On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets

Size: px
Start display at page:

Download "On Secure Network Coding with Unequal Link Capacities and Restricted Wiretapping Sets"

Transcription

1 On Secure Network Coing with Unequal Link Capacitie an Retricte Wiretapping Set Tao Cui an Tracey Ho Department of Electrical Engineering California Intitute of Technology Paaena, CA 9115, USA {taocui, Jörg Kliewer Klipch School of Electrical an Computer Engineering New Mexico State Univerity La Cruce, NM 8800, USA Abtract We are ecure network coing over network with unequal link capacitie in the preence of a wiretapper who ha only acce to a retricte number of k link in the network. Previou reult how that for the cae of equal link capacitie an unretricte wiretapping et, the ecrecy capacity i given by the cut-et boun, whether or not the location of the wiretappe link i known. The cut-et boun can be achieve by injecting k ranom key at the ource which are ecoe at the ink along with the meage. In contrat, for the cae where the wiretapping et i retricte, or where link capacitie are not equal, we how that the cut-et boun i not achievable in general. Finally, it i hown that etermining the ecrecy capacity i a NP-har problem. I. INTRODUCTION Information-theoretically ecure communication ue coing to enure that an averary eaveropping on a ubet of network link obtain no information about the ecure meage. A theoretical bai for information-theoretic ecurity wa given in the eminal paper by Wyner [1] uing Shannon notion of perfect ecrecy [], where a coet coing cheme bae on a linear maximum itance eparable coe wa ue to achieve ecurity for a wiretap channel. More recently, information-theoretic ecurity ha been tuie in network with general topologie. The ecure network coing problem wa introuce in [] for multicat wireline network where each link ha equal capacity, an a wiretapper can oberve an unknown et of up to k network link. For thi problem, contruction of information-theoretically ecure linear network coe are propoe in e.g. [] [5], where trae-off between ecurity, coe alphabet ize, an multicat rate of ecure linear network coe are coniere in [4]. In [6], [7] the work in [] i extene to multiple ource, where ranom key can now be generate at an arbitrarily given ubet of noe. Further, in [8], ecure communication i coniere for wirele eraure network. In thi paper, we conier ecure communication over wireline network with unequal link capacitie an retricte wiretapping et. In the cae of throughput optimization without ecurity requirement, the aumption that all link have Thi work ha been upporte in part by ubcontract # iue by BAE Sytem National Security Solution, Inc. an upporte by the Defene Avance Reearch Project Agency (DARPA) an the Space an Naval Warfare Sytem Center (SPAWARSYSCEN), San Diego uner Contract No. N C-01 an W911NF , by NSF grant CNS an CCF , an by Caltech Lee Center for Avance Networking. unit capacity i mae without lo of generality, ince link of larger capacity can be moele a multiple unit capacity link in parallel. However, in the ecure communication problem, uch an aumption cannot be mae without lo of generality. Inee, we how in thi paper that there are ignificant ifference between the equal capacity an unequal capacity cae. For the cae of equal link capacitie, the ecrecy capacity i given by the cut-et boun, whether or not the location of the k wiretappe link i known. The cut-et boun can be achieve by injecting k ranom key at the ource which are ecoe at the ink along with the meage []. However, we how that if the network ha unequal link capacitie an the wiretapper ha acce to an unretricte et of link in the network the cut-et boun i not achievable in general by any linear or nonlinear coing cheme. We further how that thi alo hol in the cae of an unretricte wiretapping et an equal unit link capacitie in the network. Finally, we are the complexity of etermining the ecrecy capacity if the location of the wiretapper i unknown. We how that thi problem, which i cloely relate to network interiction, i NP-har. II. NETWORK MODEL AND PROBLEM FORMULATION In thi paper we focu on acyclic graph for implicity; we expect that our reult can be generalize to cyclic network uing the approach in [9], [10] of working over fiel of rational function in an ineterminate elay variable. We moel a wireline network by a irecte acyclic graph G = (V, E), where V i the vertex et an E i the irecte ege et. There i a ource noe V an a ink noe V. Each link (i, j) E ha capacity c i,j. An eaveropper can wiretap a et A of link choen from a known collection W of poible wiretap et. Without lo of generality we can retrict our attention to maximal wiretap et, i.e. no et in W i a ubet of another. The choice of wiretap et A i unknown to the communicating noe, except where otherwie pecifie in thi paper. The ecrecy capacity i the highet poible ource-ink communication rate uch that the meage communicate i information theoretically ecret regarle of the choice of A, i.e. ha zero mutual information with the wiretapper obervation. In Section III an IV, we how that the cut-et boun i unachievable an that fining the ecrecy capacity i NP har,

