Spreading Code Assignment in an Ad hoc DS-CDMA Wireless Network

Size: px
Start display at page:

Download "Spreading Code Assignment in an Ad hoc DS-CDMA Wireless Network"

Transcription

1 Spreading Code Assignment in an Ad hoc DS-CDMA Wireless Networ Ynnan W, Qian Zhang, Wenw Zh, S.Y. ng Dept. of Electrical Engineering, Princeton University, Princeton, NJ Microsoft Research, China, 49 Zhichn Rd. Beiing 00080, P.R.China Abstract-In this paper, we eamine the problem of optimal spreading code assignment in an ad hoc DS-CDMA wireless networ. he problem is formlated in two ways, with the optimization criteria being minimizing the congestion measre, and minimizing the total consmed power, respectively. Either formlation is converted to an optimization of the weighted total sqared cross-correlation (WSC, after some mathematical simplification. We then devise algorithms to reach some local minima of the optimization. Simlation reslts show significant redction in the networ congestion measre and power consmption, compared with random code allocation. I. INRODUCION In a CDMA wireless networ, different sers are assigned different signatre waveforms to modlate their respective information bitstreams. In DS-CDMA, signatre waveforms are chip waveforms modlated by spreading code vectors. he signatre waveforms play an important role in controlling the interference among the sers, and conseqently the BER after mlti-ser detection []. he spreading code assignment problem arises as a resorce allocation strategy. Sppose there are sers and the dimension of the spreading code is N. One can view the problem as to allocate the locations of the sers on a N-dim sphere srface to optimize some system performance criteria. In particlar, a reasonable reqirement might be to balance the received qality of different sers to avoid resorce monopoly. he allocation strategy depends on the commnications model sed. Eisting models can be classified into two categories: the celllar model or the ad hoc model, shown in igre (A and (B respectively. he strctral differences lie in whether the receivers are co-located or distribted. he model in igre (A is a single cell abstraction of today s celllar commnications, where ot-of-cell interferences are treated as bacgrond noise. or the plin case as shown in igre (A, the Welch-Bond-Eqality (WBE seqences are fond to be the optimal seqence [-5], maimizing sm capacity, ser capacity and etc. rthermore, with optimal WBE seqences, the MMSE detector becomes single ser matched filter. By recognizing that the code set minimizing the total sqared cross-correlation (SC is the optimal WBE code set, in [6], the athors proposed iterative and distribted interference avoidance algorithms where sers pdate their spreading codes seqentially to gradally redce the SC. he ad hoc setting in igre (B is a more generic model than the celllar setting. It is st a collection of several commnication pairs. or one thing, it models the celllar networ by taing ot-of-cell interferences into consideration. or the other, it captres the ad hoc (or infrastrctre-less paradigm where a central base station is absent. hs the code assignment can be regarded as a more general form of freqency rese optimization in celllar planning. S BASE SAION S (A S 3 S R R (B S R 3 igre (A CEUAR MODE (B AD HOC MODE or the code assignment in the ad hoc model, prior arts [7][8] stdy the orthogonal code allocation (or eqivalently DMA timeslot assignment with a graph coloring approach. Assming a common transmission range, a directed graph is formed with each node denoting a commnication pair and each arc meaning a transmitter is within the range of the receiver. A distribted heristic graph coloring algorithm is then sed to assign the orthogonal channels. he nmber of colors is the dimension of the code reqired. However, there are several drawbacs of the scheme. irst, the nmber of channels reqired can t be nown beforehand, while in practice the dimension of the code is sally given. Second, it gives a physical layer simplification that two sers can not coeist if one falls within the other s range. hird, the scheme does not consider the possible heterogeneos power capabilities and QoS reqirements of the sers. In this paper, we investigate the optimal spreading code assignment problem in the ad hoc setting. he paper is organized as follows. In section II, we give a mathematical description of the problem. wo formlations, optimizing the congestion measre and optimizing the power consmption, are discssed in section III and IV, respectively. Since both formlations are simplified to a weighted total sqared crosscorrelation (WSC optimization, section V deals with solving the WSC optimization. Simlation reslts are presented in section V. inally, section VI concldes the paper. II. PROBEM ORMUAION AND ASSUMPIONS S 3 his wor was performed when Mr. W was a smmer intern at Microsoft Research, China /0/$7.00 (C 00 IEEE

2 Consider an ad hoc wireless networ consisting of commnication pairs. et P be the transmission power of the -th transmitter, and be the channel path loss from the -th transmitter to the -th receiver. In free space, the power loss is modeled as inversely proportional to the distance sqared. We denote the normalized spreading code of the -th pair as s. he bacgrond white assian noise level at the -th receiver isσ. We assme single ser matched filter detector is sed at each receiver. hen the signal to interference pls noise ratio (SINR at the -th receiver is: P SINR = P s + σ. (. It is easily seen from (. that the qalities for different commnication pairs can be controlled throgh designing the spreading codes and throgh allocating different transmission powers. Before discssing the optimal spreading code assignment, we briefly review some reslts in the optimal power control [9] and introdce the notations to be sed in the seqel. We consider a general scenario where sers have different signal SINR reqirements. or a given set of spreading codes, the optimal power control problem is to satisfy the SINR reqirements with minimm total power: min P, s. t. SINR. (. With the following notations 0 s M s σ p (,, P P, σ 0 s O M M 0 s (. can be re-written as: ( I p, (.3 where means the component-wise. A power allocation can be fond to meet the set of SINR reqirements if and only if <, where ma λ, =,..., is the maimm modls of the eigenvales of. Since is nonnegative and irredcible, by the Perron-robenis theorem [0], has a real positive eigenvale eqal to. And if <, there is a component-wise minimm soltion: p opt = ( I. (.4 he spreading code assignment provides another degree of freedom. In particlar, and popt are fnctions of,, s. It is noted in [] that can be treated as a congestion measre of the wireless networ as it characterizes the margin to accommodate the traffic increases in the networ. hs, an optimization formlation can be given: min. (.5 s =, =,, Since the battery life of mobile devices is limited, it is of practical interest to conserve the energy as mch as possible. Hence, an alternative formlation is to minimize the total consmed power by choosing an appropriate code set, as shown in eqation (.6. min P = ( I (.6 s =, =,, or both (.5 and (.6, if N, the optimal soltion is readily obtained to be the orthogonal allocation as it decoples the channel into independent single-ser channels. Hence we are interested in the case of >N. Since it is difficlt to directly wor with either optimization, we see to se some bonding operations and approimations to simplify the problem in the following two sections. and III. OPIMIZIN HE CONESION MEASURE et D diag{,, }, * DD. * has the following epression: = s, if *. (3. Since it is a similarity transform, both and * have the same set of eigenvales. By sbstitting and with min{, }, we obtain a symmetric matri # : min{, } = s, if #. (3. * # Since 0 where means the element-wise, we have = * # by a property of non-negative matrices [0]. With an application of the Rayleigh qotient for real symmetric matri:, we have A λ ma he -norm of a vector v is defined as: v v /0/$7.00 (C 00 IEEE

