X On Bitcoin and Red Balloons

Size: px
Start display at page:

Download "X On Bitcoin and Red Balloons"

Transcription

1 X On Bitcoin an Re Balloons Moshe Babaioff, Microsoft Research, Silicon Valley. Shahar Dobzinski, Department of Computer Science, Cornell University. Sigal Oren, Department of Computer Science, Cornell University. Aviv Zohar, Microsoft Research, Silicon Valley. Many large ecentralize systems rely on information propagation to ensure their proper function. However, it is common that only participants that are aware of the information can compete for some rewar, an thus informe participants have an incentive not to propagate information to others. One recent scenario in which such tension arises is the 2009 DARPA Network Challenge fining re balloons. We focus on another prominent scenario: Bitcoin, a ecentralize electronic currency system. Bitcoin represents a raical new approach to monetary systems. It has been getting a large amount of public attention over the last year, both in policy iscussions an in the popular press [Davis 2011; Surowiecki 2011]. Its cryptographic funamentals have largely hel up even as its usage has become increasingly wiesprea. We fin, however, that it exhibits a funamental problem of a ifferent nature, base on how its incentives are structure. We propose a moification to the protocol that can eliminate this problem. Bitcoin relies on a peer-to-peer network to track transactions that are performe with the currency. For this purpose, every transaction a noe learns about shoul be transmitte to its neighbors in the network. As the protocol is currently efine an implemente, it oes not provie an incentive for noes to broacast transactions they are aware of. In fact, it provies a strong incentive not to o so. Our solution is to augment the protocol with a scheme that rewars information propagation. Since clones are easy to create in the Bitcoin system, an important feature of our scheme is Sybil-proofness. We show that our propose scheme succees in setting the correct incentives, that it is Sybil-proof, an that it requires only a small payment overhea, all this is achieve with iterate elimination of ominate strategies. We complement this result by showing that there are no rewar schemes in which information propagation an no self-cloning is a ominant strategy. 1. INTRODUCTION In 2009 DARPA announce the DARPA Network Challenge, in which participants compete to fin ten re weather balloons that were isperse across the Unite States [DARPA 2009]. Face with the aunting task of locating balloons sprea across a wie geographical area, participating teams attempte to recruit iniviuals from across the country to help. The winning team from MIT [Pickar et al. 2011], incentivize balloon hunters to seek balloons by offering them rewars of $2000 per balloon. Furthermore, after recognizing that notifying iniviuals from all over the US about these rewars is itself a ifficult unertaking, the MIT team cleverly offere aitional rewars of $1000 to the person who irectly recruite a balloon finer, a rewar of $500 to his recruiter, an so on. These aitional payments create the incentive for participants to sprea the wor about MIT s offer of rewars an were instrumental in the team s success. In fact, some aitional rewars are necessary: each aitional balloon hunter competes with the participants in his vicinity, an reuces their chances of getting the prize. The MIT scheme as escribe above is susceptible to the following attack. A participant can create a fake ientity, invite the fake ientity to participate, an use that ientity to recruit others. Thus, when participants can create a fake ientities the rewar scheme shoul be carefully esigne so it oes not create an incentive for such

2 X:2 attacks. Our goal is to esign rewar schemes that incentivize information propagation an counter the is-incentive that arises from the competition with other noes, an are Sybil proof robust against creating clones, or Sybil attacks while having a low overhea a total rewar that is not too high. A relate setting is a raffle, in which people purchase numbere tickets in hopes of winning some luxurious prize. Each ticket has the same probability of winning, an the prize is always allocate. As more tickets are sol, the probability that a certain ticket will win ecreases. In this case again, there is a clear tension between the organizer of the raffle, who wants as many people to fin out about the raffle, an the participants who have alreay purchase tickets an want to increase their iniviual chances of winning. The lesson here is simple, to make raffles more successful participants shoul be incentivize to sprea the wor. One example of a raffle which is alreay implemente in this way is Expeia s FrienTrips, in which the more friens you recruit the bigger your probability of winning. As apparent from the previous examples, the tension between information propagation an an increase competition is a general problem. We ientify an instantiation of this tension in the Bitcoin protocol, our main example for the rest of the paper. Bitcoin is a ecentralize electronic currency system propose by Satoshi Nakamoto in 2008 as an alternative to current government-backe currencies. 1 Bitcoin has been actively running since Its appeal lies in the ability to quickly transfer money over the internet, an in its relatively low transaction fees. 2 As of February 2012, it has 8.2 million coins in circulation calle Bitcoins which are trae at a value of approximately 6 USD per bitcoin. Below, we give a brief explanation of the Bitcoin protocol an then explain where the incentives problem appears. A more comprehensive escription of the protocol is given in Appenix A. Bitcoin relies on a peer-to-peer network to verify an authorize all transactions that are performe with the currency. Suppose that Alice wants to reserve a hotel room for 30 bitcoins. Alice cryptographically signs a transaction to transfer 30 bitcoins from her to the hotel, an sens the signe transaction to a small number of noes in the network. Each noe in the network propagates the transaction to its neighbors. A noe that receives the transaction verifies that Alice has signe it an that she oes inee own the bitcoins she is attempting to transfer. The noe then tries to authorize the transaction by attempting to solve a computationally har problem basically inverting a hash function. Once a noe successfully authorizes a transaction, it sens the proof the inverte hash to all of its neighbors. They in turn, sen the information to all of their neighbors an so on. Finally, all noes in the network agree that Alice s bitcoins have been transferre to the hotel. To motivate them to authorize transactions, noes are offere a payment in bitcoins for successful authorizations. The system is currently in its initial stages, in which noes are pai a preetermine amount of bitcoins that are create out of thin air. This also slowly buils up the bitcoins supply. But Bitcoin s protocol specifies an exponentially ecreasing rate of money creation that effectively sets a cap on the total number of bitcoins that will be in circulation. As this payment to noes is slowly phase out, bitcoin owners that want their transactions approve are suppose to pay fees to the authorizing noes. 1 The real ientity of Satoshi Nakamoto remains a mystery. A recent New Yorker article [Davis 2011] attempts to ientify him. 2 There are aitional properties that some consier as benefits: Bitcoins are not controlle by any government, an its supply will eventually be fixe. Aitionally, it offers some egree of anonymity although this fact has been conteste [Rei an Harrigan 2011].