2 even for the following pecial cae: 1) Scenario 1 i a wireline network with equal link capacitie, where the wiretapper can wiretap an unknown ubet of k link from a known collection of vulnerable network link. ) Scenario i a wireline network with unequal link capacitie, where the wiretapper can wiretap an unknown ubet of k link from the entire network. It i convenient to how thee reult for Scenario 1 firt, an then how the correponing reult for Scenario, by converting the Scenario 1 network coniere into correponing Scenario network for which the ame reult hol. a b c 1 4 e f g III. UNACHIEVABILITY OF CUT-SET BOUND Let S c enote the et complement of a et S. A cut for x, y V i a partition of V into two et V x an V c x uch that x V x an y V c x. For the x y cut given by V x, the cut-et [V x, V c x ] i the et of ege going from V x to V c x, i.e., [V x, V c x] = {(u, v) (u, v) E, u V x, v V c x}. (1) We can tate the following cut-et upper boun which applie to the general moel of Section II incluing both cenario 1 an : Theorem 1. Conier a network of point-to-point link, where link (i, j) ha capacity c i,j. The ecrecy capacity R i upper boune by min min c i,j. () {V : V i an cut} A W (i,j) [V,V c] Ac Thi upper boun applie whether or not the communicating noe have knowlege of the choen wiretap et A. Proof: Conier any ource-ink cut V an any wiretap et A W. Denote by X the tranmitte ignal from noe in V over link in [V, V] c an enote by Y an Z the oberve ignal from link in [V, V c] an in [V, V c ] A, repectively. We conier block coing with block length n. By the perfect ecrecy requirement H(M Z n ) = H(M) we have nr H(M Z n ) (a) H(M Z n ) H(M Y n ) + nǫ n =H(M Z n ) H(M Y n,z n ) + nǫ n =I(M;Y n Z n ) + nǫ n (b) I(X n ;Y n Z n ) + nǫ n (c) n n H(Y i Z i ) H(Y i X i, Z i ) + nǫ n, i=1 i=1 =ni(x;y Z) + nǫ n, =n (H(X Z) H(X Z,Y)) + nǫ n, =n (H(X Z) H(X Y)) + nǫ n, n max (I(X;Y) I(X;Z)) + nǫ n p(x) =n c i,j + nǫ n, (i,j) [V,V c] Ac () 5 Fig. 1. An example to how that the ecrecy rate without knowlege of wiretapping et i maller than that with uch knowlege. The wiretapper can wiretap any three of the five link in the mile layer. where ǫ n 0 a n + an (a) i ue to Fano inequality; (b) i ue to the ata proceing inequality an the fact that M X n Y n Z n form a Markov chain; (c) i ue to the efinition of the mutual information. Note that Theorem 1 i a generalization of the boun in [6] to arbitrary link capacitie. If the choice of wiretap et A i known to the communicating noe, the cut-et boun () i achievable uing a network coe that oe not en any flow on link in A. In the cae of unretricte wiretapping et an unit link capacitie, the ecrecy capacity i equal to the cut-et boun []. In contrat, we now how that the cut-et boun i not achievable in general when the wiretap et A i unknown, by coniering the example in Fig. 1, where the et of wiretappable link i retricte (Scenario 1). We ue the program Information Theoretic Inequalitie Prover (Xitip) [11] to how that the ecrecy capacity i boune away from the cut-et boun. We then convert the example into one with unequal link capacitie (Scenario ), an how the unachievability of the cut-et boun for thi cae alo. A. Retricte Wiretap Set (Scenario 1) In Fig. 1, let the mile layer link be 1-5 (from top to bottom) an the lat layer link be 6-8 (from top to bottom). All link have unit capacity. Let the ignal carrie by link i be calle ignal i, or S i. Let the ource information be enote X. For thi example, the ecrecy rate i two if any three of the five link in the mile layer are elete, i.e., the number of wiretappe link i three. The contraint require are that the ource information i a function of the ignal on the ink incoming link, an that there i zero mutual information between the ource information an the ignal on the link in each averarial ubet.