3 . (3.3 # # = = Overall, we get a lower bond for which is epressed as a weighted total sqared cross-correlation (WSC. We denote this as WSC and choose to minimize it instead of : min{, } min s,. (3.4 s =, =,, IV. OPIMIZIN HE POWER CONSUMPION As for (.6, we can approimate (I- - with its first order aylor epansion: P = ( I ( I + = +. (4. Sch an approimation is good if is near zero, i.e., when the networ is not very congested. With the approimation, we arrive at a minimization of another WSC epression which we denote as WSC: min s, =, σ s =,, (4. V. SOVIN WSC OPIMIZAION In section III and IV, both optimization criteria have been converted to a minimization of the weighted total sqare cross-correlation (WSC. It is still difficlt to find the eact optimal soltion for the general WSC problem min a, s =, s. (5. =,, We restrict or attention first to the case of orthogonal allocation. Since there are only N orthonormal bases in a N-dim space, the problem is eqivalent to optimally partition the sers into N clsters. Associated with each pair of the sers is a cost a + a, if the two sers and are within the same clster. he total cost is to be minimized. Unfortnately, finding the eact optimal partition has an eponential compleity. hs we develop a heristic algorithm as follows: Algorithm. Sort the sers according to some measre of importance, e.g. + a which is the total costs to all other sers.. Each of the first N sers pics one distinct orthonormal basis. 3.Each of the following -N sers selects the best clster to oin in. he criterion is to minimize the increase of the WSC with the addition of the ser in consideration. A related wor [6] considered the SC minimization problem in a celllar wireless networ. he sers are at first assigned with random codes. hen a distribted algorithm is condcted at the sers seqentially and iteration by iteration, where in each step a ser pdates its spreading code only to redce the SC. We note that the techniqe can be etended to the WSC minimization problem (5.. he ey observation is that the single ser adaptation version of (5. (only a particlar s is the variable min, a s = s can be solved. Etracting the terms related with s in (5., we have (5. min + a s = s ( ( a + a s s. (5.3 s = he above minimization can be solved by a agrange mltiplier approach. he soltion is st the eigenvector corresponding to the minimal eigenvale of the matri + a s. he adapted iterative algorithm can arrive at a local minimm of the problem since the WSC can only decrease at each step. he main drawbac is its compleity and the signaling overhead incrred to inform the receivers abot the code pdate. With the techniqe of single ser adaptation, we as the qestion whether performance gains can be achieved in step 3 of algorithm by looing at not only the N bases, bt all possible s. Withot loss of generality, we assme the N orthonomal bases are the standard bases { v v =, v = 0, i}. hen i ii = diag{ i + a s s = v + a,, s = vn + a. (5.4 } Conseqently, if p to now all sers are assigned with the orthonormal bases, the optimal single ser adaptation wold still sggest an orthonormal basis in the channel where the total cost is minimized /0/$7.00 (C 00 IEEE

4 VI. SIMUAION RESUS We generate the ad hoc commnication settings as follows: transmitters are randomly drawn from a rectanglar region [ 0,] [0,], and each receiver for a transmitter at (, y is randomly drawn from a rectanglar region [ 0.5, + 0.5] [ y 0.5, y + 0.5]. his model is chosen to reflect that in an ad hoc networ, a node can only directly commnicate with a neighbor. An eample setting is shown in igre where each arrow represents a commnication pair with the tail being the transmitter and the head being the receiver. igre also presents the orthogonal allocation reslt with algorithm by plotting each pair with the color (also shown with the nmber corresponding to its orthonormal basis. We can see from igre that the basic idea in the ad hoc spreading code assignment is to assign nearby pairs different codes. color nmber (spreading gain dimension N, we rn it first and then (A~(A3 are rn with the N given by (A. able -able 4 give the simlation reslts for ~4, respectively. or each traffic setting, we test over 0 geographic settings. he first three rows are the performance criteria: the congestion measre, the observed probability of having a valid power allocation, and the total consmed power ( I which is the average for the cases when a valid allocation eists. < ( I ABE RESUS OR, =, E(N=6.75, N [ 4, ] A A WSC optimization WSC optimization WSC WSC.0.03 ABE RESUS OR, =, E(N=6.75, N [ 4, ] igre USER OCAIONS AND HE COORIN WIH AORIHM We simlate for cases for the traffics in the networ: ( ight niform traffic where =, N~7 and =4dB for every pair. ( ight non-niform traffic where =, N~7, and half of the sers have = 3dB and the other half 6dB. (3 Heavy niform traffic where =3, N~3, =4dB for every pair. (4 Heavy non-niform traffic where =3, N~3, and half of the sers have = 3dB and the other half 6dB. he reslts are collected for the following algorithms: (A raph coloring (prior arts [7][8] (A Random assignment (each code is niformly drawn from the srface of a nit N-sphere. (A3 Iterative algorithm for WSC minimization (A4 Orthogonal assignment (algorithm. Since both algorithm (A and (A3 depend on the realization of the random spreading codes, we average the reslts over 00 trials. And since (A cannot control the resltant < ( I A A WSC optimization WSC optimization WSC WSC < ( I ABE 3 RESUS OR 3, =3, E(N=.75, N [,5 ] A A WSC optimization WSC optimization WSC WSC /0/$7.00 (C 00 IEEE