3 This is where the incentive problem manifests itself. A noe in the network has an incentive to keep the knowlege of any transaction that offers a fee to itself, as any other noe that becomes aware of the transaction will compete to authorize first an claim the associate fee. For example, if only a single noe is aware of a transaction, it can eliminate competition altogether by not istributing information further. With no competition, the informe noe will eventually succee in authorizing an collect the fee. The consequences of such behavior may be evastating: as only a single noe in the network works to authorize each transaction, authorization is expecte to take a very long time. 3 We stress that every change in the Bitcoin protocol has to take into account Sybil attacks, as false ientities are a prominent concern. Given this concern the Bitcoin protocol is esigne to ensure that if a majority of processing power, rather than majority of eclare ientities, follow the protocol, it will not be possible to manipulate the history of authorize transactions. Notice that simply using a majority of eclare ientities is vulnerable to Sybil attacks, as ientities are easy to spoof. Therefore any rewar scheme for transaction propagation must also iscourage Sybil attacks. A Simplifie Moel. We now present our moel, using Bitcoin as our running example. For simplicity assume that only one transaction is awaiting authorization. We moel the authorization process as ivie into two phases: the first phase is a istribution phase. The secon one is a computation phase, in which every noe that has receive the transaction is attempting to authorize it. We start with escribing the istribution network. We assume that the network consists of a forest of -ary irecte trees, each of them of height H. The istribution phase starts when the buyer sens the etails of the transaction to the t roots of the trees which we shall term sees. We think of the trees as irecte, since the information about the transaction flows from the root towars the leaves. The epth of a noe is the number of noes on the path from the root of the noe s tree the see to the noe. Let n = t H 1 1 be the total number of noes. In the istribution phase, each noe v can sen the transaction to any of its neighbors after aing any number of fake ientities of itself before sening to that neighbor. Noe v can only relay the transaction to its original chilren aing fake ientities oes not change the neighbors of v. Naturally, a noe can conition its behavior only on the information available to it: the length of the chain above it which can possibly inclue false ientities that were prouce by its ancestors. In the computation phase each noe that is aware of the transaction tries to authorize it 4. If there are k such noes, each of them has the same probability of 1 k to be the first to authorize the transaction. Note that k is the number of real noes, fake ientities o not increase the probability of winning the rewar. A noe v that authorizes the transaction can eclare that it i so with any ientity p h it create. This etermines a chain of ientities p 1,..., p h which we call the authorizing chain. The chain ens with p h, the eclare ientity of the authorizer, an starts with p 1, an ientity of the see that roots the tree v is in. This chain is a superset of the real path in the X:3 3 Bitcoin s ifficulty level is ajusting automatically to account for the total amount of computation in the network. The expecte time of a single machine to authorize a transaction is currently on the orer of 60 ays, instea of the 10 minutes it is expecte to take if the entire network competes to authorize. 4 In the Bitcoin protocol multiple transactions are place at the same block an the cost of authorizing the entire block is fixe, essentially inepenent of the content of the block. Focusing on the issue of incentives to propagate information, in this paper we have assume that every noe tries to authorize any transaction it is aware of since the cost of aing it the block it is attempting to authorize anyways is negligible. In future work one might consier stuying the issue of sharing the cost of computation between transactions in a block in a way that motivates the noes to compute.

4 X:4 tree, potentially incluing clones of some noes noes are not able to remove preecessor ientities from the chain ue to the use of cryptographic signatures. Rewars are allocate to ientities on the authorizing chain in reverse orer, rewar r 1 is allocate to the authorizing ientity an r h to the see. Each noe s rewar is the sum of the rewars of all its ientities true an fake in the authorizing chain. Currently the bitcoin protocol requires to attach a minimal rewar c > 0 to every transaction. This rewar is given to the noe that authorizes the transaction. This is the prize that the noes are competing on. We normalize c to be 1. We assume that all players are expectation maximizers, so the utility of a player in a given profile is its expecte utility, where expectation is taken over the ranom selection of the authorizer w. Our Results. A successful rewar scheme has to posses several properties. First, it has to incentivize information propagation an no uplication. That is, it will be in a noe s best interest to istribute the transaction to all its chilren without uplicating itself, as well as never uplicating when it authorizes. Secon, at the en of the istribution phase most of the noes have to be aware of the transaction. Lastly, we woul like to achieve this with small rewars, while minimizing the number of sees, to ease the buren of initial istribution. Designing a scheme that simultaneously has all these properties is obviously not a trivial task, an in particular specific care has to be given to the Sybil proofness requirement. The current literature on the Sybil proof mechanisms contains mostly negative results, an in the few cases in which a positive result is obtaine, the setting is usually very specific. The reason is previous works insiste that creating Sybils will never be profitable. In contrast, we use our game theoretic moel to take an alternative path: we will guarantee these properties, Sybil proofness in particular, in equilibrium. Using this concept, we introuce a new family of schemes: almost uniform schemes. Each member in the family is parameterize by a height parameter H an a rewar parameter β. Let v be the noe that authorize the transaction an suppose that v is the l th noe in the chain. If l > H no noe is reware so noes far from the see will not attempt to authorize the transaction. Otherwise, each noe in the chain except v gets a rewar of β, an v gets a rewar of 1 + H l + 1β. We show that if there are Ωβ 1 sees, only strategy profiles that exhibit information propagation an no uplication survive every orer of iterate removal of ominate strategies. Furthermore, there exists an orer in which no other strategy profiles survive. Iterate removal of ominate strategies is the following common technique for solving games: first the set of surviving strategies of each player is initiate to all its strategies. Then at each step, a strategy of one of the players is eliminate from the set. The strategy that is eliminate is one that is ominate by some other strategy of the same player with respect to the strategies in the surviving sets of all other players. This process continues until there is no strategy that can be remove. The solution concept prescribes that each player will only play some strategy from his surviving set. In general the surviving sets can epen on the orer in which strategies are eliminate. Yet, we show that in our case, regarless of the orer of elimination, profiles of strategies in which every noe propagates information an never uplicates, survive. Moreover, for a specific orer of elimination they are the only strategies that survive. Although the escription of our schemes is simple, the analysis itself is quite elicate, but let us give a bir-eye view of it now. The intuition behin the elimination process is that ecreasing competition by your own escenants might be unprofitable ue to possibly losing rewars for relaying, in case one of these escenants authorizes. Consier one particular noe. It faces the following ilemma: by uplicating itself one more time it increases its rewar in case one of its escenants authorizes the transac-