3 In thi example, the cut-et boun i. To provie intuition, we firt how that ecrecy rate cannot be achieve by uing linear coing. Thi argument can be converte to an information theoretic proof that ecrecy rate cannot be achieve uing any coing cheme [1]. Suppoe ecrecy rate i achievable with a linear network coe. Firt note that the ource cannot inject more than unit amount of ranom key, otherwie the firt layer cannot carry two unit of ource ata. Let the ranom key injecte by the ource be enote K. For the cae when the ource inject a unit amount of ecret key, we firt have the following obervation. Signal 6 mut be a function of ignal 1, otherwie if the averary ee the ignal -4 then he know ignal 6-7. Alo, ignal 8 mut be a function of ignal 5, otherwie if the averary ee ignal 1, an 4, then he know ignal 7-8. Similarly we can how that ignal 8 mut be a function of ignal 1, an ignal 7 mut be a function of ignal. We conier the following two cae. Cae 1: ignal 5 i a linear combination of ignal preent at the ource noe. To achieve the full key rank conition on link 1, an 5, the top econ layer noe (a) mut put inepenent local key k 1 an k on link 1 an repectively. Link 7, whoe other input i inepenent of k, i then a function of k. Similarly, Link 8 i a function of k 1. Thi mean that the lat layer ha two inepenent local key on it. Cae : ignal 5 i a linear combination of ignal preent at the ource noe a well a a local key k injecte by the bottom econ layer noe (c). Cae a: k i alo preent in ignal 1. Then k i preent in ignal 6, an i inepenent of the key preent in ignal 7. Cae b: k i not preent in ignal 1. Then k i preent in ignal 8, an i inepenent of the key preent in ignal 7. From Cae 1, a, an b, we conclue that the ecrecy rate without knowlege of the wiretapping et by uing only linear network coing i le than two. We can alo how that the ecrecy rate i boune away from by uing the framework for linear information inequalitie [1]. Let X be the meage ent from the ource an Z i, i = 1,..., be the ignal on the link ajacent to the ource. We want to check whether H(X) ω i implie by (1) H(Z i ) 1, H(S j ) 1, i = 1,...,, j = 1,...,8, () H(X S 6, S 7, S 8 ) = 0, () I(X, Z 1, Z, Z, S 4, S 5, S 7, S 8 ; S 6 S 1, S, S ) = 0, (4) I(X, Z 1, Z, Z, S 1, S, S 5, S 6, S 8 ; S 7 S, S 4 ) = 0, (5) I(X, Z 1, Z, Z, S, S, S 6, S 7 ; S 8 S 1, S 4, S 5 ) = 0, (6) I(X; S 1, S, S ) = 0, I(X; S 1, S, S 4 ) = 0, (7) I(X; S 1, S, S 5 ) = 0, I(X; S 1, S, S 4 ) = 0, (8) I(X; S 1, S, S 5 ) = 0, I(X; S 1, S 4, S 5 ) = 0, (9) I(X; S, S, S 4 ) = 0, I(X; S, S, S 5 ) = 0, (10) I(X; S, S 4, S 5 ) = 0, I(X; S, S 4, S 5 ) = 0, (11) I(S 1 ; Z Z 1, Z ) = 0, I(S ; Z, Z Z 1 ) = 0, (1) I(S ; Z Z 1, Z ) = 0, I(S 4 ; Z 1, Z Z ) = 0, (1) I(S 5 ; Z 1, Z Z ) = 0, I(S 1 ; S 4 Z 1, Z, Z ) = 0, (14) I(S ; S 4, S 5 Z 1, Z, Z ) = 0, I(S ; S 5 Z 1, Z, Z ) = 0, (15) I(S 4 ; S 1, S, S 5 Z 1, Z, Z ) = 0, I(S 5 ; S, S, S 4 Z 1, Z, Z ) = 0, (16) I(S 1, S, S, S 4, S 5 ; X Z 1, Z, Z ) = 0, where the firt inequality i the capacity contraint, the econ contraint how that the ink can ecoe X, contraint () to (5) mean that the ignal in the lat layer are inepenent of other ignal given the incoming ignal from the mile layer, contraint (6) to (10) repreent the ecrecy contraint when any three link in the mile layer are wiretappe, an contraint (11) to (16) repreent the conitional inepenence between the ignal in the firt layer an thoe in the mile layer. In particular, (16) how that X (Z 1, Z, Z ) (S 1,..., S 5 ) form a Markov chain. Note that contraint () to (5) an (11) to (16) implicitly allow ome ranomne to be injecte at the correponing noe. We ue the Xitip program [11], which relie on the framework in [1], to how that H(X) 5/ i implie by the et of equalitie (4). Therefore, 5/ i an upper boun on the ecrecy rate when the location of wiretapper i unknown, which i le than the ecrecy rate achievable when uch information i known. B. Unequal Link Capacitie (Scenario ) We next how that the unachievability of the cut-et boun alo hol for the ecure network coing problem with unequal link capacitie (Scenario ). We convert the example of Fig. 1 by partitioning each non-mile layer link into 1 ǫ parallel mall link each of which ha capacity ǫ. Any three link can be wiretappe in the tranforme graph. For the cae where the location of the wiretap link i known, eleting any k (k ) non-mile layer link reuce the max flow by at mot k ǫ. When k = 0, the mincut i. When k 1 or at mot mile layer link are wiretappe, the min-cut between the ource an the ink i at leat after eleting thee wiretappe mile layer link, an the min-cut i at leat k ǫ ǫ after further eleting the k 1 non-mile layer link. Therefore, the cut-et boun i at leat ǫ. For the cae where the location of the wiretap link i unknown, we prove the unachievability of the cut-et boun in the tranforme network. Firt, conier the tranforme network with the retriction that the wiretapper can only wiretap any link in the mile layer. The optimal olution i exactly the ame a for the original network of the previou ubection, an achieve ecrecy rate at mot 5/. Now, conier the tranforme network without the retriction on wiretapping et, i.e., the wiretapper can wiretap any link in the entire network. A wiretapping only the mile layer link i a ubet of all poible trategie that the wiretapper can have, the ecrecy rate in the tranforme network i le than or equal to that in the former cae, which i trictly maller than the cut-et boun for ǫ trictly maller than 1 9. Therefore, the cut-et boun i till unachievable when the wiretap link are unretricte in the tranforme graph. (4)

