Software Implementation of Elliptic Curve Encryption over Binary Field *
|
|
- Bruce Poole
- 8 years ago
- Views:
Transcription
1 Dec. 3 Journal of Electronc Scence and Technolog of Chna Vol. No. Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld * ZHANG Xanfeng QIN Zhguang ZHOU Shje LIU Jnde (School of Coputer Scence and Engneerng, UESTC Chengdu 654 Chna) Abstract The atheatcal theor for ellptc curve encrpton based on optal noral bass (ONB) over F s ntroduced. Then an ellptc curve crptograph(ecc) based encrpton schee s analzed and desgned. The echans for ke exchange based on Dffe-Hellan s descrbed n detals for further applcatons. Based on these theoretc foundatons, the software based on ECC s developed and an applcaton s provded. The software s characterzed b excellent securt as well as hgh effcenc. Ke words network securt; ellptc curve crptograph(ecc); encrpton software; bnar feld Currentl, ellptc curve crptograph (ECC) s regarded as an attractve crptograph that can provde greater strength, hgher speed and saller kes than [~6] other crptograph sstes. A vast aount of research has been done on ts secure and effcent pleentaton. ECC has receved ncreased coercal acceptance and s adopted b accredted standards organzatons such as ANSI (Aercan Natonal Standards Insttute), IEEE (Insttute of Electrcal and Electroncs Engneers), ISO (Internatonal Standards Organzaton), and NIST (Natonal Insttute of Standards and Technolog). In the practcal applcatons based on ECC, ellptc curves groups are usuall ade up of ellptc curves over underlng felds of F p or F (where p s a pre). Generall, eleents over feld F p are denoted b polnoal bass representatons, and eleents over feld F can be denoted b noral bass representatons. Although the descrpton of the feld F s coplcated, the feld F s extreel useful because ts coputatons can be done effcentl n [7] hardware. For feld F, noral bass representatons have the coputatonal advantage that squarng an eleent can be done ver effcentl. Multplng dstnct eleents, on the other hand, can be cubersoe n general. For ths reason, t s coon to specalze a class of noral bases, called Gaussan noral bases, for whch ultplcaton s both spler and ore effcent. Gaussan noral bases for F exst whenever s not dvsble b 8. The nclude the optal noral bases (ONB), whch have the ost effcent ultplcaton possble n a [8,9] noral bass. In 999, Tatsuak Okaoto, Echro Fujsak and Hkaru Mortaan descrbed a provabl ellptc curve encrpton schee usng the ellptc curve ElGaal trapdoor functon, rando functon (hash functon) and [] a setrc-ke encrpton. In, a stud of the software pleentaton on workstatons of the NIST-recoended ellptc curves over bnar felds [] was presented. In, M. Brown, D. Hankerson and J. Lopez presented an extensve studof the software pleentaton on workstatons of the NIST-recoended ellptc curves over pre [] felds. In ths paper, we desgn and pleent coplete ellptc curve encrpton software based on ONB presentaton over F and Dffe-Hellan ke agreeent schee. It s desgned to be both seantcall secure and plantext-aware, n the presence of an adversar capable of launchng chosen-plantext and chosen-cphertext attacks. The eceved 3-3- * Supported b Natonal 863 lan roject (No. AA44)
