A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

Size: px
Start display at page:

Download "A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems"

Transcription

1 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer Scece, New Mexco Isttute of Mg ad Techology, Socorro, NM 87801, USA x@cs.mt.edu Abstract. Hgh ualty of securty s creasgly crtcal for applcatos rug o heterogeeous dstrbuted systems, where processors operate at dfferet speeds ad commucato chaels have dfferet badwdths. Although there are a few schedulg algorthms the lterature for heterogeeous dstrbuted systems, they geerally do ot tae to accout of securty reuremets of applcatos. I ths paper, we propose a ovel heurstc schedulg algorthm, or SATS, whch s coducve to mprovg securty of heterogeeous dstrbuted systems. Frst, we formalze a cocept of securty heterogeety for our schedulg model the cotext of dstrbuted systems. Next, we devse the SATS algorthm amg at schedulg tass to maxmze the probablty that all tass are executed wthout ay rs of beg attaced. Emprcal results demostrate that wth respect to securty ad performace, the proposed schedulg algorthm outperforms exstg approaches for heterogeeous dstrbuted systems. Keywords: Securty heterogeety, heterogeeous dstrbuted system, schedulg, degree of securty defcecy, rs-free probablty. 1 Itroducto Over the last decade, heterogeeous dstrbuted systems have bee emergg as popular computg platforms for computatoally tesve applcatos wth dverse computg eeds [6]. To date they have bee appled to securty sestve applcatos, such as bag systems ad dgtal govermet, whch reure ew approaches to securty. Iheretly, dstrbuted systems are more vulerable to threats tha cetralzed systems, sce t s dffcult to cotrol processg actvtes of the dstrbuted systems ad formato ca be accessed over etwors. A varety of techues le authetcato [8] ad access cotrol [12] are wdely used to secure dstrbuted systems. Although these techues ca be appled to dstrbuted systems, the covetoal securty techues lac the ablty to express heterogeety securty servces. Our study s teded to troduce a cocept of securty heterogeety, whch provdes a meas of measurg overhead curred by securty servces the cotext of heterogeeous dstrbuted systems. Y. Roberts et al. (Eds.): HPC 2006, LNCS 4297, pp , Sprger-Verlag Berl Hedelberg 2006

2 36 T. Xe ad X. Q Schedulg algorthms play a ey role obtag hgh performace parallel ad dstrbuted systems [10][18]. The obectve of schedulg algorthms s to map tass oto stes ad order ther executo a way to optmze overall performace. I ths wor we cosder the ssue of dyamc tas schedulg. Nowadays, a wde varety of schedulg algorthms for dstrbuted systems have bee reported the lterature [1][3]. Peg ad Sh proposed a ew schedulg algorthm for tass wth precedece costrats dstrbuted systems [9]. Arpac-Dusseau troduced two ey mechasms mplct coschedulg for dstrbuted systems [1]. The above algorthms were desged for homogeeous dstrbuted systems. I recet years, the ssue of schedulg o heterogeeous dstrbuted systems has bee addressed ad reported the lterature [5][16]. Raaweera ad Agrawal developed a scalable schedulg scheme called STDP for heterogeeous systems [11]. Srvasa ad Jha corporated relablty cost, defed to be the product of processor falure rate ad tas executo tme, to schedulg algorthms for tass wth precedece costrats [15]. A. Doga ad F. Özgüer studed relable matchg ad schedulg for tass wth precedece costrats heterogeeous dstrbuted systems. Due to the lac of securty awareess, these algorthms are ot sutable for securty-sestve dstrbuted computg applcatos. O the other had, however, a creasg umber of msso-crtcal applcatos wth hgh demads of ualty of securty servce have bee emergg varous dstrbuted systems [4][7][13][14]. For example, a real-tme stoc uote update ad tradg web servce system, each comg reuest from busess parters ad each outgog respose from a eterprse s bac-ed applcato have deadles ad securty reuremets, whch have to be dealt wth by a server located betwee the busess parters ad eterprse baced applcatos [17]. Furthermore, the server ca udcously select a sutable securty level from the rage of securty servce levels, whch are predefed combatos of trasport ad message securty mechasms. Typcal securty levels a real-tme uote ad tradg system are [17]: Routg + message securty; Routg + SSL; Routg + SSL + message securty; Routg + SSL + clet authetcato ad Routg + SSL + message securty + clet authetcato. I our prevous wor, we proposed a famly of dyamc securty-aware schedulg algorthms for a cluster [18] ad a Grd [19]. Ufortuately, these schedulg algorthms oly support homogeeous computg applcatos, thus lmtg ther applcablty to heterogeeous dstrbuted systems. Hece, we are motvated ths study to formalze the securty heterogeety cocept, ad to propose a schedulg algorthm to mprove securty of heterogeeous dstrbuted systems whle mmzg computatoal overhead. 2 Modelg Tass ad Ther Securty Reuremets I ths study, we cosder a ueug archtecture of a -ste dstrbuted system whch heterogeeous stes are coected va a etwor to process depedet tass submtted by m users. Let M = {M 1, M 2,, M } deote the set of heterogeeous stes.