5 tion, but it potentially ecreases the number of escenants aware of the transaction, an thus may ecrease its expecte rewar. To see this, consier, for simplicity, a see. Suppose, for the sake of explanation, that all of its escenants always propagate information an never uplicate. If the see oes not clone itself then each one of its chilren spans a -array tree of height H 1. If it clones itself once, then each one of its chilren spans a -array tree of smaller height of H 2, an the number of escenants of the noe that receive the information ecreases by almost factor. This simple observation stans at the heart of the analysis, but the reaer shoul note that it is over simplifie: it is far from being clear that the escenants will propagate information with no uplication in this scheme. As explaine, if the amount of external competition from non-escenent noes is small, a noe prefers not to istribute the transaction, an thus increase the probability that it receives the rewar for authorization. However, if sufficiently many nonescenent noes are aware of the transaction, the noe prefers to uplicate itself one less time, an thus istribute the transaction to its chilren an increase its potential istribution rewar. Once all noes increase istribution, the arms race begins: the competition each noe faces is greater, an again it prefers to uplicate itself one less time an istribute all the way to its gran-chilren. As this process continues, all noes eventually prefer to istribute fully an never to uplicate. Two values of β give us schemes that are of particular interest. The first is when β = 1. In this case the 1, H-almost-uniform scheme requires only a constant number of sees an the total payment is always OH. The secon scheme is the 1 H, H-almostuniform scheme. This scheme works if the number of sees is ΩH. Its total payment is 2. We combine both schemes to create a rewar scheme that has both a constant number of sees an a constant overhea. The Hybri Scheme first istributes the transaction to a constant number of sees using the 1, 1 + log H-almost-uniform scheme. Then we can argue that at least H noes are aware of the transaction. This fact enables us to further argue that the 1 H, H-almost uniform scheme guarantees that the transaction is istribute to trees of height H. At the en of the istribution phase, most of the noes that are aware of the transaction receive a rewar of 1 H if they are in the successful chain, so the expecte overhea is low. We have the following imprecisely state theorem: X:5 Theorem: In the hybri rewaring scheme, if the number of sees t 14, the only strategies that always survive iterate elimination of ominate strategies exhibit information propagation an no uplication. In aition, there exists an elimination orer in which the only strategies that survive exhibit information propagation an no uplication. Furthermore, the expecte total sum of payments is at most 3. Notice that this scheme exhibits in equilibrium low overhea, Sybil proofness, an provies the noes with an incentive to propagate information. Iterate removal of ominate strategies is a strong solution concept, but ieally we woul like our rewaring scheme to achieve all esire properties in the stronger notion of ominant strategies equilibrium. However, we show that this is impossible to achieve: Theorem: Suppose that H 3. There is no Sybil-proof rewar scheme in which information propagation an no uplication are ominant strategy for all noes at epth 3 or less. Relate Work. The paper escribing Bitcoin s principles was originally publishe as a white paper by Satoshi Nakamoto [2008]. The protocol was since evelope in an

6 X:6 open-source project. To ate, no formal ocument escribes the protocol in its entirety, although the open source community maintains wiki pages evote to that purpose. Some research has been conucte with regars to its privacy [Rei an Harrigan 2011]. Krugman [2011] iscusses some relate economic concerns. Chitnis et al. [2012] iscuss other game theoretic aspects of the DARPA Network Challenge such as fining the best strategy for a group to fin the balloons. The subject of incentives for information issemination, especially in the context of social an peer-to-peer networks has receive some attention in recent years. Kleinberg an Raghavan [2005] consier incentivizing noes to search for information in a social network. A noe that possesses the information is reware for relaying it back, as are noes along the path to it. A key ifference between their moel an ours, is that unlike in our moel, in their moel noes either posses the sought-after information or o not. If they o, then there is no nee for further propagation, an if they o not, they cannot themselves generate the information, an so o not compete with noes they transmit to they o however compete for the propagation rewars with other unrelate noes. Douceur an Moscibroa [2007] esign recruitment mechanisms similar in spirit to our own to ai incremental eployment in networke systems. They formalize various properties schemes shoul ieally uphol an present mechanisms as well as impossibility results. Unlike our work, their moel an properties are not game theoretic, an the strategies of ifferent participants are not consiere or analyze with respect to any solution concept. Emek et. al. [2011] consier rewar schemes for social avertising scenarios. In their moel, the goal of the scheme is to avertise to as many noes as possible, while rewaring noes for forwaring the avertisement. Unlike their scenario, in our case the scheme is eventually only aware of a chain that results in a successful authorization, an only awars noes on the path to the successful authorizer. Other works consier propagation in social networks without the aspect of incentives. For example [Dyagilev et al. 2010], which consiers ways to etect propagation events an examines ata from cellular call ata. Future Research. In this work we propose a novel low cost rewar scheme that incentivizes information propagation an is Sybil proof. Currently we assume that the istributing network is moele as a forest of t complete -ary trees. A challenging open question is to consier other types of networks, for example ranom -regular graphs, which may capture better peer-to-peer networks 5. Another interesting extension to consier is one in which noes have ifferent processing power. That is, each noe v has a processing power CP U v, then the probability of a noe v that is aware of CP U the transaction to authorize it is v Σ ucp U u. We leave the analysis of these moels, as well as the implementation an empirical experimentation, to future research. 2. NEW REWARD SCHEMES Our main result is the Hybri scheme, a rewar scheme that requires only a constant number of sees an a constant overhea. We will show that the only strategies that always survive iterate removal of ominate strategies are ones that exhibit information propagation an no uplication. The basic builing blocks for this construction 5 Notice that when is small e.g. constant an the number of noes n is large, transaction propagation in a ranom graph till about 1/ fraction of the graph receives the information resembles a tree. In some sense, builing incentives for information propagation in trees is harer than general graphs as each noe monopolizes the flow of information to its escenants.