2 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 55 test result proves that our encrpton software can be coparable wth those schees presented n efs. [~]. ONB resentaton and Feld Matheatc ules over Feld F. ONB presentaton Ever fnte feld F has a noral bass. But not all fnte felds have an ONB. Moreover, there are onl tpes of ONB for feld F f exst. If > s not dvsble b 8,the followng algorth tests for the exstence of an ONB for feld F [8] of gven tpe. Input: an nteger > not dvsble b 8; a postve nteger T= or. Output: f a tpe T ONB for feld F exsts, the essage True, otherwse False. Set p=t+; If p s not pre then output False and stop; k Copute k that satsfes (od p); Set h=t/k; Copute d:=gcd(h,), where GCD(h,) deno-tes the greatest coon dvsor of h and ; If d = then output True ; else output False. If feld F has a tpe ONB then set the feld polnoal pt ( ) = t + t + L + t + t + ;f F has a tpe ONB then copute pt ( ) = p () t usng the followng recursve forulae p ( t) = p ( t) = t + p+ () t = tp() t + p () t, L, At each stage, the coeffcents of the polnoals p () t are reduced odulo ; hence pt ( ) s a polnoal of degree wth coeffcents n F.. Coputng ules Based ONB for Fled F ^ Let ONB for feld F be {t,t,t, L, ^( ) t }(t F ), feld eleent a=(a a L a ), b=(bb L b ), then ONB s the presentaton of a ^ ^ = at and b= bt... Addton and Subtracton The addton of eleent a and b over F defned as: a+b=(c,c,l,c ), where c = (a +b ) od. The subtracton a b can be calculated b a+( b), s where ( b) s the addton reverse of b, and b =( b, b,, b ) od... Squarng and Square oot ^ For feld eleent a = at, squarng and the calculaton of square root are lnear operatons n F as follows: ^ (a ) =( ) ^( + ) at = at = ^ a(( ) od t (a ) ^ =( at ) L =( a a a a ) ^( ) = at = ^ a(( + ) od t =( a La a ) Hence squarng or the calculaton of square root of a fnte feld eleent s a sple rotaton of the vector representaton...3 Multplcaton and Dvson When eleents over F are presented based on ONB, the ultplcaton rule for two eleents s depcted n ef.[]. The dvson s the reverse calculaton of the ultplcaton. Thus, a/b can be coputed b a b, where b s the ultplcatve reverse of b that wll be coputed next...4 Multplcatve Inverse Because the feld eleents over F can be denoted b polnoals over F, the ultplcatve nverse of eleents can be calculated va the Extended Eucldean Algorth. Meanwhle, because the bt strng presentaton of a s equal to the bt strng (a a L a ) wth tes of crcular left shft operaton, or a=a, the ultplcatve reverse of a s coputed va a = a. Addtonall, because s equal to + + +, a can be calculated b a a a. So va ( ) tes of squarng and ultplcaton operaton, a, whch equals a, can be coputed. The Ellptc Curves and ont fffff.operatons. The Ellptc Curves over Feld F Accordng to standard specfcatons for ublc Ke Crprograph, an ellptc curve can be denoted b a septuplet: T=(, f(x),a,b,g,n,h), consstng of an
3 56 Journal of Electronc Scence and Technolog of Chna Vol. nteger specfng the fnte feld F, an rreducble bnar polnoal f( x ) of degree specfng the representaton of F, two eleents a, b F specfng the ellptc curve E(F ) defned b the equaton: + x = x 3 + ax + b n F, a base pont G=(x G, G ) on E(F ), a pre n whch s the order of G, and an nteger h whch s the cofactor h =# E(F )/ n (where # E(F )s the nuber of ponts on E(F )). Ellptc curve E(F ) conssts of the set of ponts =( x, ) ( x, F ). All ponts n together wth the pont at nfnt, denoted b O, for an Abel group (ellptc curve group). All ponts on an ellptc curve can be deterned b an rreducble non-zero feld or noral polnoal of degree. The desred securt level s controlled b. In practce, requreents on securt and effcenc deterne the selecton of. Usuall s selected fro the nteger set {3, 3, 63, 93, 33, 39, 83, [8] 49, 57}.. ont Operatons n F.. ont Addton and Subtracton Set pont =( x, ) E(F ), then the pont =( x, x + ) s the reverse of. For ever pont E(F ), +( )= O, + O = O+ =. Set pont Q =( xq, Q ) E(F ), where Q, and let + Q = =( x, ), then If = Q (self-addton), then b x = x + x = x + ( x + ) x + x x If Q (addton), then + Q + Q x = ( ) + ( ) + x + xq +a x + x x + x Q + Q = ( ) x + x Q Q ( x + x ) + x + The subtracton of and coputed va Q = +( Q ). Q over F s.. Scalar Multplcaton Set a pont over E(F ) wth an order n(n =O), the scalar ultplcaton of can be denoted b Q= k, where Q E(F ), k n. B the defnton of the pont addton, k can be calculated b addng to tself k tes. Because h k F, k can be denoted b k = k,where h and are ntegers, h and k {,}. Thus h k can be coputed as k = k = ( k+ ( k+ ( +( + ) kh 3 kh kh ) + k.ths approach requres h self-addtons and (w k ) addtons, where s the nuber of ones of the bnar w k representaton of k...3 Fndng a ont on An Ellptc Curve The base pont and publc kes accordng to ECC are all ponts on E(F ). The x -coordnate and -coordnate are all eleents over fled F. To generate these ponts, a coon approach s to appont a feld eleent ( x -coordnate) frst, then the correspondng -coordnate can be calculated b the equaton of E(F ). Set E(F ): +x = x 3 + ax + a6, the correspondng -coordnate can be coputed [5] b the followng steps. ) Appont x ( F ), copute the value of 3 3 polnoal x + ax + a6, set b = x + ax + a6. ) Copute the equaton + x = b, ths s equvalent to copute the equaton + x +b =. 3) Set = x z, then + x + b = s transfored to z +z + b / x =. In F, z + z + b / x = s equvalent to z = z +b / x, that s z = / / ( z ) +(( b / x )) ).For two eleents u and v over F, equaton (u + v ) = u + v holds. / / So the equaton z =( z ) +(( b / x ) ) s / / / equvalent to z = z +( b / x ). Hence z = / z +( b / x ). 4) Assue z =( z z z ) and k =( b / / / x ) =( k k k ), equaton z = z +( b / / x ) s equvalent to ( z z z z )=( z z z )+( k k k k ). Therefore, when one bt of z s deterned, the other bts can be deterned b the equaton ( z z z L z )=( z z L z )+( k k k L k ). Furtherore, s coputed. Of course, a rando feld eleent over F a not be the x -coordnate of a pont on E(F ). In that
4 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 57 case, we can ncrease the rando feld eleent b pre). We also assue that the councatng and check whether the new eleent s the partes are C and S. C s publc-prvate ke par s x -coordnate of a pont on E(F ). The procedure s repeated untl the desred eleent s found. (Q C,d C ) and S s ke par s (Q S,d S ). At the end of the protocol, the councatng partes end up wth the sae value K whch s a pont on the curve. A 3 Analss and Desgn part of K (such as x -coordnate of K ) can be used as a secret ke to a setrc ke encrpton 3. Choosng the Ellptc Curve algorth. The Dffe-Hellan protocol based on ECC To obtan a desred securt level, the paraeter s llustrated n Tab. should be about 6. All bnar felds F have the Tab. The dffe-hellan protocol based on ECC propert that s pre, whch can resst recent attacks on ellptc curves defned over where s User C User S coposte. Accordng to Standard specfcatons for Choose d C [, n -] Choose d S [, n -] ublc Ke Crptograph, we appont =63 for F. Q C = d C G Q S = d S G 63 can provde excellent securt and hgh effcenc Send Q C eceve as well. And we select ellptc curve equaton: eceve Q S Send +x=x 3 +ax +b n F b generatng the coeffcent K =d C Q S K =d S Q C a and b randol. However, to avod supersngular ellptc curves and anoalous ellptc curves whch have securt vulnerablt, we ust also check the ellptc curve we generate. A ethod to check generated ellptc curve can be referred to ef. [8]. If an attacker can onl get publc ke Q C, Q S and the base pont G, he can not coprose the pont K. Ths s equvalent to get prvate ke d C or d S fro Q C, Q S and G, whch s an ellptc curve dscrete logarth proble (ECDL). 