3 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems System Model The system model, depcted Fgure 1, s composed of a tas schedule ueue, STAS tas scheduler, ad local tas ueues. The fucto of STAS s teded to mae a good tas allocato decso for each arrval tas to satsfy ts securty reuremets ad mata a deal performace covetoal performace metrcs such as average respose tme. User 1 User 2 Securty overhead maager SATS Securty-adaptve wdow cotroller Tas allocato decso maer Local Queue M 1 M 2 Schedule Queue Securty defcecy calculator Executo tme maager User m M Fg. 1. System model of the SATS strategy A schedule ueue s used to accommodate comg tass. SATS scheduler the processes all arrval tass a Frst-Come Frst-Served (FCFS) maer. After beg hadled by SATS, the tass are dspatched to oe of the desgated ste M M for executo. The stes, each of whch matas a local ueue, ca execute tass parallel. The ma compoet of the system model above s SATS, whch s composed of fve modules: (1) Executo tme maager; (2) Securty overhead maager; (3) Degree of securty defcecy (DSD) calculator; (4) Securty-adaptve wdow cotroller; ad (5) Tas allocato decso maer. Sce executo tme of each tas ca be estmated by code proflg ad statstcal predcto [2], we assume that the executo tme of each arrval tas for each ste s a pror ad ths formato s maaged the executo tme maager module. Smlarly, we assume that the securty overhead for each arrval tas o each ste s a pror, ad ths formato s mataed the securty overhead maager module. The DSD calculator s used to calculate dscrepaces betwee a arrval tas s securty level reuremets ad the securty levels that each ste offers. The fucto of securty-adaptve wdow cotroller s to vary sze of the wdow to dscover a sutable ste for the curret arrved tas so that (1) ts securty demads ca be well met; (2) the total executo tme ca be as small as possble. After retrevg formato le executo tme o each ste, securty overhead o each ste, degree of securty defcecy o each ste ad the sze of securty-adaptve wdow for the curret tas from the correspodg modules, the tas allocato decso maer wll decde whch ste wll be assged to the tas.

4 38 T. Xe ad X. Q Each ste the system model above s heretly heterogeeous both computato ad securty. Computatoal heterogeety meas that for each tas the executo tme o dfferet stes s dstctve. Whle each tas has a array of securty servce reuests, each ste offers the securty servces wth dfferet levels. The level of a securty servce provded by a ste s ormalzed the rage from to 1.0. Suppose ste M, offers securty servces, P = ( p, p,, p ), a vector of securty levels, characterzes the securty levels provded by the ste. p s the securty level of the th securty servce provded by M. To meet securty reuremet, securty overhead of the tas wll be cosdered. Securty heterogeety suggests that the securty overhead of a tas vares o each ste. 2.2 Modelg Tass wth Securty Reuremets We cosder a class of heterogeeous dstrbuted systems where a applcato s comprsed of a collecto of tass performed to accomplsh a overall msso. It s assumed that tass are depedet of oe aother. Each tas reures a set of securty servces wth varous securty levels specfed by a user. Values of securty levels are ormalzed the rage from 0.1 to 1.0 as well. For example, a tas specfes ts reuest securty level 0.7 for the authetcato servce, 0.3 for the tegrty servce, ad 0.8 for the ecrypto servce. Note that the same securty level value dfferet securty servces may have varous meags. Suppose there s a tas T submtted by a user, T s modeled as a set of ratoal parameters, e.g., T = (a, E, f, l, S ), where a ad f are the arrval ad fsh tmes, ad l deotes the amout of data (measured MB) to be protected. E s a vector of 1 2 executo tmes for tas T o each ste M, ad E = ( e, e,, e ). Suppose T 1 2 reures securty servces, S =, s,, s ), a vector of securty levels, characterzes the securty reuremets of the tas. s s the securty level of the th securty servce reured by T. Please ote that a way of uattatvely measurg securty s stll a ope uesto to be aswered. Stll, we beleve that the proposed securty reuremet model s of help ths research because of the followg two reasos. Frst, although the measuremets of securty reuremets ad securty levels are ot completely obectve, performace mprovemets of the SATS algorthm compared wth the two exstg approaches terms of securty (.e., rs-free probablty ad degree of securty defcecy) are stll vald because the performace of the three algorthms s evaluated usg a detcal set of crtera uder the same crcumstace. Secod, uattatvely modellg securty reuremets ad securty levels maes t possble for us to compare the securty performace of dfferet algorthms ad perceve the performace dscrepaces amog them. A securty-aware scheduler has to mae use of a fucto to measure the securty beefts gaed by each arrval tas. I partcular, the securty beeft of tas T s uattatvely modeled as a fucto of the dscrepacy betwee securty levels reuested ad the securty levels offered. The securty beeft fucto for tas T o ste M s deoted by DSD: (S, P ) R, where R s the set of o-egatve real umbers:

5 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems 39 where 0 w 1, Note that DSD ) = w g, p ), = 1 w = 1. w s the weght of the th securty servce for tas T. Users specfy ther reuests the weghts to reflect relatve prortes gve to the reured securty servces. Degree of Securty Defcecy, or DSD, s defed to be a weghted sum of dscrepacy values betwee securty levels reuested by a tas ad the securty levels offered by a ste. For each tas, a small DSD value meas a hgh satsfacto degree. Zero DSD value mples that a tas s securty reuremets ca be perfectly met. That s, there exsts at least oe ste M M that ca satsfy the followg codto: [, ] s p 1,. Let X be all possble schedule for tas T, x X be a schedulg decso of T. Gve a tas T, the degree of securty defcecy value (DSDV) of T s expected to be mmzed: DSDV ( x = 1 ) = m { DSD ( x )} = m w x X x X = 1 0,f s p g, p ) =, s p,otherwse ( g where p ( x ) = p f the tas s allocated to ste. A securty-aware scheduler strves to mmze the system s overall DSDV value defed as the sum of the degree of securty defcecy of submtted tass (See Euato 1). Thus, the followg DSDV fucto eeds to be mmzed: SDSD ( x ) =. m DSDV ( x ) x X T T (3) where T s a set of submtted tass. Substtutg Euato 2 to 3 yelds the followg securty obectve fucto. Thus, our proposed SATS schedulg algorthm maes a effort to schedule tass a way to mmze Euato 4: SDSD ( x ) = m m w ( f, p ( x ))). (4) x X x X T T = 1 Sce the degree of securty defcecy for tas T merely reflects the securty servce satsfacto degree expereced by the tas, t s adeuate to measure ualty of securty for T durg ts executo. Therefore, we derve ths secto the probablty Prf ( T, M ) that T remas rs-free durg the course of ts executo. The ualty of securty of a tas T wth respect to the th securty servce s calculated as l l where exp λ e + c ) λ s the tas's rs rate of the l = 1, p ( x ))) (1) (2)

6 40 T. Xe ad X. Q l l th securty servce, ad c ) s the securty overhead expereced by the tas o ste. The rs rate s expressed as: λ = 1 exp ( α (1 s )). (5) Note that ths model assumes that rs rate s a fucto of securty levels, ad the dstrbuto of rs-free for ay fxed tme terval s approxmated usg a Posso probablty dstrbuto. The rs rate model s ust for llustrato purpose oly. Thus, the model ca be replaced by ay rs rate model wth a reasoable parameter α. The ualty of securty of tas T o ste M ca be obtaed below by cosderg all securty servces provded to the tas. Coseuetly, we have: P rf l l l l ( T ) = + = +, M exp( λ e c ) ) exp e c ) λ = 1 l = 1 l = 1 = 1. (6) Usg euato 6, we obta the overall ualty of securty of tas T the system as follows, P rf = 1 = 1 l = 1 = 1 l l ( T ) = { [ = ] } = + P x Prf ( T, M ) p exp e c ) λ (7) where p s the probablty that T s allocated to ste M. Gve a tas set T, the probablty that all tass are free from beg attaced durg ther executos s computed based o Euato 7. Thus, P rf ( T ) = P T T rf ( T ). By substtutg the rs rate model to Euato 8, we fally obta P rf (X) as show below: P rf l l ( X ) = p exp ( ) e + c s λ. T T = 1 = 1 = 1 l (9) I summary, DSD values show us securty servce satsfacto degrees expereced by tass, whle rs-free probablty measured by Euato 9 defes ualty of securty provded by a heterogeeous dstrbuted system. I Secto 5 these two metrcs are used to evaluate securty of dstrbuted systems. 2.3 Heterogeety Model The computatoal weght of tas T o ste M (e.g., w ) s defed as a rato betwee ts executo tme o M ad that o the fastest ste the system. That s, we have w = 1 ( e ) = e m. The computatoal heterogeety level of tas T, referred to as (8)

