven n table 6. Table 6. Equatons for updatng Trust and Relablty value n TA Values n TM Updates n table TA Yes NewTrust = OldTrust + (( Rep )/TotalTran ) k Trust No NewTrust = OldTrust (( Repk )/ TotalTran ) Unknown NewTrust = OldTrust Yes NewRel = OldRel + (( Repk )/ TotalTran ) Rel No NewRel = OldRel (( Rep )/ TotalTran ) k NewTrust s the latest value assgned to Trust n table TA. OldTrust refers to the aggregated Trust value from all prevous transactons. In other words, t s the value mantaned n table TA before ths transacton takes place. The same nterpretaton s applcable to NewRel and OldRel. If the total number of untrustworthy or unrelable transactons, as ndcated by T-C or R-C, reaches a certan threshold Thr 2, then the maxmum penalty γ, e.g. γ = -5, s appled to the values of NewTrust or NewRel, accordngly. ndcates a rsk factor specfed by the agent owner and t s n proportonal to the transacton value. The pseudo code for the TRU algorthm s gven as follows. Trust and Relablty Updatng (TRU) algorthm Input: table TM, table TA,, Thr 2, γ, Merchant-ID Output: updated table TA Method: Intalze k and to 0 For each row k n MR Search for Merchant k -ID that matches Merchant-ID If Found then /* Fetch the reputaton value assocated wth Merchant k -ID */ Rep = Rep k Ext the loop Increment k and start the next loop teraton For each row n TA Search for TTP -ID that matches TTP -ID n TM If Found then /* Update the Trust value n table TA */ If Trust _TM s Yes then NewTrust _TA = OldTrust _TA + (( Rep)/TotalTran ) If Trust _TM s No then Increment T-C If T-C = Thr 2 then Trust _TA = γ Else NewTrust _TA = OldTrust_TA - (( If Trust _TM s Unknown NewTrust = OldTrust Rep)/TotalTran ) /* Update the Relablty value n table TA */ If Rel _TM s Yes then NewRel _TA = OldRel _TA + (( Rep)/TotalTran ) If Trust _TM s No then Increment R-C Page 160

8 Journal of Electronc Commerce Research, VOL 7, NO.3, 2006 If R-C = Thr 2 then Else Rel _TA = γ NewRel _TA = OldRel_TA - (( Rep)/TotalTran ) An mportant feature of ths algorthm s that the step value of award/penalty for Trust and Relablty s not lnear. It gets smaller as the number of transactons performed by the TTP-host gets larger. In addton, the step value s also lnked to the transacton value through rsk factor. The larger the transacton value, the hgher the rsk the agent owner has to endure, and the more reward/penalty the TTP-host wll get shall the transacton succeed/fal. If a TTP-host repeatedly msbehaves or are unrelable, say, for Thr 2 tmes, ts Trust or Relablty values wll drop to γ. Furthermore, the step value s weghed accordng to the reputaton (Rep k ) of the source of the feedback (Merchant k ). A feedback from a hghly reputable merchant weghs more than that from a less reputable one. We beleve that these features have captured users expectaton and acceptance n real lfe. The followng example llustrates the mplcatons of these features. When a customer has performed many vald deals wth a specfc merchant, the customer wll be less lkely to move away from ths merchant f only a couple of deals wth small values (small ) have ended up n an unsatsfactory manner. However, havng a transacton wth a large value gone wrong may completely put the customer off. Ths s why the effect of a transacton outcome on the overall Trust or Relablty value and subsequently the satsfacton (.e. the reputaton) of a TTP-host should be dependent on the three factors: the value of a transacton; the total number of transactons that have been performed n the past perod concerned; and the reputaton of the merchant host. The two algorthms mentoned above jontly facltate ths non-lnear reputaton model. Accordng to our best knowledge, there has not been any such non-lnear reputaton model proposed n the lterature. 4.4 A workng example In ths secton, we use a workng example to llustrate the use of the TSS and TRU algorthms. The example wll show the state of the TA table before and after performng a partcular transacton by the agent owner. Let us assume the agent owner has been dealng wth four TTP-hosts n past tme perod T. The parameters Ω and λ are each assgned wth the value of 0.5. Table 7 shows the nformaton correspondng to each of the four TTP-hosts n table TA. Table 7. table TA pror to performng the transacton TTP-ID Trust Rel Sat TotalTran T-C R-C TTP TTP TTP TTP The agent owner now wants hs agent to perform a transacton worth of 150 on hs behalf, so the value of Thr 1 s set to 4. The TSS algorthm n ths case wll generate an AS lst, contanng only TTP 1 as ths TTP-host s satsfacton value (Sat) alone s greater than Thr 1. (It s worth notng that, f the transacton value s 2000, then Thr 1 would be 20, and the outcome of executng TSS algorthm wll be an AS lst contanng the frst three TTPhosts n table TA as ther aggregated Satsfacton value (23) s greater than Thr 1 ). The agent owner wll set the values of the requred parameters as follows: Thr 2 = 5, = 4, and γ = -5. Once the transacton s performed, the agent comes back wth a TM table (gven by Merchant that the agent has performed the transacton wth). Table 8 shows the contents of table TM. Table 8. Table TM receved from Merchant TTP-ID Trust Rel TTP 1 Yes Yes TTP 2 No Yes TTP 3 Unknown No The agent owner wll pck up Merchant s reputaton value Rep from table MR, whch s n ths example set as 6. Then the agent owner wll update table TA by executng the TRU algorthm. The updated TA s shown n table 9. Page 161