3. Ke Exchange rotocol Based on ECC 3.3 The Encrpton Schee To establsh a shared ke between two partes Based on the descrpton and analss above, an effcentl, the Dffe-Hellan ke exchange protocol [3] based on ECC s selected. We assue that the underlng feld F and the ellptc curve equaton E (F ): + x = x 3 + ax + b s selected. And the encrpton schee s presented n the followng. To elaborate our schee explctl, we assue the councatng partes are a clent and a server. The encrpton schee can be llustrated n Fg.. base pont G s set up, whose order s n (n s a Server Clent Choose feld F Generate the ellptc curve and the base pont, choose a setrc encrpton schee Send the choces eceve the paraeters Generate the publc and prvate ke par of server Exchange the publc Generate the publc and prvate ke par of clent Generate the shared ke b the Dffe-Hellan protocol based on ECC Generate the shared ke b the Dffe-Hellan protocol based on ECC Decrpt the cpher text b the setrc encrpton schee, and check the MAC to recover the plan text. Send the cpher text Encrpt the plan text b the setrc encrpton schee, and generate MAC. Fg. The flow chart of the encrpton schee
5 58 Journal of Electronc Scence and Technolog of Chna Vol. Frstl, the server should deterne the underlng fled F, the ellptc curve, a base pont and the setrc encrpton schee to be used, then send these choces to the clent. After the two councatng partes generate ther own ke par, the send ther respectve publc kes to each other and negotate the shared ke b the Dffe-Hellan rotocol based on ECC. Now two partes can conduct encrpton and decrpton va the setrc ke schees (such as btwse exclusve-or encrpton algorth, IDEA, 3DES, AES, etc.). To ensure the ntegrt of the cpher-text, soe essage authentcaton code (MAC) schee s taken. 4 Ipleentaton and Applcaton In the pleentaton of the encrpton software, we choose the exclusve-or encrpton algorth as the setrc encrpton algorth. The bte length of encrpted data packet s set to be 4. [4,5] HMAC_SHA-_6 s selected as the s selected as the MAC schee. These choces can ensure desrable securt. The effcenc of the encrpton software s deterned b the calculaton operatons of feld eleents and ellptc curve ponts based on ONB for fled F and the conversons between the ellptc curve ponts and the feld eleents. To ake our code ore concse, effcent and reusable, we choose Turbo C. as the developent tool, and encapsulate all the underlng functons n a dnac lnk lbrar (DLL) fle. The perforance results of the encrpton software are tested on a platfor entu Ⅲ 733. Tab. shows the te for encrpton and decrpton operatons. 63 Tab. Te for ECC operatons over F Operaton ando curve over F 63 Encrpton Decrpton 3.96 llseconds.58 llseconds We have appled the toolkt (DLL fle) to a project (naed User Identt Identfcaton) of Cheng Dan Unead software Lt Corporaton. The an technologes nclude: at clent, a thero-senstve sensor obtans the user s lve fngerprnt; The data of lve fngerprnt are processed, then encrpted b the encrpton toolkt and transtted to the server; At server, Encrpted data are decrpted and the pattern recognton operaton s conducted. Fnall the purpose of dentfng the user s dentt s acheved. The practcal functon and perforance test of the sste shows that the toolkt s characterzed b effcent [6] securt and hgh effcenc. 