7 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems 41 C H, ca be uattatvely measured by the stadard devato of the computatoal C weghts. Formally, H s expressed as: C 1 2 H =, where avg w w =. (10) = 1 =1 The computatoal heterogeety of a tas set T ca be computed by C 1 C. H = H T T T avg ( w w ) There are three types of securty heterogeetes. () Securty heterogeety of a partcular tas T dcates the dfferece of securty reuremets the securty servces reuested by the tas (see Euato 11). () Securty heterogeety of a gve securty servce provded by each ste a dstrbuted system reflects the dscrepacy of the offered securty levels of the servce the system (see Euato 12). () Securty heterogeety of a partcular ste M shows the devato of the securty levels provded by the ste (see Euato 13). 1 2 Gve a tas T ad ts securty reuremet S =, s,, s ), the heterogeety of securty reuremet for T s measured by the stadard devato of the securty levels the vector. Thus, S 1 2 H =, where avg s s =. (11) = 1 =1 The securty reuremet heterogeety of a tas set T ca be computed by S 1 S. H = H T T T avg s ) The heterogeety level of the th securty servce a dstrbuted system s defed as: V H = 1 2, where p p avg =. (12) = 1 =1 Usg Euato 12, the heterogeety of securty servces ca be wrtte as V 1 V H = H. = 1 Fally, the heterogeety level of securty servces ste M s defed to be: ( p p ) avg H M = 1 2, where avg ( p p ) = 1 p avg = =1 p. (13) 2.4 Securty Overhead Model Now we cosder securty overhead curred by securty servces. The followg securty overhead model cludes three servces, amely, ecrypto, tegrty, ad authetcato [18]. The securty overhead model ca be easly exteded to corporated more securty servces.

8 42 T. Xe ad X. Q Suppose tas T reures securty servces, whch are provded seuetal order. Let s ad c ) be the securty level ad overhead of the th securty servce, the securty overhead c expereced by T o ste M ca be computed usg Euato 14. I partcular, the securty overhead of T wth securty reuremets for the three servces above s modelled by Euato 15. c = = 1 c { a, e, g} ), where s S. (14) c = c ), where s S. e e g g a a where c ), c ), ad c ) are overheads caused by the authetcato, ecrypto, ad tegrty servces [18]. Our securty level assgmet s reasoable because a securty mechasm provdg hgher ualty of securty mposes hgher overhead tha mechasms offerg lower securty. The ecrypto overhead c e of T o M s computed usg Euato 16, where e π s the CPU tme spet ecryptg securty sestve data. e e e e e c ) = π s, where s S. (16) The tegrty overhead ca be calculated usg the followg euato, where l s g g the amout of securty sestve data, ad μ ) s a fucto mappg a securty level to ts correspodg tegrty servce performace. g g g g g c ) = l μ ), where s S. (17) The securty level of a securty mechasm ca be uattatvely measured by the amout of cost eeded to successfully brea the mechasm. However, uattatvely measurg the securty level of a securty mechasm s a otrval research ssue, ad t s out of the scope of ths wor. (15) 3 The SATS Algorthm For tas T, the earlest start tme o ste M s es (T ), whch ca be computed by Euato 18: es ( T ) = r + e l + c l l ) (18) T l W = 1 where r represets the remag overall executo tme of a tas curretly rug o the th ste, ad e + c ) s the overall executo tme (securty overhead l = 1 l l s factored ) of watg tas T l assged to ste M pror to the arrval of T. Thus, the earlest start tme of T l s a sum of the remag overall executo tme of the rug