4 1 a c x 4 ia ib j1 t 1 1 b y (a) Original Graph H ic ix j j i a iy j4 10 i b j 1 i c i x i y j j j 4 (b) Tranforme Graph G H Fig.. Example of NP-harne proof for the cae with knowlege of the wiretapping et. IV. NP-HARDNESS We how in the following that etermining the ecrecy capacity i NP-har by reuction from the clique problem, which etermine whether a graph contain a clique 1 of at leat a given ize r. From Section III, fining the ecrecy capacity when the location of the wiretap link i known to the communicating noe i the ame a the NP-har network interiction problem [14], which i to minimize the maximum flow of the network when a given number of link in the network i remove. To how that the cae where the location of the wiretap link i unknown i NP-har, we ue the contruction in [14] howing that for any clique problem on a given graph H, there exit a correponing network G H whoe ecrecy capacity i r when the location of the wiretap link i known if an only if H contain a clique of ize r. We then how that for all uch network G H, the ecrecy capacity for the cae when the location of the wiretap link i unknown i equal to that for the cae when uch information i known. We briefly ecribe the approach in [14] in the following. Given an unirecte graph H = (V h, E h ), we will efine a capacitate irecte network ĜH uch that there exit a et of link  in ĜH containing le than or equal to E h ( r link uch that Ĝ H  ha a maximum flow of r if an only if H contain a clique of ize r. For a given unirecte graph H = (V h, E h ) without parallel ege an elf loop, we create a capacitate, irecte graph G H = (N, A) a follow: For each ege e E h create a noe i e in a noe et N 1 an for each vertex v V h create a noe j v in a noe et N. In aition, create ource noe an etination noe. For each ege e E h, irect an arc in G H from to i e 1 A clique in a graph i a et of pairwie ajacent vertice, or in other wor, an inuce ubgraph which i a complete graph. ) Fig.. Illutration of Strategy 1. In thi figure, k = an only the 5 link in the firt layer can be wiretappe. with capacity an call thi et of arc A 1. For each ege e = (u, v) E h, irect two arc in G H from i e to j v an j u with capacity 1, repectively an call thi et of arc A. For each vertex v V h, irect an arc with capacity 1 from j v to. Let thi be the et of arc A. Thi complete the contruction of G H = (N, A) = ({} {} N 1 N, A 1 A A ). In Fig., we give an example of the graph tranformation, where H = ({1,,, 4}, {a, b, c, x, y}). We replicate [14, Lemma ] a follow. Lemma 1. Let G H be contructe from H a above. Then, there exit a et of arc A 1 A 1 with A 1 = E h ( ) r uch that the maximum flow from to in G H A 1 i r if an only if H contain a clique of ize r. After obtaining G H, we generate ĜH by replacing each arc (i e, j v ) with E h parallel arc each with capacity 1/ E h an call thi arc et Â. We carry out the ame proceure for arc (j v, ) an call thi arc et Â. Then ĜH = (N, A) = ({} {} N 1 N, A 1  Â). For the cae when the location of wiretap link i known, it i hown in [14] that the wort cae wiretapping et  mut be a ubet of A 1. By uing Lemma 1, thi cae i NP-har. Now, we conier the cae where the wiretapping et i unknown, an how that the ecrecy capacity of ĜH when the wiretapper accee any unknown ubet of k = E h ( ) r link i r if an only if H contain a clique of ize r. We ue the following achievability reult from [15], which ue a trategy where ranom key injecte by the ource are either cancele at intermeiate noe or ecoe by the ink: Strategy 1 achievable rate: Connect each ubet of link A W in the network G to a virtual noe t A, an connect both t A an the actual ink to a virtual ink A. Let R A be the minimum cut capacity between an t A. The virtual link between t A an A ha capacity R A, an the virtual link between the actual ink an A ha capacity R. Thi i illutrate in Fig.. If the min-cut between the ource an each virtual receiver A i at leat R + R A, the ecrecy rate R i achievable. From Lemma 1, the conition that H contain a clique of ize r i equivalent to the conition that the max-flow to the ink in G H after removing any k link from A 1 i r. We now how that the latter conition i equivalent to the conition t 10