5 < ( I ABE 4 RESUS OR 4, =3, E(N=.75, N [,5 ] A A WSC optimization WSC optimization WSC WSC Note that at present, the ad hoc networ is configred as a random access networ. We do not claim that schedled access, as the optimal allocation we are prsing here, is feasible immediately. In fact, many important problems remain nanswered, sch as the mobility spport, dealing with dynamic traffic arrivals and departres in the networ. rom able to able 4, we can see that random allocation is mch worse than the others. One reason is that in an ad hoc networ, the problem is highly geographic dependent, while complete random allocations do not tae advantage of the spatial separation. In light traffic, the graph-coloring algorithm A has 59% higher than that of A3, and 9% higher power consmption. In heavy traffic, A is mch worse than A3. And since it is naware of the different QoS reqirements, its performance in the non-niform traffic cases is worse that that of the niform traffic cases. When comparing A3 and A4, we see that as far as the optimization obective WSC is concerned, the two algorithms have almost the same performance. Yet A4 has a mch lower compleity. However, an interesting phenomenon is that A4 has on average 45% higher than that of A3, while the power consmptions are abot the same. One possible case might be the strctre restriction of orthogonal allocation. And it might be in part de to that optimizing the lower bonds is not as relevant as optimizing the approimation. o evalate the lower bonding operation and the approimation, we eamine the vs. WSC progression and the power consmption vs. WSC progression, dring the gradal redction of the WSC in A3. wo eample crves are plotted as igre 3 (A and (B. Empirically, we observe that the althogh the (total power can not be assred to monotonically decrease as WSC(WSC decreases, the trends of the two are the same. VII. CONCUSIONS AND UURE WOR In this paper, we stdied the spreading code assignment in an ad hoc wireless networ. he problem is converted into two forms of WSC minimization. And heristic algorithms to reach some local minima of the WSC minimizations were designed. he proposed orthogonal allocation algorithm has low compleity and can achieve promising performance. hrogh simlations, we demonstrate the significant performance gains of strctred code design, compared with the sally adopted random spreading code assignment. (A igre 3 (B (A VS. WSC PRORESSION (3 (B OA POWER VS. WSC PRORESSION (3 REERENCES [] S. Verd, Mltiser Detection, Cambridge University Press, 998. [] M. Rpf and J.. Massey, Optimal seqence mltisets for synchronos code division mltiple-access channels, IEEE rans. on Information theory, vol. 40, pp. 6-66, Jly 994. [3] J.. Massey and. Mittelholzer, Welch s bond and seqence sets for code-division mltiple-access systems, in Seqences II: Methods in Commnication, Secrity and Compter Sciences, R. Capocelli, A. De Santis, and U. Vaccaro, Eds, pp , 993. Springer. [4] P. Viswanath, V. Anantharam, D. N. C. se, Optimal seqences, power control, and ser capacity of synchronos CDMA systems with linear MMSE mltiser receivers, IEEE rans. on Information heory, vol.45, pp , Sept [5] P. Viswanath and V. Anantharam, Optimal seqences and sm capacity of synchronos CDMA systems, IEEE rans. on Information theory, vol. 45, pp , Sept [6] S. Uls and R. D. Yates, Iterative constrction of optimm signatre seqence sets in synchronos CDMA systems, IEEE rans. on Information heory, 47(5: pp , Jly 00. [7]. H, Distribted code assignments for CDMA pacet radio networs, IEEE/ACM rans. on Networing, vol., pp , Dec [8] S. Ramanathan, A nified framewor and algorithm for channel assignment in wireless networs, Wireless Networs, pp. 8-94, 5(999. [9] N. Bambos, oward power-sensitive networ architectres in wireless commnications: concepts, isses, and design aspects, IEEE Personal Commnications, pp.50-59, Jne 998. [0] E. Seneta, Non-negative Matrices and Marov Chains, Springer Verlag, nd ed. 98. [] S. V. Hanly, Congestion measres in DS-CDMA networs, IEEE rans. on commnications, vol. 47, pp , Mar /0/$7.00 (C 00 IEEE

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD

Spectrum Balancing for DSL with Restrictions on Maximum Transmit PSD Spectrm Balancing for DSL with Restrictions on Maximm Transmit PSD Driton Statovci, Tomas Nordström, and Rickard Nilsson Telecommnications Research Center Vienna (ftw.), Dona-City-Straße 1, A-1220 Vienna,

More information

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks

ASAND: Asynchronous Slot Assignment and Neighbor Discovery Protocol for Wireless Networks ASAND: Asynchronos Slot Assignment and Neighbor Discovery Protocol for Wireless Networks Fikret Sivrikaya, Costas Bsch, Malik Magdon-Ismail, Bülent Yener Compter Science Department, Rensselaer Polytechnic

More information

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000

Chapter 3. 2. Consider an economy described by the following equations: Y = 5,000 G = 1,000 Chapter C evel Qestions. Imagine that the prodction of fishing lres is governed by the prodction fnction: y.7 where y represents the nmber of lres created per hor and represents the nmber of workers employed

More information

Solutions to Assignment 10

Solutions to Assignment 10 Soltions to Assignment Math 27, Fall 22.4.8 Define T : R R by T (x) = Ax where A is a matrix with eigenvales and -2. Does there exist a basis B for R sch that the B-matrix for T is a diagonal matrix? We

More information

Every manufacturer is confronted with the problem

Every manufacturer is confronted with the problem HOW MANY PARTS TO MAKE AT ONCE FORD W. HARRIS Prodction Engineer Reprinted from Factory, The Magazine of Management, Volme 10, Nmber 2, Febrary 1913, pp. 135-136, 152 Interest on capital tied p in wages,

More information

On the urbanization of poverty

On the urbanization of poverty On the rbanization of poverty Martin Ravallion 1 Development Research Grop, World Bank 1818 H Street NW, Washington DC, USA Febrary 001; revised Jly 001 Abstract: Conditions are identified nder which the