9 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems 43 tas ad the overall executo tmes of the tass wth earler arrval o ste M. Therefore, the earlest completo tme for tas T o ste M ca be calculated as: e c ( T ) = es ( T ) + e + c ) = r + el + c l l ) + e + c ) (19) = 1 Tl W = 1 = 1 1.for each tas T submtted to the schedule ueue do 2. for each ste M the system do 3. Use E.18 to compute es (T ), the earlest start tme of T o ste M ; 4. Use E.19 to compute ec (T ), the earlest completo tme of T o M ; 5. ed for 6. Sort all stes earlest completo tme a o-decrease order 7. for each ste the securty-adaptve wdow do 8. Use E.1 to compute DSD ) /* Compute DSD for each ste*/ 9. ed for 10. Select the ste M r that ca offer the smallest DSD value ad assg T o t 11. Update ste M r s earlest avalable tme es 12. Use E.6 to compute rs-free probablty for tas T 13. Record start tme ad completo tme for tas T 14.ed for Fg. 2. The SATS algorthm The SATS algorthm s outled Fgure 2. The goal of the algorthm s to delver optmal ualty of securty whle matag hgh performace for tass rug o heterogeeous systems. To acheve the goal, SATS maages to mmze degree of securty defcecy (see Euato 1) of each tas (see Step 10 Fg. 2) wthout performace deterorato. Before optmzg the degree of securty defcecy of tas T, SATS sorts all the stes a o-decrease order T s total executo tme based o the formato retreved from the executo tme maager ad the securty overhead maager (see Fgure 1). Step 7 computes the degree of securty defceces for the tas o each ste the lght of the securty defcecy calculator. Combg the put from the securty-adaptve wdow cotroller, the tas allocato decso maer decdes a ste to whch the tas s allocated. 4 Smulatos Usg extesve smulato expermets based o Sa Dego Supercomputer Ceter (SDSC) SP2 log, we evaluate ths secto the potetal beefts of the SATS algorthm. The real trace was sampled o a 128-ode (66MHz) IBM SP2 from May 1998 through Aprl To smplfy our expermets, we utlzed the frst three moths data wth 6400 parallel tass smulato. Sce the trace was sampled from a homogeous evromet, to reflect the heterogeety of the smulated dstrbuted system, we traslated the executo tme of each tas from a sgle value to a vector wth (umber of stes) elemets based o the heterogeety model descrbed Secto 2.3. I purpose of revealg the stregth of SATS, we compared t wth two well-ow schedulg algorthms, amely, M-M ad Sufferage [14]. M-M ad Sufferage are o-preemptve tas schedulg algorthms, whch schedule a

10 44 T. Xe ad X. Q stream of depedet tass oto a heterogeeous dstrbuted computg system. The two algorthms are brefly descrbed below. (1) MINMIN: For each submtted tas, the ste that offers the earlest completo tme s tagged. Amog all the mapped tass, the oe that has the mmal earlest completo tme s chose ad the allocate to the tagged ste. (2) SUFFERAGE: Allocatg a ste to a submtted tas that would suffer most terms of completo tme f that ste s ot allocated to t. Table 1. Characterstcs of system parameters Parameter Number of tass (6400) Value (Fxed) - (Vared) Number of stes (16) (8, 16, 32,64,128) Tas arrval rate Decded by the trace Sze of securty-adaptve wdow (8) (1, 2, 4, 8, 16) Ste securty level (uform dst.) ( ) Tas securty level (uform dst.) ( ) Weghts of securty servces Authetcato=0.2, Ecrypto=0.5, Itegrty = Smulator ad Smulato Parameters The parameters of stes the smulated dstrbuted system are chose to resemble real-world worstatos le IBM SP2 odes. Table 1 summarzes the ey cofgurato parameters of the smulated dstrbuted system used our expermets. We modfed the trace by addg a bloc of data to be secured for each tas the trace. The sze of the securty-reured data assged to each tas s cotrolled by a uform dstrbuto (see Table 1). Although tas umber, submt tme, ad executo tme of tass submtted to the system are tae drectly from the trace, sze of data to be secured, umber of stes, computatoal heterogeety, ad securty heterogeety are sythetcally geerated accordace wth the above model sce they are ot avalable the trace. The performace metrcs we used clude: rs-free probablty (see Euato 9), degree of securty defcecy (see Euato 1), ste utlzato (defed as the percetage of total tas rug tme out of total avalable tme of a gve ste), maespa (the latest tas completo tme the tas set), average respose tme (the respose tme of a tas s the tme perod betwee the tas s arrval ad ts completo ad the average respose tme s the average value of all tass respose tme), slowdow rato (the slowdow of a tas s the rato of the tas s respose tme to ts servce tme ad the slowdow rato s the average value of all tass slowdows). 4.2 Overall Performace Comparsos The goal of ths expermet s two fold: (1) to compare the proposed SATS algorthm agast the two heurstcs, ad (2) to uderstad the sestvty of SATS to the sze of securty-adaptve wdow.