5 that the ecrecy capacity of G H when the wiretapper accee any unknown ubet of k link from A 1 i r. We create a virtual ink connecting each ubet of k link from A 1 an the actual ink. A the wiretappe link are connecte to the ource irectly, the min-cut between each virtual ink an the ource i at leat k + r. Since r i the cut-et upper boun on the ecrecy rate, by uing Strategy 1 the ecrecy rate r i achievable, which i equal to the ecrecy rate when the location of wiretap link i known. Finally, we how that the ecrecy capacity of G H when any k link of A 1 are wiretappe (cenario 1) i equal to the ecrecy capacity of ĜH when any k link are wiretappe (cenario ). Since each econ layer link ha a ingle firt layer link a it only input, wiretapping a econ layer link yiel no more information to the wiretapper than wiretapping a firt layer link. When ome link in the thir layer are wiretappe, let the wiretapping et be  =  1  where  1 an  1 k 1. Thu A 1  1 contain at leat ( r ) +1 arc. We create noe t   with their correponing incient link a ecribe in Strategy 1. A removing link in A 1 i equivalent to removing link in H, after removing link in H correponing to  1, H contain a ubgraph H 1 containing ( r ) ege plu at leat an ege e = (u, v). Cae 1: H 1 i a clique of ize r. In thi cae, the number of vertice with egree greater than 0 in H 1 e i r +. Cae : H 1 i not a clique. H 1 contain at leat r+1 vertice with egree greater than 0. Accoring to [14, Lemma 1], the max-flow in G H i equal to the number of vertice in H with egree greater than 0. In both cae, the max-flow of G H after removing link in  1 i at leat r + 1. Let R  be the max-flow capacity from the ource to  in G H  1. We can ue a variant of the For-Fulkeron (augmenting path) algorithm, e.g., [16], a follow to contruct a maxflow ubgraph D from to  in GH  1 atifying the property that after removing D from G H  1, the min-cut between an i at leat r + 1 R  r + 1  / E h r + 1 ( E h 1)/ E h > r, (5) where we have ue  E h 1. Coniering the network G H  1 with all link irection revere, we contruct augmenting path via epth firt earch from to, tarting firt by contructing augmenting path via link in Â, until we obtain a et of path correponing to a max flow of capacity R  between an Â. We a further augmenting path until we obtain a max flow (of capacity at leat r+1) between an, which may caue ome of the path travering link in  to be reefine while not changing their total capacity. The ubgraph D conit of the final et of path travering link in Â. Thu, the path remaining after removing D have a total capacity lower boune by (5). Therefore, the min-cut between the ource an in G H   1 D i at leat r, an the min-cut between the ource an in G H i at leat r + R   + R 1  = r + R Â. By uing Strategy 1, a ecure rate of r i achievable when  i wiretappe. Thu, the ecrecy rate for the cae when the location of the wiretap link i unknown i equal to that for the cae when uch information i known with an unretricte wiretapping et. We have thu prove the following theorem. Theorem. For a ingle-ource ingle-ink network coniting of point-to-point link an an unknown wiretapping et, computing the ecrecy capacity i NP-har. V. CONCLUSION We have coniere ecure network coing in the preence of a wiretapper. In contrat to previou reult for network with equal capacity link an unretricte wiretapping et for which the cut-et boun i ientical to the ecrecy capacity, we have hown for a imple example network that the ecrecy capacity i trictly maller than the cut-et boun if the network ha equal capacity link an the wiretapper ha only acce to a retricte wiretapping et. In aition, bae on thi reult we have alo hown that the cut-et boun i not achievable in general if the wiretapping et i unretricte but the network conit of link of unequal capacity. Finally, we have aree the complexity of etermining the ecrecy capacity if the location of the wiretapper i unknown. It i hown that thi problem, which i cloely relate to network interiction, i NP-har. REFERENCES [1] A. Wyner, The wire-tap channel, Bell Sytem Technical Journal, vol. 54, no. 8, pp , Oct [] C. E. Shannon, Communication theory of ecrecy ytem, Bell Syt.Tech. J., vol. 8, pp , [] N. Cai an R. Yeung, Secure network coing, in Proc. of IEEE ISIT, June 00, p.. [4] J. Felman, T. Malkin, R. Serveio, an C. Stein, On the capacity of ecure network coing, in Proc. of Allerton Conference on Communication, Control, an Computing, Sept [5] S. Y. El Rouayheb an E. Soljanin, On wiretap network II, in Proc. of IEEE ISIT, Nice, France, June 007, pp [6] N. Cai an R. W. Yeung, A ecurity conition for multi-ource linear network coing, in Proc. of IEEE ISIT, Nice, France, June 007, pp [7] Z. Zhang an R. Yeung, A general ecurity conition for multi-ource linear network coing, in Proc. of IEEE ISIT, Seoul, Korea, June 009, pp [8] A. Mill, B. Smith, T. Clancy, E. Soljanin, an S. Vihwanath, On ecure communication over wirele eraure network, in Proc. of IEEE ISIT, July 008, pp [9] R. Koetter an M. Méar, An algebraic approach to network coing, IEEE/ACM Tran. Networking, vol. 11, no. 5, pp , Oct. 00. [10] T. Ho, M. Méar, J. Shi, M. Effro, an D. R. Karger, On ranomize network coing, in Proc. of Allerton Conference on Communication, Control, an Computing, Sept. 00. [11] Xitip - information theoretic inequalitie prover, [1] T. Cui, Coing for wirele broacat an network ecrecy, Ph.D. iertation, California Intitute of Technology, 009. [1] R. W. Yeung, A framework for linear information inequalitie, IEEE Tran. Inform. Theory, vol. 4, no. 6, pp , Nov [14] R. K. Woo, Determinitic network interiction, Mathematical an Computer Moeling, vol. 17, no., pp. 1 18, 199. [15] T. Cui, T. Ho, an J. Kliewer, Achievable trategie for ecure network coing for general network, in Information Theory an Application Workhop, 010. [16] B. C. Dean, M. X. Goeman, an N. Immorlica, Finite termination of augmenting path algorithm in the preence of irrational problem ata, Lecture Note in Computer Science, pp , 006.