More information

On a Generalized Graph Coloring/Batch Scheduling Problem

On a Generalized Graph Coloring/Batch Scheduling Problem Reglar Papers On a Generalized Graph Coloring/Batch Schedling Problem Giorgio Lcarelli 1, Ioannis Milis Dept. of Informatics, Athens University of Economics and Bsiness, 104 34, Athens, Greece, {glc, milis}@aeb.gr

More information

GUIDELINE. Guideline for the Selection of Engineering Services

GUIDELINE. Guideline for the Selection of Engineering Services GUIDELINE Gideline for the Selection of Engineering Services 1998 Mission Statement: To govern the engineering profession while enhancing engineering practice and enhancing engineering cltre Pblished by

More information

Using GPU to Compute Options and Derivatives

Using GPU to Compute Options and Derivatives Introdction Algorithmic Trading has created an increasing demand for high performance compting soltions within financial organizations. The actors of portfolio management and ris assessment have the obligation

More information

Equilibrium of Forces Acting at a Point

Equilibrium of Forces Acting at a Point Eqilibrim of orces Acting at a Point Eqilibrim of orces Acting at a Point Pre-lab Qestions 1. What is the definition of eqilibrim? Can an object be moving and still be in eqilibrim? Explain.. or this lab,

More information

Designing and Deploying File Servers

Designing and Deploying File Servers C H A P T E R 2 Designing and Deploying File Servers File servers rnning the Microsoft Windows Server 2003 operating system are ideal for providing access to files for sers in medim and large organizations.

More information

Compensation Approaches for Far-field Speaker Identification

Compensation Approaches for Far-field Speaker Identification Compensation Approaches for Far-field Speaer Identification Qin Jin, Kshitiz Kmar, Tanja Schltz, and Richard Stern Carnegie Mellon University, USA {qjin,shitiz,tanja,rms}@cs.cm.ed Abstract While speaer

More information

Introduction to HBase Schema Design

Introduction to HBase Schema Design Introdction to HBase Schema Design Amandeep Khrana Amandeep Khrana is a Soltions Architect at Clodera and works on bilding soltions sing the Hadoop stack. He is also a co-athor of HBase in Action. Prior

More information

Optimal Personalized Filtering Against Spear-Phishing Attacks

Optimal Personalized Filtering Against Spear-Phishing Attacks Optimal Personalized Filtering Against Spear-Phishing Attacks Aron Laszka and Yevgeniy Vorobeychik and Xenofon Kotsokos Institte for Software Integrated Systems Department of Electrical Engineering and

More information

11 Success of the Help Desk: Assessing Outcomes

11 Success of the Help Desk: Assessing Outcomes 11 Sccess of the Help Desk: Assessing Otcomes I dread sccess... I like a state of continal becoming, with a goal in front and not behind. George Bernard Shaw Key Findings Respondents help desks tend to

More information

Magnetic anomaly detection systems target based and noise based approach

Magnetic anomaly detection systems target based and noise based approach Magnetic anomaly detection systems target based and noise based approach International Scientific CNRS Fall School High Sensitivity Magnetometers "Sensors & Applications" 4 th Edition, Monday - Friday

More information

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor

WHITE PAPER. Filter Bandwidth Definition of the WaveShaper S-series Programmable Optical Processor WHITE PAPER Filter andwidth Definition of the WaveShaper S-series 1 Introdction The WaveShaper family of s allow creation of ser-cstomized filter profiles over the C- or L- band, providing a flexible tool

More information

How To Plan A Cloud Infrastructure

How To Plan A Cloud Infrastructure Concrrent Placement, Capacity Provisioning, and Reqest Flow Control for a Distribted Clod Infrastrctre Shang Chen, Yanzhi Wang, Massod Pedram Department of Electrical Engineering University of Sothern

More information

Planning an Active Directory Deployment Project

Planning an Active Directory Deployment Project C H A P T E R 1 Planning an Active Directory Deployment Project When yo deploy the Microsoft Windows Server 2003 Active Directory directory service in yor environment, yo can take advantage of the centralized,

More information

Firewall Feature Overview

Firewall Feature Overview PALO ALTO NETWORKS: Firewall Featre Overview Firewall Featre Overview Palo Alto Networks family of next generation firewalls delivers nprecedented visibility and control of applications, sers and content

More information

Regular Specifications of Resource Requirements for Embedded Control Software

Regular Specifications of Resource Requirements for Embedded Control Software Reglar Specifications of Resorce Reqirements for Embedded Control Software Rajeev Alr and Gera Weiss University of Pennsylvania Abstract For embedded control systems a schedle for the allocation of resorces

More information

9 Setting a Course: Goals for the Help Desk

9 Setting a Course: Goals for the Help Desk IT Help Desk in Higher Edcation ECAR Research Stdy 8, 2007 9 Setting a Corse: Goals for the Help Desk First say to yorself what yo wold be; and then do what yo have to do. Epictets Key Findings Majorities

More information

Enabling Advanced Windows Server 2003 Active Directory Features

Enabling Advanced Windows Server 2003 Active Directory Features C H A P T E R 5 Enabling Advanced Windows Server 2003 Active Directory Featres The Microsoft Windows Server 2003 Active Directory directory service enables yo to introdce advanced featres into yor environment

More information

I Symbolization J,1 II e L~ "-"-:"u"'dll... Table I: The kinds of CGs and their classification, (where, t - a local neighbourhood topology)

I Symbolization J,1 II e L~ --:u'dll... Table I: The kinds of CGs and their classification, (where, t - a local neighbourhood topology) POSTER SESSIONS 484 REPRESENTATION OF THE GENERALIZED DATA STRUCTURES FOR MULTI-SCALE GIS M.O.Govorov Dept. of Cartography,' Siberian State Academy of Geodesy Plahotnogo 10, Novosibirsk, 630108, Rssia

More information

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc.