11 A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems 45 (a) Rs-free probablty (b) Degree of securty defcecy (c) Ste utlzato (d) Maespa (e) Average respose tme (f) Slowdow rato Fg. 3. Performace mpact of sze of securty-adaptve wdow Fgure 3 shows the smulato results for the three algorthms o a dstrbuted system wth 16 stes. Sce MINMIN ad SUFFERAGE do ot have a securtyadaptve wdow, ther performace all sx metrcs eeps costat. We observe from Fgure 3a that SATS sgfcatly outperforms the two heurstcs terms of rs-free probablty, whereas MINMIN ad SUFFERAGE algorthms exhbt smlar performace. 5 Summary ad Future Wor I ths paper, we cosdered the securty reuremets of applcatos the cotext of tas schedulg heterogeeous dstrbuted systems because a creasg umber of applcatos rug o heterogeeous dstrbuted systems reures ot oly descet schedulg performace but also hgh ualty of securty. To solve ths problem, we proposed a securty-adaptve schedulg heurstc that s based o the cocept of securty heterogeety. Expermetal results demostrate that our strategy outperforms exstg approaches both securty ad performace. I future research, the heurstc wll be exteded to schedule parallel applcatos.

12 46 T. Xe ad X. Q Refereces 1. Arpac-Dusseau, A.C.: Implct Coschedulg: Coordated Schedulg wth Implct Iformato Dstrbuted Systems. ACM Tras. o Computer Systems, Vol.19, No.3, (2001) Brau, T. D. et al.: A Comparso Study of Statc Mappg Heurstcs for a Class of Meta-tass o Heterogeeous Computg Systems. Proc. Worshop Heterogeeous Computg, (1999) Casavat, T.L, Kuhl, J.G.: A Taxoomy of Schedulg Geeral-purpose Dstrbuted Computg Systems. IEEE Tras. Software Egeerg, Vol.14, No.2, (1988) Coelly, K., Che, A.A.: Breag the barrers: hgh performace securty for hgh performace computg. Proc. Wor-shop o New securty paradgms, Sept. (2002) 5. Doga, A., Özgüer, F.: Relable matchg ad schedulg of precedece-costraed tass heterogeeous dstrbuted computg. Proc. It l Cof. Parallel Processg, (2000) Doga, A., Özgüer, F.: LDBS: A Duplcato Based Schedulg Algorthm for Heterogeeous Computg Systems. Proc. It l Cof. Parallel Processg, (2002) Dooho, G.: Buldg a Web Servce to Provde Real-Tme Stoc Quotes. MCAD.Net, Feb. (2004) 8. Lampso, B., Abad, M., Burrows, M., Wobber, E.: Authetcato dstrbuted systems: Theory ad practce. ACM Tras. Computer Systems, Vol.10, No.4, Nov. (1992) Peg, D.-T., Sh, K.G.: Optmal schedulg of cooperatve tass a dstrbuted system usg a eumeratve method. IEEE Tras. Software Egeerg, Vol.19, No.3, Mar. (1993) Petr F., Feg, W.-C.: Schedulg wth Global Iformato Dstrbuted Systems. Proc. 20th It l Cof. Dstrbuted Computg Systems, Aprl (2000) Raaweera, S., Agrawal, D.P.: Schedulg of Perodc Tme Crtcal Applcatos for Ppeled Executo o Heterogeeous Systems. Proc. It l Cof. Parallel Processg, Sept. (2001) Sadhu, R.S. et al.: Role-Based Access Cotrol Models. IEEE Computer, Vol.29,No.2, (1996) So, S.H., Muamala, R., Davd, R.: Itegratg securty ad real-tme reuremets usg covert chael capacty. IEEE Tras. Kowledge ad Data Egeerg. Vol.12, No.6, (2000) Sog, S., Kwo, Y.-K., Hwag, K.: Trusted Job Schedulg Ope Computatoal Grds: Securty-Drve Heurstcs ad A Fast Geetc Algorthms. Proc. It l Symp. Parallel ad Dstrbuted Processg, (2005) 15. Srvas, S., Jha, N.K.: Safety ad Relablty Drve Tas Allocato Dstrbuted Systems. IEEE Tras. Parallel ad Dstrbuted Systems, Vol.10, No.3, Mar. (1999) Topcuoglu, H., Harr, S., Wu, M.-Y.: Performace-effectve ad Low-complexty Tas Schedulg for Heterogeeous Computg. IEEE Tras. Parallel ad Dstrbuted Sys., Vol.13, No.3, Mar. (2002) 17. VerSg Corp.: Smplfyg Applcato ad Web Servces Securty - VerSg Trust Gateway. (2003) 18. Xe, T., Q, X.: Schedulg Securty-Crtcal Real-Tme Applcatos o Clusters. IEEE Trasactos o Computers, vol. 55, o. 7, July (2006) Xe, T., Q, X.: Ehacg Securty of Real-Tme Applcatos o Grds through Dyamc Schedulg. Proc. 11th Worshop Job Schedulg Strateges for Parallel Processg, MA, Jue (2005)