Achievable Strategies for General Secure Network Coding

Achievable Strategies for General Secure Network Coding Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

On Secure Network Coding With Nonuniform or Restricted Wiretap Sets

On Secure Network Coding With Nonuniform or Restricted Wiretap Sets 166 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 On Secure Network Coding With Nonuniform or Restricted Wiretap Sets Tao Cui, Student Member, IEEE, TraceyHo, Senior Member, IEEE,

More information

On Secure Communication over Wireless Erasure Networks

On Secure Communication over Wireless Erasure Networks On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Latitude dependence of the maximum duration of a total solar eclipse

Latitude dependence of the maximum duration of a total solar eclipse Latitue epenence of the axiu uration of a total olar eclipe Author: Jen Buu, with aitance fro Jean Meeu Contact: 6 Baker Street, Gayton, Northant, NN7 3EZ, UK jbuu@btinternet.co Introuction It i well known

More information

Salesforce Compensation: An Analytical and Empirical Examination of the Agency Theoretic Approach

Salesforce Compensation: An Analytical and Empirical Examination of the Agency Theoretic Approach Saleforce Compenation: An Analytical an Empirical Examination of the Agency Theoretic Approach Sanjog Mira, Anne Coughlan an Charavarthi Naraimhan 1 Forthcoming in Quantitative an Mareting Economic 1 Sanjog

More information

Bob York. Simple FET DC Bias Circuits

Bob York. Simple FET DC Bias Circuits Bob York Simple FET DC Bia Circuit Loa-Line an Q-point Conier the effect of a rain reitor in the comnon-ource configuration: Smaller + g D out KL: Thi i the equation of a line that can be uperimpoe on

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

A new definition of the fractional Laplacian

A new definition of the fractional Laplacian A new efinition of the fractional Laplacian W. Chen imula Reearch Laboratory, P. O. Box. 34, NO-325 Lyaker, Norway (9 eptember 2002) Keywor: fractional Laplacian, fractional erivative, Riez potential,

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Security for Wiretap Networks via Rank-Metric Codes

Security for Wiretap Networks via Rank-Metric Codes Security for Wiretap Networks via Rank-Metric Codes Danilo Silva and Frank R. Kschischang Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario M5S 3G4, Canada, {danilo,