5 Conclusons SA has been n publc ke sstes for over two decades, but ECC offers an alternatve. ECC s exctng because of the potental to provde slar levels of securt copared to SA but wth sgnfcantl reduced ke szes. ECC presuabl offers faster processng, and lower deands on eor and bandwdth, whch are crtcal n the space of oble solutons [3,7] the threshold crptograph develops fast. Currentl, the research on [8]. However, the threshold crptograph technologes based on ECC deserve great attenton. eferences [] Xu Qulang, L Daxng. Ellptc curve crptosstes[j]. Journal of Coputer esearch and Developent, 999, 36(): 8 (n chnese) [] Wang Hanqang, We Qngfu. A publc ke crptosste based on ellptc curves over Z/nZ[J]. Journal of Chna Insttute of Councatons, 999, (7):6 (n chnese) [3] Zhang Xanfeng, Qn Zhguang, Lu Jnde. An analss of the securt and effcenc on ellptc curve crptosstes[j]. Journal of Unverst of Electronc Scence and Technolog of Chna,, 3():44 (n Chnese) [4] Certco Corp. Current ublc-ke Crptographc Sste[DB/OL]. A Cetco Whtepaper, Canada,. pdf [5] Certco Corp. earks on the securt of the ellptc curve crptosste[db/ol]. A Cetco Whtepaper, Canada,. Ecc Whte3.pdf [6] Lopez J, Dahab. An Overvew of Ellptc Curve Crptograph[DB/OL]. htl. [7] Certco Corp. Math. Canada[DB/OL]. certco.co/resources/ecc/ath7.htl 3
6 No. ZHANG Xanfeng et al: Software Ipleentaton of Ellptc Curve Encrpton over Bnar Feld 59 [8] IEEE Standards Departent[S]. IEEE 363/D3 (Draft Verson 3), Standard Specfcatons for ublc Ke Crptograph, , [9] Agnew G B, Mulln C, Vanstone S A.An pleentaton of ellptc curve crptosstes over F 55 [J]. IEEE journal FC 4, [6] Chengdan Unead software lt corp[]. The test report of UID,. 5 [7] Chrstopher M K, Curts E D, Osanoglu T. Securt Archtecture: Desgn, Deploent and Operatons[M]. on selecte.d areas n coun- catons, 993, (5):84 ~ 83 [] Tatsuak Okaoto, Echro Fujsak, Hkaru Morta. SEC: rovabl Secure Ellptc Curve Encrpton Schee Sdne: Osborne/McGraw-Hll,, 9 [8] Desedt Y. Soe ecent esearch Aspects of Threshold Crptograph[DB/OL]. co/dese dt97soe htl, 997 [DB/OL] / 363a/co-ntrbutons/psec.pdf [] Hankerson D, Julo Lopez, Menezes A. Software pleentaton of Ellptc Curve Crptograph Over Bref Introducton to Author(s) ZHANG Xanfeng( 张 险 峰 )was born n 973. He s now pursung h.d. degree n UESTC. Hs research nterests nclude: Bnar Felds[DB/OL].. prnceton. nforaton securt, crptograph technolog. E-al: edu/ fskran/ reposto-r/ CHES/ hankerson software. pdf zhangxf@uestc.edu.cn QIN Zhguang( 秦 志 光 )was born n 957. He s now a [] Brown M, Hankerson D, Lopez J. Software rofessor, and Doctoral Advsor n UESTC. Hs research pleentaton of the NIST Ellptc Curve Over re Felds[DB/OL].. edu/users/ halton/secu-rt/pubs/software_ipleentaton_of_ nterests nclude: nforaton securt, ITS and ddleware E-al: qnzg@uestc.edu.cn ZHOU Shje( 周 世 杰 )was born n 97. He s now the_nist_ Ellptc. pdf pursung h.d. degree n UESTC. Hs research nterests [3] Ados M, Sava E C. Ipleentng Network Securt nclude: coputng, nforaton securt, and dstrbuted rotocols based on Ellptc Curve Crptograph[DB/OL]. coputng. E-al: sjzhou@uestc.edu.cn c6nsecc.pdf, LIU Jnde( 刘 锦 德 )was born n 93. He s now a -7-5 rofessor and Doctoral Advsor n UESTC. Hs research [4] ANSI X9.7-99x. Keed Hash Message Authentcaton nterests nclude: openng dstrbuted coputng and code[a]. Workng Draft. 998 [5] Krawczk H, Bellare M, Canett. HMAC: Keed Hashng for Message Authentcaton[DB/OL]. Internet ddleware technolog, oble agent technolog. E-al: jdlu@uestc.edu.cn (Contnued fro page 4) Theor[M]. Chengdu: ublshng House of UESTC, 996. (n Chnese) 4 Conclusons Fro the analss above, the expresson of couplng rato k s obtaned. The equvalent crcut of the couplng between the crostrp and D s analzed and the coponents expresson s obtaned. eferences [] L Yng. Theor and Applcaton of Electroagnetc D[M]. Bejng: ublshng House of Electroncs Industr, 988. (n Chnese) [] Vrdee B S, arsons A J, Meadows G. Coercal coputer-aded desgn software optses