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.

Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds. Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany

ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Load and Resistance Factor Design (LRFD)

Load and Resistance Factor Design (LRFD) 53:134 Structural Desg II Load ad Resstace Factor Desg (LRFD) Specfcatos ad Buldg Codes: Structural steel desg of buldgs the US s prcpally based o the specfcatos of the Amerca Isttute of Steel Costructo

More information

Online Appendix: Measured Aggregate Gains from International Trade

Online Appendix: Measured Aggregate Gains from International Trade Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments

A Novel Resource Pricing Mechanism based on Multi-Player Gaming Model in Cloud Environments 1574 JOURNAL OF SOFTWARE, VOL. 9, NO. 6, JUNE 2014 A Novel Resource Prcg Mechasm based o Mult-Player Gamg Model Cloud Evromets Tea Zhag, Peg Xao School of Computer ad Commucato, Hua Isttute of Egeerg,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy

Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable

More information

Algorithm Optimization of Resources Scheduling Based on Cloud Computing

Algorithm Optimization of Resources Scheduling Based on Cloud Computing JOURNAL OF MULTIMEDIA, VOL. 9, NO. 7, JULY 014 977 Algorm Optmzato of Resources Schedulg Based o Cloud Computg Zhogl Lu, Hagu Zhou, Sha Fu, ad Chaoqu Lu Departmet of Iformato Maagemet, Hua Uversty of Face

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

An Effectiveness of Integrated Portfolio in Bancassurance

An Effectiveness of Integrated Portfolio in Bancassurance A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the

More information

A Single Machine Scheduling with Periodic Maintenance

A Single Machine Scheduling with Periodic Maintenance A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco

More information

Credibility Premium Calculation in Motor Third-Party Liability Insurance

Credibility Premium Calculation in Motor Third-Party Liability Insurance Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC

AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM ON CLOUD SERVICE PROVIDER BASED ON GENETIC Joural of Theoretcal ad Appled Iformato Techology 0 th Aprl 204. Vol. 62 No. 2005-204 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 AN ALGORITHM ABOUT PARTNER SELECTION PROBLEM

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts

Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 rpascual@g.uchle.cl

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

Speeding up k-means Clustering by Bootstrap Averaging

Speeding up k-means Clustering by Bootstrap Averaging Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Resource Management Model of Data Storage Systems Oriented on Cloud Computing

Resource Management Model of Data Storage Systems Oriented on Cloud Computing Resorce Maagemet Model of Data Storage Systems Oreted o Clod Comptg Elea Kaa, Yry Korolev Sat Petersbrg Electrotechcal Uversty "LETI" (ETU), Sat Petersbrg, Rssa {leaaa, yryg}@gmalcom Abstract Ths artcle

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Impact of Interference on the GPRS Multislot Link Level Performance

Impact of Interference on the GPRS Multislot Link Level Performance Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8