More information

DoSAM Domain-Specific Software Architecture Comparison Model *

DoSAM Domain-Specific Software Architecture Comparison Model * DoSAM Domain-Specific Software Architecture Comparion Moel * Klau Bergner 1, Anrea Rauch 2, Marc Sihling 1, Thoma Ternité 2 1 4Soft GmbH Mitterertraße 3 D-80336 Munich, Germany {bergner ihling}@4oft.e

More information

Weighing Risk and Uncertainty

Weighing Risk and Uncertainty Pychological Review 1995, Vol. 12, No. 2,269-283 Copyright 1995 by the American Pychological Aociation, Inc. OOM-295X/95/S3. Weighing Rik an Uncertainty Amo Tverky an Craig R. Fox Stanfor Univerity Deciion

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE

SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE SIMULATION OF DIRECT TORQUE CONTROLLED PERMANENT MAGNET SYNCHRONOUS MOTOR DRIVE Selin Özçıra Nur Bekiroğlu Engin Ayçiçek e-mail: ozcira@yiliz.eu.tr e-mail: nbekir@yiliz.eu.tr e-mail: eaycicek@yiliz.eu.tr

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

On the Connection Between Multiple-Unicast Network Coding and Single-Source Single-Sink Network Error Correction

On the Connection Between Multiple-Unicast Network Coding and Single-Source Single-Sink Network Error Correction On he Connecion Beween Muliple-Unica ework Coding and Single-Source Single-Sink ework Error Correcion Jörg Kliewer JIT Join work wih Wenao Huang and Michael Langberg ework Error Correcion Problem: Adverary

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Tripping Current and Short Circuit Current of High Voltage Tester

Tripping Current and Short Circuit Current of High Voltage Tester Tripping Current an Short Circuit Current of igh oltage Teter Xu hezhun Wang Keqin Abtract: Tripping current an hort circuit current are iportant technical pecification of high voltage teter, an frequently

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Theory. d are sparse and unrecorded datasets respectively.

Theory. d are sparse and unrecorded datasets respectively. An approach for qai-contino time-lape eimic monitoring with pare ata Aeyemi Arognmati* an Jerry M. Harri, Stanfor Univerity, California, USA Smmary An approach for qai-contino, geophyical time-lape monitoring

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure

Hole Detection for Increasing Coverage in Wireless Sensor Network Using Triangular Structure IJCSI International Journal of Computer Science Iue, Vol. 9, Iue, No, January 0 ISSN (Online): 694-084 www.ijcsi.org 3 Hole Detection for Increaing Coverage in Wirele Senor Network Uing Triangular Structure

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

Linear energy-preserving integrators for Poisson systems

Linear energy-preserving integrators for Poisson systems BIT manucript No. (will be inerted by the editor Linear energy-preerving integrator for Poion ytem David Cohen Ernt Hairer Received: date / Accepted: date Abtract For Hamiltonian ytem with non-canonical

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Providing Protection in Multi-Hop Wireless Networks

Providing Protection in Multi-Hop Wireless Networks Technicl Report, My 03 Proviing Protection in Multi-Hop Wirele Network Greg Kupermn MIT LIDS Cmrige, MA 039 gregk@mit.eu Eytn Moino MIT LIDS Cmrige, MA 039 moino@mit.eu Atrct We conier the prolem of proviing

More information

Secure Network Coding on a Wiretap Network

Secure Network Coding on a Wiretap Network IEEE TRANSACTIONS ON INFORMATION THEORY 1 Secure Network Coding on a Wiretap Network Ning Cai, Senior Member, IEEE, and Raymond W. Yeung, Fellow, IEEE Abstract In the paradigm of network coding, the nodes

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Development Progress

Development Progress H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

The main objective is to maximize the throughput of the traffic.

The main objective is to maximize the throughput of the traffic. Chater 7 Flow Problem 7. Introduction and definition Problem related to tranort have been invetigated ince the early fiftie. The roblem i to route ome good, called commoditie, from roduction ite to conumtion

More information

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power

Ohm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

A Duality Model of TCP and Queue Management Algorithms

A Duality Model of TCP and Queue Management Algorithms A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information