Modeling Roughness Effects in Open Channel Flows D.T. Souders and C.W. Hirt Flow Science, Inc. FSI-2-TN6 Modeling Roghness Effects in Open Channel Flows D.T. Soders and C.W. Hirt Flow Science, Inc. Overview Flows along rivers, throgh pipes and irrigation channels enconter resistance that is proportional

More information

Planning a Smart Card Deployment

Planning a Smart Card Deployment C H A P T E R 1 7 Planning a Smart Card Deployment Smart card spport in Microsoft Windows Server 2003 enables yo to enhance the secrity of many critical fnctions, inclding client athentication, interactive

More information

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02

EMC ViPR. Concepts Guide. Version 1.1.0 302-000-482 02 EMC ViPR Version 1.1.0 Concepts Gide 302-000-482 02 Copyright 2013-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Febrary, 2014 EMC believes the information in this pblication is

More information

10 Evaluating the Help Desk

10 Evaluating the Help Desk 10 Evalating the Help Desk The tre measre of any society is not what it knows bt what it does with what it knows. Warren Bennis Key Findings Help desk metrics having to do with demand and with problem

More information

Deploying Network Load Balancing

Deploying Network Load Balancing C H A P T E R 9 Deploying Network Load Balancing After completing the design for the applications and services in yor Network Load Balancing clster, yo are ready to deploy the clster rnning the Microsoft

More information

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game

Research on Pricing Policy of E-business Supply Chain Based on Bertrand and Stackelberg Game International Jornal of Grid and Distribted Compting Vol. 9, No. 5 (06), pp.-0 http://dx.doi.org/0.457/ijgdc.06.9.5.8 Research on Pricing Policy of E-bsiness Spply Chain Based on Bertrand and Stackelberg

More information

Optimal Trust Network Analysis with Subjective Logic

Optimal Trust Network Analysis with Subjective Logic The Second International Conference on Emerging Secrity Information, Systems and Technologies Optimal Trst Network Analysis with Sbjective Logic Adn Jøsang UNIK Gradate Center, University of Oslo Norway

More information

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings

TrustSVD: Collaborative Filtering with Both the Explicit and Implicit Influence of User Trust and of Item Ratings TrstSVD: Collaborative Filtering with Both the Explicit and Implicit Inflence of User Trst and of Item Ratings Gibing Go Jie Zhang Neil Yorke-Smith School of Compter Engineering Nanyang Technological University

More information

Designing an Authentication Strategy

Designing an Authentication Strategy C H A P T E R 1 4 Designing an Athentication Strategy Most organizations need to spport seamless access to the network for mltiple types of sers, sch as workers in offices, employees who are traveling,

More information

Chapter 1. LAN Design

Chapter 1. LAN Design Chapter 1 LAN Design CCNA3-1 Chapter 1 Note for Instrctors These presentations are the reslt of a collaboration among the instrctors at St. Clair College in Windsor, Ontario. Thanks mst go ot to Rick Graziani

More information

Comparative Studies of Load Balancing With Control and Optimization Techniques

Comparative Studies of Load Balancing With Control and Optimization Techniques 5 American Control Conference ne 8-, 5 Portland, OR, USA WeC5 Comparative Stdies of Load Balancing With Control and Optimization Techniqes Yixin Diao, Chai Wah W, oseph L Hellerstein, Adam Storm, Maheswaran

More information

Planning a Managed Environment

Planning a Managed Environment C H A P T E R 1 Planning a Managed Environment Many organizations are moving towards a highly managed compting environment based on a configration management infrastrctre that is designed to redce the

More information

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems

A Spare Part Inventory Management Model for Better Maintenance of Intelligent Transportation Systems 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 A Spare Part Inventory Management Model for Better Maintenance of Intelligent

More information

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting

Corporate performance: What do investors want to know? Innovate your way to clearer financial reporting www.pwc.com Corporate performance: What do investors want to know? Innovate yor way to clearer financial reporting October 2014 PwC I Innovate yor way to clearer financial reporting t 1 Contents Introdction

More information

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach

Resource Pricing and Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach Resorce Pricing and Provisioning Strategies in Clod Systems: A Stackelberg Game Approach Valeria Cardellini, Valerio di Valerio and Francesco Lo Presti Talk Otline Backgrond and Motivation Provisioning

More information

Meccanica e scienze avanzate dell ingegneria

Meccanica e scienze avanzate dell ingegneria Alma Mater Stdiorm Università di Bologna DOTTORATO DI RICERCA IN Meccanica e scienze avanzate dell ingegneria Ciclo XIII Settore/i scientifico-disciplinare/i di afferenza: ING-IND/3 Meccanica del volo

More information

CHAPTER ONE VECTOR GEOMETRY

CHAPTER ONE VECTOR GEOMETRY CHAPTER ONE VECTOR GEOMETRY. INTRODUCTION In this chapter ectors are first introdced as geometric objects, namely as directed line segments, or arrows. The operations of addition, sbtraction, and mltiplication

More information

MSc and MA in Finance and Investment online Study an online MSc and MA in Finance and Investment awarded by UNINETTUNO and Geneva Business School

MSc and MA in Finance and Investment online Study an online MSc and MA in Finance and Investment awarded by UNINETTUNO and Geneva Business School MSc and MA in Finance and Investment online Stdy an online awarded by UNINETTUNO and Geneva Bsiness School Awarded by Geneva Bsiness School Geneva Barcelona Moscow Class profile The connects yo with stdents

More information

Roth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now

Roth 401(k) and Roth 403(b) Accounts: Pay Me Now or Pay Me Later Why a Roth Election Should Be Part of Your Plan Now Reprinted with permission from the Society of FSP. Reprodction prohibited withot pblisher's written permission. Roth 401(k) and Roth 403(b) Acconts: Why a Roth Election Shold Be Part of Yor Plan Now by

More information

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes

5 High-Impact Use Cases of Big Data Analytics for Optimizing Field Service Processes 5 High-Impact Use Cases of Big Analytics for Optimizing Field Service Processes Improving Field Service Efficiency and Maximizing Eqipment Uptime with Big Analytics and Machine Learning Field Service Profitability

More information

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03

EMC VNX Series. EMC Secure Remote Support for VNX. Version VNX1, VNX2 300-014-340 REV 03 EMC VNX Series Version VNX1, VNX2 EMC Secre Remote Spport for VNX 300-014-340 REV 03 Copyright 2012-2014 EMC Corporation. All rights reserved. Pblished in USA. Pblished Jly, 2014 EMC believes the information