DO Crcut Desgn[J]. Mcrowave Conference/Brazl, 993, SBMO Internatonal, 993, (5): [3] Lou enha, Fu Guoxng, Yuan Jnghong. Electroagnetc Bref Introducton to Author(s) LIAO Juan( 廖 娟 )was born n Schuan, Chna, n 977. She receved B.S degree n E.E. n and M.S degree n Crcuts an Sstes n fro UESTC. After graduaton fro UESTC, She s now engaged as an engneer of oble councaton b the Councaton Copan of Chna. LIU Guanghu( 刘 光 祜 )was born n Schuan, Chna, n 946. He graduated fro E.E. Dept. of Harbn Engneerng Unverst n 968. As a senor vstng scholar, He used to be nvted to Unverst of Nevada-eno n USA to do research fro 989 to 99. He s now a rofessor and the Chef Lecturer of UESTC and Head Engneer of Chengdu Sne Scence and Technolog CO. Ltd. of UESTC. Hs research nterests nclude: F and crowave crcuts and sstes.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationAn Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
More informationElastic Systems for Static Balancing of Robot Arms
. th World ongress n Mechans and Machne Scence, Guanajuato, Méco, 9- June, 0 _ lastc Sstes for Statc alancng of Robot rs I.Sonescu L. uptu Lucana Ionta I.Ion M. ne Poltehnca Unverst Poltehnca Unverst Poltehnca
More informationDescription of the Force Method Procedure. Indeterminate Analysis Force Method 1. Force Method con t. Force Method con t
Indeternate Analyss Force Method The force (flexblty) ethod expresses the relatonshps between dsplaceents and forces that exst n a structure. Prary objectve of the force ethod s to deterne the chosen set
More informationAn Enhanced K-Anonymity Model against Homogeneity Attack
JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe
More informationWe are now ready to answer the question: What are the possible cardinalities for finite fields?
Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the
More informationA Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme
A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;
More informationGENERALIZED PROCRUSTES ANALYSIS AND ITS APPLICATIONS IN PHOTOGRAMMETRY
SWISS FEDERL INSIUE OF ECHNOLOGY Insttute of Geodes and Photograetr EH-Hoenggerberg, Zuerch GENERLIZED PROCRUSES NLYSIS ND IS PPLICIONS IN PHOOGRMMERY Prepared for: Praktku n Photograetre, Fernerkundung
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationLeast Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
More informationTwo-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
More informationCONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationA Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationHow Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationGPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter
2066 JOURL OF COMPUTERS, VOL. 9, O. 9, SEPTEMBER 204 GPS Recever utonoous Integrt Montorng lgorth Based on Iproved Partcle Flter Ershen Wang School of Electronc and Inforaton Engneerng, Shenang erospace
More informationMaximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co
More informationBANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
More informationSecure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationQuality of Service Analysis and Control for Wireless Sensor Networks
Qualty of ervce Analyss and Control for Wreless ensor Networs Jaes Kay and Jeff Frol Unversty of Veront ay@uv.edu, frol@eba.uv.edu Abstract hs paper nvestgates wreless sensor networ spatal resoluton as
More informationGanesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA
238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,
More informationInter-Ing 2007. INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007.