7 is a family of schemes, almost-uniform schemes, with less attractive properties. However, we will show that combining together two almost-uniform schemes enables us to obtain the improve properties of the Hybri scheme The Basic Builing Blocks: Almost-Uniform Schemes The β, H-almost-uniform scheme pays the authorizing noe in a chain of length h a rewar of 1 + β H h + 1. The rest of the noes in the chain get a rewar of β. If the chain length is greater than H no noe receives a rewar. The iea behin giving the authorizing noe a rewar of 1 + β H h + 1 is to mimic the rewar that the noe woul have gotten if it uplicate itself H h times. Therefore, we can assume that no noe uplicates itself before trying to authorize the transaction, an focus only on uplication before sening to its chilren. Figure 1 illustrates the rewar scheme. X:7 Fig. 1. An example of the transaction relay chain from the see v 1 to the authorizing noe v 5 in the β, H- almost-uniform scheme. In the example, noe v 3 ae 2 fake ientities v 3 an v 3 before relaying the transaction to v 4, all other noes relay with no uplications. The payment to each ientity appears below the chain, note that noe v 3 receives 3β in total ue to its clones. Each true ientity is associate with a level, representing the maximal number of ientities true an fake it coul have ae to the prefix of the chain when receiving it, to get to a chain of length H. THEOREM 2.1. Let 3. Suppose that the number of sees is t 7 an in aition there are initially at least 2β noes except the t sees that are aware of the transaction. In the β, H-almost-uniform scheme only profiles of strategies in which every noe of epth at most H never uplicates an always propagates information survive in every iterate removal of weakly ominate strategies. Furthermore, there is an elimination orer in which only these profiles of strategies survive. The total payment is 1 + H β. While the 2β aitional noes that are aware the transaction are not necessarily sees, for now, one can think about them as aitional sees. The Hybri scheme will exploit this extra flexibility to simultaneously obtain low overhea an small number of sees. Before proving the theorem, let us mention two of its applications: COROLLARY 2.2. Let 3. 1 Consier the 1 H, H-almost uniform scheme β = 1 H, with at least 2H + 13 sees. Only profiles of strategies in which every noe of epth at most H never uplicates an always propagates information survive in every iterate removal of weakly ominate strategies. Furthermore, there is an elimination orer in which only these profiles of strategies survive. The total payment is 2. 2 Consier the 1, H-almost uniform scheme β = 1 with at least 15 sees. Only profiles of strategies in which every noe of epth at most H never uplicates an

8 X:8 always propagates information survive in every iterate removal of weakly ominate strategies. Furthermore, there is an elimination orer in which only these profiles of strategies survive. The total payment is H + 1. Both parts of the corollary are irect applications of the theorem, by making sure that the number of initial sees is at least 2β The next subsection introuces the Hybri scheme that combines between two almost uniform schemes, one with β = 1 an one with β = 1 H, an obtain a scheme that uses both a constant number of sees an its total expecte payment is a small constant that oes not epen on H. The rest of the section is organize as follows. In Subsection 2.3 we prove our Theorem 2.1. The next subsection presents the Hybri scheme. Appenix A.4 iscusses how to implement the Hybri scheme within the framework of the Bitcoin protocol The Final Construction: The Hybri Scheme We now present our main construction, the Hybri scheme. The scheme works as follows: we run the 1 H, H-almost uniform scheme with a set of A sees A = a an simultaneously run the 1, 1 + log H-almost uniform scheme 6 with a set of B sees B = b. THEOREM 2.3. Assume that 3, t 15 an consier the Hybri scheme with set A of size a = t 7 an set B of size b = 7. Let Z be the set of noes of epth at most H in trees roote by sees in A, an 1 + log H for noes roote by sees in B. In the Hybri scheme only profiles of strategies in which every noe in Z never uplicates an always propagates information survive in every iterate removal of weakly ominate strategies. Furthermore, there is an elimination orer in which only these profiles of strategies survive. The total payment is in expectation at most 3, an 2+log H in the worst case. At least t 7 t -fraction of the network is aware of the transaction after the istribution phase. PROOF. The theorem is a consequence of Theorem 2.1: all noes up to epth log H in trees roote by noes in B will propagate information an will not uplicate themselves. Thus, when consiering the noes in A, there are at least 7 log H 1 1 7H 2H + 6 noes that are aware of the transaction, which are not part of the trees roote by noes in A. Thus we can apply again Theorem 2.1 to claim each see in A roots a full tree of height H. Notice that the worst case payment is 1+log H because of the use of the 1, 1+log H- almost uniform scheme. The expecte payment is a H b H log H a H b H As for the number of noes that are aware of the transaction at the en of the istribution phase: all trees roote by noes in A are fully aware of the transaction. a These noes are at least a+b-fraction of the network notice that we conservatively ignore noes roote by sees in B that are aware of the transaction Proof of Theorem 2.1 Given specific values of β an H, the β, H-almost uniform scheme efines the utilities of the noes. We next consier the β, H-game which is the game the noes are playing given these utilities an their strategies Notation an Formalities for the β, H-game. In orer to present the proof we nee to establish some notations regaring the β, H-game. 6 All logarithms in this paper have base, so we write log H to enote log H.