More information

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending

Evolutionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Evoltionary Path Planning for Robot Assisted Part Handling in Sheet Metal Bending Abstract Xiaoyn Liao G. Gary Wang * Dept. of Mechanical & Indstrial Engineering, The University of Manitoba Winnipeg, MB,

More information

MUNICIPAL CREDITWORTHINESS MODELLING BY NEURAL NETWORKS

MUNICIPAL CREDITWORTHINESS MODELLING BY NEURAL NETWORKS 0 Acta Electrotechnica et Informatica Vol. 8, No. 4, 008, 0 5 MUNICIPAL CREDITWORTHINESS MODELLING BY NEURAL NETWORKS Petr HÁJEK, Vladimír OLEJ Institte of System Engineering and Informatics, Faclty of

More information

10.4 Solving Equations in Quadratic Form, Equations Reducible to Quadratics

10.4 Solving Equations in Quadratic Form, Equations Reducible to Quadratics . Solving Eqations in Qadratic Form, Eqations Redcible to Qadratics Now that we can solve all qadratic eqations we want to solve eqations that are not eactly qadratic bt can either be made to look qadratic

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Pgrading To Windows XP 4.0 Domain Controllers and Services

Pgrading To Windows XP 4.0 Domain Controllers and Services C H A P T E R 8 Upgrading Windows NT 4.0 Domains to Windows Server 2003 Active Directory Upgrading yor domains from Microsoft Windows NT 4.0 to Windows Server 2003 Active Directory directory service enables

More information

An accelerated Branch-and-Bound algorithm for assignment problems of utility systems

An accelerated Branch-and-Bound algorithm for assignment problems of utility systems Compters and Chemical Engineering 6 (00) 67 630 www.elsevier.com/locate/compchemeng An accelerated Branch-and-Bond algorithm for assignment problems of tility systems Alexandros M. Strovalis a, Istvan

More information

An unbiased crawling strategy for directed social networks

An unbiased crawling strategy for directed social networks Abstract An nbiased crawling strategy for directed social networks Xeha Yang 1,2, HongbinLi 2* 1 School of Software, Shenyang Normal University, Shenyang 110034, Liaoning, China 2 Shenyang Institte of

More information

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2

A Novel QR Code and mobile phone based Authentication protocol via Bluetooth Sha Liu *1, Shuhua Zhu 2 International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) A Novel QR Code and mobile phone based Athentication protocol via Bletooth Sha Li *1, Shha Zh 2 *1

More information

Stability of Linear Control System

Stability of Linear Control System Stabilit of Linear Control Sstem Concept of Stabilit Closed-loop feedback sstem is either stable or nstable. This tpe of characterization is referred to as absolte stabilit. Given that the sstem is stable,

More information

Designing a TCP/IP Network

Designing a TCP/IP Network C H A P T E R 1 Designing a TCP/IP Network The TCP/IP protocol site defines indstry standard networking protocols for data networks, inclding the Internet. Determining the best design and implementation

More information

Flexible, Low-overhead Event Logging to Support Resource Scheduling

Flexible, Low-overhead Event Logging to Support Resource Scheduling Flexible, Low-overhead Event Logging to Spport Resorce Schedling Jan Stoess University of Karlsrhe Germany stoess@ira.ka.de Volkmar Uhlig IBM T.J. Watson Research Center New York vhlig@s.ibm.com Abstract

More information

Optimal control and piecewise parametric programming

Optimal control and piecewise parametric programming Proceedings of the Eropean Control Conference 2007 Kos, Greece, Jly 2-5, 2007 WeA07.1 Optimal control and piecewise parametric programming D. Q. Mayne, S. V. Raković and E. C. Kerrigan Abstract This paper

More information

In this chapter we introduce the idea that force times distance. Work and Kinetic Energy. Big Ideas 1 2 3. is force times distance.

In this chapter we introduce the idea that force times distance. Work and Kinetic Energy. Big Ideas 1 2 3. is force times distance. Big Ideas 1 Work 2 Kinetic 3 Power is force times distance. energy is one-half mass times velocity sqared. is the rate at which work is done. 7 Work and Kinetic Energy The work done by this cyclist can

More information

EMC VNX Series Setting Up a Unisphere Management Station

EMC VNX Series Setting Up a Unisphere Management Station EMC VNX Series Setting Up a Unisphere Management Station P/N 300-015-123 REV. 02 April, 2014 This docment describes the different types of Unisphere management stations and tells how to install and configre

More information

Candidate: Suzanne Maxwell. Date: 09/19/2012

Candidate: Suzanne Maxwell. Date: 09/19/2012 Medical Coder / Billing Clerk Assessment Report Szanne Maxwell 09/19/2012 www.resorceassociates.com Szanne Maxwell 09/19/2012 Prepared For: NAME Prepared by: John Lonsbry, Ph.D. & Lcy Gibson, Ph.D., Licensed

More information

Choosing an optimal return rate and a reverse logistics policy from the solution of a constrained LQG problem.

Choosing an optimal return rate and a reverse logistics policy from the solution of a constrained LQG problem. Preprints of the 9th Worl Congress The International Feeration of Atomatic Control Cape Town, Soth Africa. Agst 4-9, 04 Choosing an optimal retrn rate an a reverse logistics policy from the soltion of

More information

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know

Closer Look at ACOs. Making the Most of Accountable Care Organizations (ACOs): What Advocates Need to Know Closer Look at ACOs A series of briefs designed to help advocates nderstand the basics of Accontable Care Organizations (ACOs) and their potential for improving patient care. From Families USA Updated

More information

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare

The Time is Now for Stronger EHR Interoperability and Usage in Healthcare The Time is Now for Stronger EHR Interoperability and Usage in Healthcare Sponsored by Table of Contents 03 Stdy: Large Nmber of EHRs Do Not Meet Usability Standards 05 Black Book: EHR Satisfaction Growing

More information

value in arriving packet s header routing algorithm local forwarding table header value output link

value in arriving packet s header routing algorithm local forwarding table header value output link Compter Netorks Roting Algorithms Based on Compter Netorking, 4 th Edition b Krose and Ross Interpla beteen roting, forarding roting algorithm local forarding table header ale otpt link 000 00 0 00 ale