Inter-Ing 2007 INTERDISCIPLINARITY IN ENGINEERING SCIENTIFIC INTERNATIONAL CONFERENCE, TG. MUREŞ ROMÂNIA, 15-16 November 2007. UNCERTAINTY REGION SIMULATION FOR A SERIAL ROBOT STRUCTURE MARIUS SEBASTIAN
More informationwhere the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationMultiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers
Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller
More informationResearch Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationRevenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments
202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationII. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION
Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationLaddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
More informationBasic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
More informationAn Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationSecure Network Coding Over the Integers
Secure Network Codng Over the Integers Rosaro Gennaro Jonathan Katz Hugo Krawczyk Tal Rabn Abstract Network codng has receved sgnfcant attenton n the networkng communty for ts potental to ncrease throughput
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationA Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems
Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationScan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationData Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
More informationADVERTISEMENT FOR THE POST OF DIRECTOR, lim TIRUCHIRAPPALLI
ADVERTSEMENT FOR THE POST OF DRECTOR, lm TRUCHRAPPALL The ndan nsttute of Management Truchrappall (MT), establshed n 2011 n the regon of Taml Nadu s a leadng management school n nda. ts vson s "Preparng
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationCapacity Planning for Virtualized Servers
Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationCHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION
CHAOS BASED MIXED KEYSTREAM GENERATION FOR VOICE DATA ENCRYPTION Musheer Ahmad, Bashr Alam and Omar Farooq Department of Computer Engneerng, Jama Mlla Islama, New Delh, Inda musheer.cse@gmal.com, babashralam@gmal.com
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationOnline Algorithms for Uploading Deferrable Big Data to The Cloud
Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, cwu@cs.hku.hk The
More informationAnalysis of Clock Synchronization Approaches for Residential Ethernet
Analyss of Clock Synchronzaton Approaches for Resdental Ethernet Geoffrey M. Garner (Consultant) Kees den Hollander SAIT, Sasung Electroncs ggarner@cocast.net, denhollander.c.@sasung.co Abstract Resdental
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More informationn + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)
MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total
More informationComparison of Control Strategies for Shunt Active Power Filter under Different Load Conditions
Comparson of Control Strateges for Shunt Actve Power Flter under Dfferent Load Condtons Sanjay C. Patel 1, Tushar A. Patel 2 Lecturer, Electrcal Department, Government Polytechnc, alsad, Gujarat, Inda
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationInventory Control in a Multi-Supplier System
3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationA Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation
Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract.
More informationA Hybrid Approach to Evaluate the Performance of Engineering Schools
A Hybrd Approach to Evaluate the Perforance of Engneerng Schools School of Engneerng Unversty of Brdgeport Brdgeport, CT 06604 ABSTRACT Scence and engneerng (S&E) are two dscplnes that are hghly receptve
More informationWeb Service-based Business Process Automation Using Matching Algorithms
Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research
More informationA NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana
REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT
More informationIDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More information21 Vectors: The Cross Product & Torque
21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationTransformation of Commercial Flows into Physical Flows of Electricity
Transforaton of Coercal Flows nto Physcal Flows of Electrcty Marek ADAMEC, Mchaela INDRAKOVA, Pavel PAVLATKA Dept. of Econocs, Manageent and Huantes, Czech Techncal Unversty, Zkova 4, 166 27 Praha, Czech
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationPacket Reorderng Analysis
On Montorng of End-to-End Packet Reorderng over the Internet Bn Ye 1 Anura P. Jayasuana 1 Nschal M. Pratla 2 1Coputer Networkng Research laboratory, Colorado State Unversty, Fort Collns, CO 8523, USA 2
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationReporting Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (including SME Corporate), Sovereign and Bank Instruction Guide
Reportng Forms ARF 113.0A, ARF 113.0B, ARF 113.0C and ARF 113.0D FIRB Corporate (ncludng SME Corporate), Soveregn and Bank Instructon Gude Ths nstructon gude s desgned to assst n the completon of the FIRB
More informationA Generalized Temporal and Spatial Role-Based Access Control Model
92 JOURNAL OF NETWORKS, VOL. 5, NO. 8, AUGUST 200 A Generalzed Temporal Spatal Role-Based Access Control Model + Natonal Central Polce Unverst/ Depart. of Informaton Management, Taouan, Tawan E-mal: swang@mal.cpu.edu.tw
More informationApplied Research Laboratory. Decision Theory and Receiver Design
Decson Theor and Recever Desgn Sgnal Detecton and Performance Estmaton Sgnal Processor Decde Sgnal s resent or Sgnal s not resent Nose Nose Sgnal? Problem: How should receved sgnals be rocessed n order
More informationVirtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
More information