9 We start by iscussing the strategy space of a noe. Only noes that are aware of the transaction can relay it an get any rewar, so we focus on these noes an ignore all other noes. A noe v that receives information from his parent observes a chain of ientities p 1, p 2,..., p h, ening with its own ientity p h = v which follows its parent ientity p h 1 is v s parent if v is not a see. If v is a see the chain has only one element p 1 = v. This chain is the result of the strategies of v s ancestors, which we iscuss below. The chain p 1, p 2,..., p h = v which v observes efines v s level lv, which is the maximal number of ientities true an fake it can have in any completion of the observe chain to a chain of length H. Thus, for i H the level of v is lv = H i+1 note that the level of each see is efine to be H. For i > H we efine lv = 0. A strategy of a noe can only epens on the length of the chain it observes. Note that for any chain of length at most H there is a one to one mapping between the length of the chain v observes an the level of v, so we think of v s strategy as a function of it level lv. When a noe v receives the transaction, it ecies, for each of its chilren, whether he wants to sen the transaction an the number of times it uplicates itself before sening. One aitional ecision is whether the noe wants to uplicate itself when authorizing the transaction. As iscusse above, both ecisions are base on the level of v an nothing else. For each noe v an level l, c l,v 1 enotes the number of times v clones itself before sening the transaction to its i th chil. Aitionally, p l,v enotes the number of times a noe uplicates itself before it tries to authorize the transaction note that if it succees it will use its last ientity to report its success. With these notations we can finally represent the strategies of the noes. The strategy S v of a noe v is represente as follows: for every 1 l H, there is a tuple S v l = c l,v 1,..., cl,v where 0 c l,v l 1 an a number 0 p l,v l 1. Observe that once we fix the i strategies of all noes, the chain each noe v observes if at all is fixe. If noe v of level l ecies not to sen the transaction to its i s chil it can implement this by setting c l,v i = l 1. Now we can say that a noe v propagates information an oes not uplicate at level l if S v l = 0,..., 0 an p l,v = 0. We also say that a noe v never uplicates an always propagates information, if for every level l noe v propagates information an oes not uplicate at level l. Given a strategy profile S an a rewar scheme the utility of each noe is efine as follows. An authorizer w is chosen uniformly at ranom among the players that are aware of the transaction an try to authorize it. Let p 1, p 2,..., p h be the authorizing chain, it ens with the last ientity of w an starts with p 1 = s where s is the see that roots the tree of w. Denote l = H h + 1. Then, we allocate rewars to all ientities in the chain: w gets a rewar of r1,l s, its preecessor gets rs 2,l an so on. The total rewar a noe receives is the sum of rewars of its true an fake ientities in the successful chain The Proof Framework. We start with the following efinition. The intuition is that in a ϕ-subgame a noe that has H l ancestors incluing clones, oes not clone itself an propagates information if l ϕ + 1. Otherwise for every chil it uplicates itself at most l ϕ 1 times. Definition 2.4. The ϕ-subgame is the β, H-game with restricte strategy spaces: the strategy space of noe v inclues only strategies such that for every remaining strategy profile of the rest of the players, every i an lv: c lv,v i max{lv ϕ 1, 0}. The technical core of the proof is the following lemma: X:9

10 X:10 LEMMA 2.5. In the ϕ-subgame, suppose that there are at least 7 sees, an at least 2β aitional noes are aware of the transaction. Then, any strategy c lv,v 1,..., c lv,v of noe v such that some c lv,v i = lv ϕ 1 is ominate by the strategy c lv 1,..., c lv,v i 1, clv,v i 1, c lv,v i+1,..., clv,v. The proof of the lemma is in Subsection Let us show how to use the lemma in orer to prove the theorem. First, we observe that the 0-subgame is simply the β, H-game. If the conitions of the lemma hol, we can apply the lemma to eliminate all strategies c lv,v 1,..., c lv,v such that some c lv,v i = lv 1. Notice that now we have a 1-subgame. Applying the lemma again we get a 2-subgame. Similarly, we repeately apply the lemma until we get a H 1-subgame. Notice that the only surviving strategy of each noe is 0,..., 0 for every lv: that is each noe propagates information an oes not uplicate. This shows that there exists an elimination orer in which every noe propagates information an oes not uplicate. Next, we prove that the strategy profile in which all noes propagate information an o not uplicate survives every orer of iterate elimination of ominate strategies process. LEMMA 2.6. Let T be a sub-game that is reache via iterate elimination of ominate strategies in the β, H-game, an suppose that there are at least 7 sees, an at least 2β aitional noes are aware of the transaction. Then there exists a strategy profile s T in which every noe at epth at most H fully propagates an o not uplicate. PROOF. Let us assume that some elimination orer ens with a sub-game that oes not contain any profile with full propagation an no uplication. Let T be the last subgame in the elimination orer for which there is still a profile with full propagation an no uplication for every noe at epth at most H. It must be that for some player i in T, the strategy s i of full propagation an no uplication is ominate by another strategy s i in which this player either uplicates or oes not fully istribute. In particular, let us fix the behavior of the other players to be the profile s i in which they fully istribute an o not uplicate such a profile exists in T by assumption. For s i to ominate s i, it must be that u i s i, s i u i s i, s i. We will show however that the opposite hols, an thereby reach a contraiction. We efine a series of strategies s 1 i, s2 i, s3 i,..., sm i such that s 1 i = s i, an sm i = s i for which we shall show: u i s i, s i = u i s 1 i, s i < u i s 2 i, s i <... < u i s m i, s i = u i s i, s i. Note, that the strategies s 2 i, s3 i,..., sm 1 i may or may not be in T, an that we are merely using them to establish the utility for s i, s i. The strategy s j+1 i is simply the strategy s j i, with one change: player i replicates itself one less time to one of its chilren. Specifically, if player i replicates itself c 1,..., c times corresponingly for each of its chilren, let ν = arg max j c j it will instea replicate itself c 1,..., c ν 1,..., c times in the new strategy. We establish the fact that u i s j i, s i < u i s j+1 i, s i by a irect application of Claim 2.7. The claim shows that replicating one less time is better given sufficient external computation power, an given that the noe s escenants fully istribute with no replication. Both of these are guarantee in the profile s Proof of Lemma 2.5. Now, let us observe a noe v an fix l = lv. The non-trivial case is when l ϕ + 1. For convenience, we rop the superscript lv, v an enote a strategy by c 1,..., c. Without loss of generality we assume c 1 c 2... c. It will also be useful to efine y i = l c i 1. Note that our previous assumption implies that y 1 y 2... y.