More information

3. DATES COVERED (From- To) Technical 4. TITLE AND SUBTITLE

3. DATES COVERED (From- To) Technical 4. TITLE AND SUBTITLE REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-01-0188 l ne pblic reporting brden tor this collection of information is estimated to average 1 hor per response, inclding the time tor reviewing instrctions,

More information

Sickness Absence in the UK: 1984-2002

Sickness Absence in the UK: 1984-2002 Sickness Absence in the UK: 1984-2002 Tim Barmby (Universy of Drham) Marco Ecolani (Universy of Birmingham) John Treble (Universy of Wales Swansea) Paper prepared for presentation at The Economic Concil

More information

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data

Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Volme: 3 Isse: 8 59-594 Dimension Debasing towards Minimal Search Space Utilization for Mining Patterns in Big Data Dr. M. Naga Ratna Dept. of Compter Science JNTUH College of Engineering Email: mratnajnt@jnth.ac.in

More information

Chapter 2. ( Vasiliy Koval/Fotolia)

Chapter 2. ( Vasiliy Koval/Fotolia) hapter ( Vasili Koval/otolia) This electric transmission tower is stabilied b cables that eert forces on the tower at their points of connection. In this chapter we will show how to epress these forces

More information

Document management and records (based in part upon materials by Frank Upward and Robert Hartland)

Document management and records (based in part upon materials by Frank Upward and Robert Hartland) Today s lectre IMS1603 Lectre 21 What does docment management entail? Docment management and records (based in part pon materials by Frank Upward and Robert Hartland) www.monash.ed. a Thinking more abot

More information

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas

Joint Routing and Scheduling in Multi-hop Wireless Networks with Directional Antennas Joint Roting and Schedling in Mlti-hop Wireless Netorks ith Directional Antennas Partha Dtta IBM Research India parthdt@in.ibm.com Viek Mhatre Motorola Inc. iekmhatre@motorola.com Debmalya Panigrahi CSAIL,

More information

f.airnet DECT over IP System

f.airnet DECT over IP System The modlar IP commnication system for voice and messaging with the greatest mobility: flexible, easy to maintain, expandable. Fnkwerk Secrity Commnications For s, efficient commnication is vital. New:

More information

HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES

HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES HOMOTOPY FIBER PRODUCTS OF HOMOTOPY THEORIES JULIA E. BERGNER Abstract. Gien an appropriate diagram of left Qillen fnctors between model categories, one can define a notion of homotopy fiber prodct, bt

More information

Construction of Management Information Systems of Distributed Business Processes Based on Petri Networks and Object-Role Modeling

Construction of Management Information Systems of Distributed Business Processes Based on Petri Networks and Object-Role Modeling saqartvelos mecnierebata erovnli akademiis moambe, t 8, #1, 2014 BULLETIN OF THE GEORGIAN NATIONAL ACADEMY OF SCIENCES, vol 8, no 1, 2014 Informatics Constrction of Management Information Systems of Distribted

More information

The Good Governance Standard for Public Services

The Good Governance Standard for Public Services The Good Governance Standard for Pblic Services The Independent Commission for Good Governance in Pblic Services The Independent Commission for Good Governance in Pblic Services, chaired by Sir Alan Langlands,

More information

LIMITS IN CATEGORY THEORY

LIMITS IN CATEGORY THEORY LIMITS IN CATEGORY THEORY SCOTT MESSICK Abstract. I will start assming no knowledge o category theory and introdce all concepts necessary to embark on a discssion o limits. I will conclde with two big

More information

Query Optimization in Microsoft SQL Server PDW

Query Optimization in Microsoft SQL Server PDW Qery Optimization in Microsoft SQL Server PDW Srinath Shankar, Rimma Nehme, Josep Agilar-Saborit, Andrew Chng, Mostafa Elhemali, Alan Halverson, Eric Robinson, Mahadevan Sankara Sbramanian, David DeWitt,

More information

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks

An Energy-Efficient Communication Scheme in Wireless Cable Sensor Networks This fll text aer was eer reiewed at the direction of IEEE Commnications Society sbject matter exerts for blication in the IEEE ICC 11 roceedings An Energy-Efficient Commnication Scheme in Wireless Cable

More information

Research Article Multiple Beam Selection for Combing M2M Communication Networks and Cellular Networks with Limited Feedback

Research Article Multiple Beam Selection for Combing M2M Communication Networks and Cellular Networks with Limited Feedback International Jornal of Distribted Sensor Networks Volme 2013, Article ID 540849, 11 pages http://dx.doi.org/10.1155/2013/540849 Research Article Mltiple Beam Selection for Combing M2M Commnication Networks

More information

Sample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification

Sample Pages. Edgar Dietrich, Alfred Schulze. Measurement Process Qualification Sample Pages Edgar Dietrich, Alfred Schlze Measrement Process Qalification Gage Acceptance and Measrement Uncertainty According to Crrent Standards ISBN: 978-3-446-4407-4 For frther information and order

More information

The Role of the Community Occupational Therapist

The Role of the Community Occupational Therapist Ceredigion Conty Concil Social Services Department The Role of the Commnity Occpational Therapist...taking care to make a difference Large Print or other format/medim are available on reqest please telephone

More information

A Stdy on Cstomer Service Qality of Banks in India Dr. Manasa Nagabhshanam Lead Researcher Analyz Research Soltions Pvt. Ltd. Bangalore BLANK Table of Contents Chapter 1 315-317 Introdction 315 1.1 Role

More information

2.1 Unconstrained Graph Partitioning. 1.2 Contributions. 1.3 Related Work. 1.4 Paper Organization 2. GRAPH-THEORETIC APPROACH

2.1 Unconstrained Graph Partitioning. 1.2 Contributions. 1.3 Related Work. 1.4 Paper Organization 2. GRAPH-THEORETIC APPROACH Mining Newsgrops Using Networks Arising From Social Behavior Rakesh Agrawal Sridhar Rajagopalan Ramakrishnan Srikant Yirong X IBM Almaden Research Center 6 Harry Road, San Jose, CA 95120 ABSTRACT Recent