More information

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS

Fast, Secure Encryption for Indexing in a Column-Oriented DBMS Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm

Web Service Composition Optimization Based on Improved Artificial Bee Colony Algorithm JOURNAL OF NETWORKS, VOL. 8, NO. 9, SEPTEMBER 2013 2143 Web Servce Composto Optmzato Based o Improved Artfcal Bee Coloy Algorthm Ju He The key laboratory, The Academy of Equpmet, Beg, Cha Emal: heu0123@sa.com

More information

Reinsurance and the distribution of term insurance claims

Reinsurance and the distribution of term insurance claims Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

RUSSIAN ROULETTE AND PARTICLE SPLITTING

RUSSIAN ROULETTE AND PARTICLE SPLITTING RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

We investigate a simple adaptive approach to optimizing seat protection levels in airline

We investigate a simple adaptive approach to optimizing seat protection levels in airline Reveue Maagemet Wthout Forecastg or Optmzato: A Adaptve Algorthm for Determg Arle Seat Protecto Levels Garrett va Ryz Jeff McGll Graduate School of Busess, Columba Uversty, New York, New York 10027 School

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

Optimization Model in Human Resource Management for Job Allocation in ICT Project

Optimization Model in Human Resource Management for Job Allocation in ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Optmzato Model Huma Resource Maagemet for Job Allocato ICT Project Saghamtra Mohaty Malaya Kumar Nayak 2 2 Professor ad Head Research

More information

On the impact of heterogeneity and back-end scheduling in load balancing designs

On the impact of heterogeneity and back-end scheduling in load balancing designs O the mpact of heterogety ad back-ed schedulg load balacg desgs Ho-L Che Iformato Scece ad Techology Calfora Isttute of Techology Pasadea CA 925 Jaso R Marde Iformato Scece ad Techology Calfora Isttute

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

A multi-layer market for vehicle-to-grid energy trading in the smart grid

A multi-layer market for vehicle-to-grid energy trading in the smart grid A mult-layer market for vehcle-to-grd eergy tradg the smart grd Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad To cte ths verso: Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad. A mult-layer market

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

Load Balancing Control for Parallel Systems

Load Balancing Control for Parallel Systems Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal

More information

Simple Linear Regression

Simple Linear Regression Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8

More information

Report 06 Global High Yield Bonds

Report 06 Global High Yield Bonds Rep06, Computed & Prted: 17/06/2015 11:25 Report 06 Global Hgh Yeld Bods From Dec 2000 to Dec 2014 31/12/2000 31 December 1999 31/12/2014 New Bechmark (01/01/13) 80% Barclays Euro HY Ex Facals 3% Capped

More information

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev

The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has

More information

An SVR-Based Data Farming Technique for Web Application

An SVR-Based Data Farming Technique for Web Application A SVR-Based Data Farmg Techque for Web Appcato Ja L 1 ad Mjg Peg 2 1 Schoo of Ecoomcs ad Maagemet, Behag Uversty 100083 Bejg, P.R. Cha Ja@wyu.c 2 Isttute of Systems Scece ad Techoogy, Wuy Uversty, Jagme

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING

A PRACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISPATCHING West Ida Joural of Egeerg Vol. 30, No. 2, (Jauary 2008) Techcal aper (Sharma & Bahadoorsgh) 57-63 A RACTICAL SOFTWARE TOOL FOR GENERATOR MAINTENANCE SCHEDULING AND DISATCHING C. Sharma & S. Bahadoorsgh

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0

The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0 Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines

Approximation Algorithms for Scheduling with Rejection on Two Unrelated Parallel Machines (ICS) Iteratoal oural of dvaced Comuter Scece ad lcatos Vol 6 No 05 romato lgorthms for Schedulg wth eecto o wo Urelated Parallel aches Feg Xahao Zhag Zega Ca College of Scece y Uversty y Shadog Cha 76005

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

The Time Value of Money

The Time Value of Money The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto

More information

How To Balance Load On A Weght-Based Metadata Server Cluster

How To Balance Load On A Weght-Based Metadata Server Cluster WLBS: A Weght-based Metadata Server Cluster Load Balacg Strategy J-L Zhag, We Qa, Xag-Hua Xu *, Ja Wa, Yu-Yu Y, Yog-Ja Re School of Computer Scece ad Techology Hagzhou Daz Uversty, Cha * Correspodg author:xhxu@hdu.edu.c

More information