11 X:11 Let s v be a strategy profile of all other noes except v, an enote by A s v y i the size of the subtree roote at the i th chil of v that is aware of the transaction. The utility of v is then: 1 + β l Uv s v y 1,..., y = k + A s v y i } {{ } v authorizes + βl y i A s v y i k + A s v y i } {{ } a eceent of v authorizes where k is the number of noes which are aware of the transaction an are not escenants of v this number inclues v itself. We show that c 1,..., c, where c = lv ϕ 1 is ominate by c 1,..., c 1. For this purpose, it is sufficient to show the following claim: CLAIM 2.7. Let T v be the set of strategy profiles of all noes other than v in which: 1 The subtree roote at v s th chil spans a complete -ary tree of height y when v uplicates itself c times, or of a height y + 1 when v uplicates itself c 1 times. 2 There are at least k 2β y noes that are not escenants of v that are aware of the transaction. Then: s v T v Uv s v c 1,..., c 1 > Uv s v c 1,..., c Fig. 2. Noe v istributes the transaction to it s i th chil using c i ientities. It consiers istributing the transaction to the th chil with one less ientity, which enables the istribution tree below that chil to exten y + 1 levels assuming all noes below use only one ientity. The two scenarios are epicte in Figure 2. Notice, that in any ϕ-subgame, both of the conitions for the lemma hol in every profile: in a ϕ-subgame we have that if noe v clones itself at most lv ϕ 2 times then his chil will span a tree that contains a full -ary tree of height ϕ, an we are guarantee k noes that are aware of the transaction. We therefore turn to prove the claim.

12 X:12 PROOF. The new strategy c 1,..., c 1 in effect istributes the transaction to one aitional layer of the subtree roote at the th chil of v. That extra layers contains y noes. The utility of this strategy is therefore: Uv s v y 1,..., y 1, y +1 = 1 + β l + 1 βl y i A s v y i + βl y 1A s v y + y k + A s v y i + y So we have to show that: s v Uv s v y 1,..., y 1, y + 1 > Uv s v y 1,..., y For convenience, we will rop the inex s v, but remember that we must check for every possible strategy profile of the other noes that: 1 + β l + 1 βl y i Ay i + βl y 1Ay + y k + Ay > 1 + β l + βl y i Ay i i + y k + Ay i multiplying by the enominator an iviing both sies by β: k + Ay i l y 1Ay + y > k + Ay i l y Ay + y β 1 + l + l y i Ay i k + Ay i l y 1 y k + k + Ay i Ay i Ay > y β 1 + l + l y 1 Ay y > β 1 + l + l y i Ay i l y i Ay i Note that l y 1 Ay > 0 since l y y 2 an Ay < 1. Therefore we can ivie y by l y 1 Ay, after some rearranging we get that: y k > β 1 + l + l y i Ay i l y 1 Ay y Ay i k > β 1 + l + l y i l + y Ay y Ay i l y 1 Ay y k l y 1 Ay y > β 1 + l + y i + y Ay y Ay i = Recall that that the s chil spans a full tree of height y : Ay = y 1 1. We boun the right han sie of Equation as follows: β 1 + l + + i:y i=y i:y i>y Ay y Ay i Ay y Ay i i:y i=y +1 Ay y Ay i

13 X:13 The last summation is negative because Ay < 1, an once we substitute Ay y into the expression we have that: β 1 + l + Now notice that: i:y i=y 1 + Ay y Ay + i:y i=y +1 Ay y Ay Ay y Ay = Ay + y y Ay = Ay + 1 Ay y an so we can write: β 1 + l + i:y i=y y i=y Ay Ay β 1 + l + y Therefore, we are looking for k such that: We now ivie into two cases. k > β 1 + l + 2 Ay l y 1 Ay y i:y i=y y i=y +1 2 Ay 1 β 1 + l + 2 Ay 2 = Case I:. l 2y + 4. In this case By using the fact Ay < 1 an continuing from y Equation 2 we can write: < β 1 + l + 2 Ay l y 2 β 1 + l + 2 Ay l 2 where the last transition relies on the fact that l 4. 2 β Ay 1 l l 2 β Ay Case II:. l 2y + 3. Notice that by efinition l is always at least y + 2. Therefore, by continuing from Equation 2 we have: β 1 + l + 2 Ay 2 1 Ay y where for the secon transition we use: β 1 + l + 2 Ay Ay y = y 1 1 y < 1 1 = 1 β 1 + l + 2 Ay 2 Notice that Ay y, hence, l 2Ay + 3. Recall that 3 we can continue to boun : 1 β Ay β Ay From Case I, an case II combine, we have that:

14 X:14 2β Ay + 6 Thus, if k 2β 1 +6 Ay +6, for any noe v the strategy of choosing c i = lv ϕ 1 for some chil i is ominate by the strategy c 1,..., c i 1, c i 1, c i+1,..., c. Since k is the number of noes outsie the tree roote by v then for the lemma to hol it is sufficient to have 7 sees each with chilren that span trees at height y, an 2β aitional noes. 3. IMPOSSIBILITY RESULT FOR DOMINANT STRATEGY MECHANISMS In the previous sections, we presente several rewar schemes an analyze their behavior in equilibrium. The solution concept we analyze was iterate removal of ominate strategies. Although iterate removal of ominate strategies is a strong solution concept, a natural goal is to seek rewar schemes that use even stronger solution concepts. We now show that there are no ominant-strategy rewar schemes. THEOREM 3.1. Suppose that H 3. There is no Sybil-proof rewar scheme in which information propagation an no uplication are ominant strategy for all noes at epth 3 or less. PROOF. Consier a scenario in which all noes except one see s o not propagate information. Suppose that all the irect chilren of the see s play the following strategy: If they have one preecessor then they o not propagate information. In case they authorize the transaction they preten that they are a level 3 noe, by uplicating themselves once so if they authorize the transaction the resulting chain has a length of 3. If they have more than one preecessor then they still o not propagate information. However, if they authorize the transaction they o not uplicate themselves so again if they authorize the transaction the resulting chain has a length of 3. All other noes, incluing the chilren of the chilren of s, o not propagate information an o not uplicate themselves. Denote by the number of irect chilren of s, an consier the possible strategies of s. The see s can propagate information to all its chilren. In this case his chilren will not propagate information an one of them authorizes the transaction it pretens that it is a level 3 noes. Using the fact that there are t sees that are aware of the transaction, the utility of s in this case is: r 1,1 + r 3,3 t + However, suppose that s uplicate itself once an propagate information to its chilren. In this case again its chilren will be aware of the transaction. But now the utility of s in this case is: r 1,1 + r 2,3 + r 3,3 t +

15 X:15 Since information propagation an no uplication shoul be a ominant strategy for s, we must have: r 1,1 + r 3,3 r 1,1 + r 2,3 + r 3,3 t + t + r 1,1 + r 3,3 r 1,1 + r 2,3 + r 3,3 0 r 2,3 The contraiction will be reache by proving the following lemma: LEMMA 3.2. Suppose that H 3. In every Sybil-proof rewar scheme in which information propagation an no uplication are ominant strategy for all noes at epth 3 or less, we have that r 2,3 > 0. PROOF. Fix some noe u that receives the transaction with exactly one preecessor. Denote by k the number of noes that are aware of the transaction an are not escenants of u this number inclues u. Since u s ominant strategy is to propagate information to its chilren without uplication, the utility of this strategy is no worse than the utility of not propagating information at all. Suppose that the chilren never propagate information an never uplicate themselves: r 1,2 k r 1,2 + r 2,3 k + Since we assume that the rewar for the authorizer is strictly positive, we have that r 1,2 > 0 an therefore: Which gives us that r 2,3 > 0, as neee. r 1,2 k + < r 1,2 + r 2,3 k + Acknowlegements. We thank Jon Kleinberg an Ilya Mironov for helpful iscussions an valuable comments. REFERENCES BITCOIN. The Bitcoin wiki. Available online at CHITNIS, R., HAJIAGHAYI, M., KATZ, J., AND MUKHERJEE, K A gametheoretic moel for the arpa network challenge. Manuscript. DARPA The DARPA network challenge. Available online at DAVIS, J The crypto-currency: Bitcoin an its mysterious inventor. The New Yorker, October 10. DOUCEUR, J. R. AND MOSCIBRODA, T Lottery trees: motivational eployment of networke systems. SIGCOMM Comput. Commun. Rev. 37, DYAGILEV, K., MANNOR, S., AND YOM-TOV, E Generative moels for rapi information propagation. In Proceeings of the First Workshop on Social Meia Analytics. SOMA 10. ACM, New York, NY, USA, EMEK, Y., KARIDI, R., TENNENHOLTZ, M., AND ZOHAR, A Mechanisms for multi-level marketing. In Proceeings of the 12th ACM conference on Electronic commerce. EC 11. ACM, New York, NY, USA, KLEINBERG, J. AND RAGHAVAN, P Query incentive networks. In FOCS 05: Proceeings of the 46th IEEE Symposium on Founations of Computer Science