More information

High Availability for Microsoft SQL Server Using Double-Take 4.x

High Availability for Microsoft SQL Server Using Double-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x High Availability for Microsoft SQL Server Using Doble-Take 4.x pblished April 2000 NSI and Doble-Take are registered trademarks of Network

More information

A taxonomy of knowledge management software tools: origins and applications

A taxonomy of knowledge management software tools: origins and applications Evalation and Program Planning 25 2002) 183±190 www.elsevier.com/locate/evalprogplan A taxonomy of knowledge management software tools: origins and applications Peter Tyndale* Kingston University Bsiness

More information

LSN RF Fire Detection System

LSN RF Fire Detection System 17 19 18 34 3 50 49 21 20 36 35 52 51 23 2 38 37 54 53 24 10 26 25 40 39 5 57 56 13 12 28 27 42 41 59 58 15 14 30 29 4 43 61 60 16 32 31 46 45 63 62 48 47 64 Fire Alarm Systems LSN RF Fire Detection System

More information

Mutualcast: An Efficient Mechanism for One-To-Many Content Distribution ABSTRACT Categories and Subject Descriptors General Terms Keywords

Mutualcast: An Efficient Mechanism for One-To-Many Content Distribution ABSTRACT Categories and Subject Descriptors General Terms Keywords Mtalcast: An Efficient Mechanism for One-To-Many Content Distribtion Jin Li, Philip A. Cho and Cha Zhang, Microsoft Research, Commnication and Collaboration Systems Grop One Microsoft Way, Bld. 3, Redmond,

More information

4.1 Work Done by a Constant Force

4.1 Work Done by a Constant Force 4.1 Work Done by a Constant orce work the prodct of the magnitde of an object s and the component of the applied force in the direction of the Stdying can feel like a lot of work. Imagine stdying several

More information

STI Has All The Pieces Hardware Software Support

STI Has All The Pieces Hardware Software Support STI Has All The Pieces Hardware Software Spport STI has everything yo need for sccessfl practice management, now and in the ftre. The ChartMaker Medical Site Incldes: Practice Management/Electronic Billing,

More information

6 Funding and Staffing the Central IT Help Desk

6 Funding and Staffing the Central IT Help Desk 6 Fnding and Staffing the Central IT Help Desk Money may kindle, bt it cannot itself, or for very long, brn. Igor Stravinsky Key Findings At most instittions the central IT bdget is a major sorce of help

More information

Effect of flow field on open channel flow properties using numerical investigation and experimental comparison

Effect of flow field on open channel flow properties using numerical investigation and experimental comparison INTERNATIONAL JOURNAL OF ENERGY AND ENVIRONMENT Volme 3, Isse 4, 2012 pp.617-628 Jornal homepage: www.ijee.ieefondation.org Effect of flow field on open channel flow properties sing nmerical investigation

More information

Linear Programming. Non-Lecture J: Linear Programming

Linear Programming. Non-Lecture J: Linear Programming The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Socrates Th extremes of

More information

8 Service Level Agreements

8 Service Level Agreements 8 Service Level Agreements Every organization of men, be it social or political, ltimately relies on man s capacity for making promises and keeping them. Hannah Arendt Key Findings Only abot 20 percent

More information

SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS

SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS SIMPLE DESIGN METHOD FOR OPENING WALL WITH VARIOUS SUPPORT CONDITIONS Jeng-Han Doh 1, Nhat Minh Ho 1, Griffith School of Engineering, Griffith University-Gold Coast Camps, Qeensland, Astralia ABSTRACT

More information

DIRECT TAX LAWS Taxability of Capital Gains on By-back of Shares - Debate ignites after AAR s rling in RST s case BACKGROUND 1. Recently, the Athority for Advance Rlings ( AAR ) in the case of RST, In

More information

FUNCTIONAL COEFFICIENT MODELS UNDER UNIT ROOT BEHAVIOR. 1. Introduction

FUNCTIONAL COEFFICIENT MODELS UNDER UNIT ROOT BEHAVIOR. 1. Introduction FUNCTIONAL COEFFICIENT MODELS UNDER UNIT ROOT BEHAVIOR TED JUHL Abstract. We analyze the statistical properties of nonparametrically estimated fnctions in a fnctional-coefficient model if the data has

More information

DATA ANALYSIS II. Matrix Algorithms

DATA ANALYSIS II. Matrix Algorithms DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where

More information

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris.

Motorola Reinvents its Supplier Negotiation Process Using Emptoris and Saves $600 Million. An Emptoris Case Study. Emptoris, Inc. www.emptoris. Motorola Reinvents its Spplier Negotiation Process Using Emptoris and Saves $600 Million An Emptoris Case Stdy Emptoris, Inc. www.emptoris.com VIII-03/3/05 Exective Smmary With the disastros telecommnication

More information

MING-CHIH YEH LEE, B.A., M.S. A THESIS COMPUTER SCIENCE

MING-CHIH YEH LEE, B.A., M.S. A THESIS COMPUTER SCIENCE NEURAL NETWORK STRUCTURE MODELING: AN APPLICATION TO FONT RECOGNITION by MING-CHIH YEH LEE, B.A., M.S. A THESIS IN COMPUTER SCIENCE Sbmitted to the Gradate Faclty of Texas Tech University in Partial Flfillment

More information

Adaptive Neural-Network Control for Redundant Nonholonomic Mobile Modular Manipulators

Adaptive Neural-Network Control for Redundant Nonholonomic Mobile Modular Manipulators Adaptive Neral-Network Control for Redndant Nonholonomic obile odlar aniplators Yangmin Li, Ygang Li, and Shaoze Yan Faclty of Science and Technology, University of aca, Av. Padre Tomas Pereira S.J., Taipa,

More information

FaceTrust: Assessing the Credibility of Online Personas via Social Networks

FaceTrust: Assessing the Credibility of Online Personas via Social Networks FaceTrst: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos Kyngbaek Kim Xiaowei Yang Dke University University of California, Irvine Dke University msirivia@cs.dke.ed

More information