9 Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons Table 9. Table TA after performng the transacton TTP-ID Trust Rel Sat TotalTran T-C R-C TTP TTPB TTP TTP Concluson In ths paper, we have crtcally analysed the related work n the topc area of dstrbuted reputaton management. Based upon the analyss, fve mportant reputaton metrcs are defned to acheve a farer evaluaton of one s reputaton. A novel Dstrbuted Reputaton Management scheme s subsequently desgned based upon these metrcs. The scheme allows a party A, e.g. a customer, to dstrbute a securty senstve task among several most trustworthy TTP-hosts. Ths s acheved by frst choosng a subset of TTP-hosts wth the hghest trust and relablty levels. The scheme then credts/penalzes each TTP-host accordng to the feedback receved by A from party B, e.g. a merchant. Incorporatng ths reputaton management scheme n e-commerce applcatons can not only support secure delegaton of securty senstve tasks, such as sgnature sgnng, but also deter cheatng or msbehavng by e-commerce partcpants, thus mprovng our e-busness envronment. In addton, the dstrbuted dea used n the scheme allows the provson of robust securty servces As our future work, we plan to buld an agent-based sgnature delegaton framework by ntegratng the Dstrbuted Reputaton Management scheme wth the agent-based threshold proxy sgnature scheme proposed n [Obamasak 2004] to facltate robust and secure agent-based e-commerce actvtes. REFERENCES Bamasak, O. and N. Zhang, A Secure Proxy Sgnature Protocol for Agent-Based M-Commerce Applcatons, Proceedngs of the 9 th IEEE Symposum on Computer and Communcatons, IEEE Computer Socety, pp , Alexandra, Egypt, July Bryant, A. and B. Colledge, "Trust n Electronc Commerce Busness Relatonshps," Journal of Electronc Commerce Research, Vol. 3, No. 2, pp , ebay, Avalable at (accessed ). ITU-T Recommendaton X.500, ISO/IEC , 1997, Informaton technology - Open Systems Interconnecton - The Drectory: Overvew of concepts, models and servces. Jøsang, A. and R. Ismal, The Beta Reputaton System, Proceedngs of the 15 th Bled Electronc Commerce Conference, Bled, Slovena, Ketchpel, S. and H. Garca-Molna, Makng Trust Explct n Dstrbuted Commerce Transactons, Proceedngs of the 16 th IEEE Internatonal Conference on Dstrbuted Computng Systems (ICDCS96), pp , Km, H., J. Baek, B. Lee and K. Km, Secret Computaton wth Secrets for Moble Agent usng One-Tme Proxy Sgnature, Proceedngs of the 2001 Symposum on Cryptography and Informaton Securty (SCIS2001), pp , Km, D. and I. Benbasat, "Trust-Related Argument n Internet Stores: A Framework for Evaluaton," Journal of Electronc Commerce Research, Vol. 4, No. 2, pp 49-64, Kotzankolaou, P., M. Burmester, and V. Chrsskopoulos, Secure Transactons wth Moble Agents n Hostle Envronments, Proceedngs of the Ffth Australan Conference on Informaton Securty and Prvacy (ACISP 2000), LNCS, Vol. 1841, pp , Lee, B., H. Km and K. Km, Strong Proxy Sgnature and ts Applcatons, Proceedngs of the 2001 Symposum on Cryptography and Informaton Securty (SCIS2001), pp , Malaga, R., Web-based Reputaton Management Systems: Problems and Suggested Solutons, Electronc Commerce Research, Vol. 1, pp , Mambo, M., K. Usuda and E. Okamoto, Proxy Sgnatures for Delegatng Sgnng operaton, Proceedngs of the Thrd ACM Conference on Computers and Communcatons Securty, pp , 1996a. Mambo, M., K. Usuda and E. Okamoto, Proxy Sgnature: Delegaton of the Power to Sgn Messages, IEICE Trans. Fundamentals, E79-A, pp , 1996b. Marsh, S. P., Formalzng trust as a computatonal concept, Ph.D. Thess, Unversty of Strlng, Strlng, UK, Reagle, J. M., Trust n a cryptographc economy and dgtal securty deposts: Protocols and polces, Master Thess, Massachusetts Insttute of Technology, Cambrdge, MA, Page 162

10 Journal of Electronc Commerce Research, VOL 7, NO.3, 2006 Sander, T. and C. Tschudn, Protectng Moble Agents aganst Malcous Hosts, Moble Agents and Securty, LNCS, Vol. 1419, pp , Wang, C. L., L. Ye, Y. Zhang and D. Nguyen, "Subscrpton to Fee-Based Onlne Servce: What Makes Consumer Pay for Onlne Content?," Journal of Electronc Commerce Research, Vol. 6, No. 4, pp , Xong, L. and L. Lu, A Reputaton-Based Trust Model for Peer-to-Peer ecommerce Communtes, Proceedngs of the IEEE Internatonal Conference on E-Commerce (CEC 03), pp , Yahoo! Auctons, Avalable at (Accessed 20/8/2004). Zachara, G. and P. Maes, Trust Management through Reputaton Mechansms, Appled Artfcal Intellgence, Vol. 14, pp , Page 163

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Towards a Global Online Reputation

Towards a Global Online Reputation Hu L Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN 6N5 Canada + (63) 562 5800, 8834 Hl03@uottawa.ca Towards a Global Onlne Reputaton Morad Benyoucef Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Managing Resource and Servent Reputation in P2P Networks

Managing Resource and Servent Reputation in P2P Networks Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores guch@sl.ntt.co.jp Masayuk Terada NTT DoCoMo Multmeda Laboratores te@mml.yrp.nttdocomo.co.jp

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Trust Formation in a C2C Market: Effect of Reputation Management System

Trust Formation in a C2C Market: Effect of Reputation Management System Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons htosh@s.uec.ac.jp Kazunar Ishda Tokyo Unversty of Agrculture k-shda@noda.ac.jp Toshzum

More information

How To Get A Tax Refund On A Retirement Account

How To Get A Tax Refund On A Retirement Account CED0105200808 Amerprse Fnancal Servces, Inc. 70400 Amerprse Fnancal Center Mnneapols, MN 55474 Incomng Account Transfer/Exchange/ Drect Rollover (Qualfed Plans Only) for Amerprse certfcates, Columba mutual

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Optmal Revocatons n Ephemeral Networks

Optmal Revocatons n Ephemeral Networks Optmal Revocatons n Ephemeral Networks: A Game-Theoretc Framework Igor Blogrevc, Mohammad Hossen Manshae, Maxm Raya and Jean-Perre Hubaux Laboratory for computer Communcatons and Applcatons (LCA1), EPFL,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Resource Scheduling in Desktop Grid by Grid-JQA

Resource Scheduling in Desktop Grid by Grid-JQA The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

The EigenTrust Algorithm for Reputation Management in P2P Networks

The EigenTrust Algorithm for Reputation Management in P2P Networks The EgenTrust Algorthm for Reputaton Management n P2P Networks Sepandar D. Kamvar Stanford Unversty sdkamvar@stanford.edu Maro T. Schlosser Stanford Unversty schloss@db.stanford.edu Hector Garca-Molna

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI

ADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

GENESYS BUSINESS MANAGER

GENESYS BUSINESS MANAGER GENESYS BUSINESS MANAGER e-manager Onlne Conference User Account Admnstraton User Gude Ths User Gude contans the followng sectons: Mnmum Requrements...3 Gettng Started...4 Sgnng On to Genesys Busness Manager...7

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

PKIS: practical keyword index search on cloud datacenter

PKIS: practical keyword index search on cloud datacenter Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7

DISCLOSURES I. ELECTRONIC FUND TRANSFER DISCLOSURE (REGULATION E)... 2 ELECTRONIC DISCLOSURE AND ELECTRONIC SIGNATURE CONSENT... 7 DISCLOSURES The Dsclosures set forth below may affect the accounts you have selected wth Bank Leum USA. Read these dsclosures carefully as they descrbe your rghts and oblgatons for the accounts and/or

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt.

Solution: Let i = 10% and d = 5%. By definition, the respective forces of interest on funds A and B are. i 1 + it. S A (t) = d (1 dt) 2 1. = d 1 dt. Chapter 9 Revew problems 9.1 Interest rate measurement Example 9.1. Fund A accumulates at a smple nterest rate of 10%. Fund B accumulates at a smple dscount rate of 5%. Fnd the pont n tme at whch the forces

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things

TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Sorting Online Reviews by Usefulness Based on the VIKOR Method

Sorting Online Reviews by Usefulness Based on the VIKOR Method Assocaton or Inormaton Systems AIS Electronc Lbrary (AISeL) Eleventh Wuhan Internatonal Conerence on e- Busness Wuhan Internatonal Conerence on e-busness 5-26-2012 Sortng Onlne Revews by Useulness Based

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

10.2 Future Value and Present Value of an Ordinary Simple Annuity

10.2 Future Value and Present Value of an Ordinary Simple Annuity 348 Chapter 10 Annutes 10.2 Future Value and Present Value of an Ordnary Smple Annuty In compound nterest, 'n' s the number of compoundng perods durng the term. In an ordnary smple annuty, payments are

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Tuition Fee Loan application notes

Tuition Fee Loan application notes Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1

More information

EQUAL RATING OPPORTUNITY ANALYSIS FOR DETECTING REVIEW MANIPULATION

EQUAL RATING OPPORTUNITY ANALYSIS FOR DETECTING REVIEW MANIPULATION EQUAL RATING OPPORTUNITY ANALYSIS FOR DETECTING REVIEW MANIPULATION Yongbo Zeng, Yha Zhu, Yan (Lndsay) Sun Unversty of Rhode Island, Kngston, RI, USA Emal: {yongbozeng, yhzhu, yansun}@ele.ur.edu Abstract

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION

NEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information