16 X:16 KRUGMAN, P Golen cyberfetters. Available online at NAKAMOTO, S Bitcoin: A peer-to-peer electronic cash system. Available online at PICKARD, G., PAN, W., RAHWAN, I., CEBRIAN, M., CRANE, R., MADAN, A., AND PENTLAND, A Time-critical social mobilization. Science 334, 6055, REID, F. AND HARRIGAN, M An analysis of anonymity in the Bitcoin system. CoRR arxiv/ SUROWIECKI, J Cryptocurrency. Technology Review, MIT. September/October. Available online: A. A BRIEF OVERVIEW OF BITCOIN In this section we give a brief overview of the Bitcoin protocol. This is by no means a complete escription. The main purpose of this section is to help unerstaning our moeling choices, an why our propose rewar schemes can be implemente within the context of the existing protocol. The reaer is referre to [Nakamoto 2008] an to the Bitcoin wiki for a complete escription. A.1. Signing Transactions an Public Key Cryptography The basic setup of electronic transactions relies on public key cryptography. When Alice wants to transfer 50 coins to Bob, she signs a transaction using her private key. Hence, everyone can verify that Alice herself initiate this transaction an not someone else. Bob, in turn, is ientifie as the target of the transfer using his public key. For the money to be actually transferre from Alice s account to Bob s account, some entity has to keep track of the last owner of the coins, an to mark Bob as the new owner. Otherwise, Alice coul ouble spen her money first transfer the coins to Bob, then transfer the same coins again to Charlie. Traitionally, this role was fulfille by banks. In return, banks tene to charge high fees, for example in international transfers. A.2. Agreeing on the History by Majority of CPU power Bitcoin suggests a ifferent solution to this problem. A peer to peer network is use to valiate all transactions. Noes in the network agree on a common history using a majority of CPU power mechanism. A mechanism can not rely on a numerical majority of the noes, as it is relatively easy to create aitional ientities in a network, for example by spoofing IP aresses. We first escribe the protocol that the network implements an then explain why the history is accepte only if it is agree upon by noes that together control a majority of the CPU power. Let us assume again that Alice wants to transfer 50 coins to Bob. Alice will sen her signe transaction to some of the noes in the network. Next, these noes will forwar the transaction to all of their neighbors in the network an so on. A noe that receives the transaction first verifies that this is a vali transaction e.g. that the money being transferre inee belongs to Alice. If successful, the noe as this transaction to the block of transactions it attempts to authorize a block is simply a set of transactions; the specific etails on the structure of this block are omitte. To authorize a block, a noe has to solve an inverse Hash problem. More specifically, its goal is to a some bits nonce to the block such that the Hash value of the new block begins with some preefine number of zeroes. The number of zeroes is ajuste such that the average time it takes the network to sign a block is fixe. The protocol uses a clever metho to aggregate transactions a Merkle tree which assures that the size of the block to be hashe is also fixe. Aitional information that is inclue in the block is the hash of the previously authorize

17 X:17 block. So, in fact, the authorize blocks form a chain in which each block ientifies the one the precee it. When a noe authorizes a block it broacasts to the network the new block an the proof of work the string which is ae to the block to get the esire hash. If a noe receives two ifferent authorize blocks it aopts the one which is part of the longer chain. Let us argue briefly an informally why the history is etermine by the majority of the CPU power [Nakamoto 2008]. That is, the probability that a group of malicious noes manages to change the history ecreases as the fraction of CPU they control ecreases. Assume that a group of malicious noes, that oes not have the majority of the CPU power, wants to change the chain that has currently been aopte by the other noes. Since the malicious noes own less CPU power, their authorization rate is slower than the authorization rate of the majority of the network, which is honest. Therefore, the longer chains will be signe by the majority of the network with high probability an these are the ones that will be aopte by the honest noes in the network. In fact, once a block has been accepte into the chain, the probability that a longer chain that isplaces it will appear ecreases exponentially with time as the chain that follows it grows longer it is harer to manufacture a longer alternative one. See [Nakamoto 2008] for a more formal argument. A.3. Transaction Fees To incentivize noes to participate in the peer to peer network an invest effort in authorizing transactions, rewars have to be allocate. Currently, in the initial stages of the protocol this is one by giving the authorizer of a block a fixe amount of bitcoins this also the only metho for printing new bitcoins. This fixe amount will be reuce every few years at a rate etermine by the protocol. As the money creation is slowly phase out, there will be a nee to rewar the noes ifferently. The protocol has been esigne with this in min. It alreay requires the transaction initiator to specify a fee for authorizing her transaction. As we explaine in the introuction this introuces an incentive problem since noes prefer to keep the transaction to themselves instea of broacasting it. A.4. On Implementing the Hybri Scheme We start with a rough escription of how fees for authorizing transactions in Bitcoin are currently implemente. Alice prouces a transaction recor in which she transfers some of her coins to Bob. She specifies the fee if any for authorizing this transaction in a fiel in the transaction recor, an then cryptographically signs this recor. When Victor authorizes a transaction, the implication is that Alice transferre some amount of money to Bob, an some amount of money specifie in the fee fiel to Victor. Any β, H-almost uniform scheme can be implemente similarly an thus, the Hybri scheme can be implemente similarly. Alice prouces a ifferent transaction recor for every see, in which she specifies β, H, an some amount of coins f we normalize f = 1 in the previous sections the total fee if a noe in tree roote by the see authorizes the transaction will be 1 + β H f. We moify the protocol so that every noe that transfers the transaction to its chilren cryptographically signs the transaction, an specifically ientifies the chil to whom the information is being sent using that chil s public key. The transaction information, therefore inclues a chain of custoy for the transaction which will be ifferent for every noe that tries to authorize the transaction. The implication of Victor authorizing a transaction is that Alice transferre some amount of money to Bob, a fee of f β to every noe in the path as it appears in the authorize transaction, an a fee of f + β H h + 1 f to Victor

18 X:18 if the path was of length h H. Payments will not be aware if the chain of custoy is not a vali chain that leas from Alice to Victor.

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes previous inex next Calculating Viscous Flow: Velocity Profiles in Rivers an Pipes Michael Fowler, UVa 9/8/1 Introuction In this lecture, we ll erive the velocity istribution for two examples of laminar

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015

ECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015 ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Improving Direct Marketing Profitability with Neural Networks

Improving Direct Marketing Profitability with Neural Networks Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation

6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation 6.207/14.15: Networks Lecture 15: Repeated Games and Cooperation Daron Acemoglu and Asu Ozdaglar MIT November 2, 2009 1 Introduction Outline The problem of cooperation Finitely-repeated prisoner s dilemma

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

Calculus Refresher, version 2008.4. c 1997-2008, Paul Garrett, garrett@math.umn.edu http://www.math.umn.edu/ garrett/

Calculus Refresher, version 2008.4. c 1997-2008, Paul Garrett, garrett@math.umn.edu http://www.math.umn.edu/ garrett/ Calculus Refresher, version 2008.4 c 997-2008, Paul Garrett, garrett@math.umn.eu http://www.math.umn.eu/ garrett/ Contents () Introuction (2) Inequalities (3) Domain of functions (4) Lines (an other items

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Rules for Finding Derivatives

Rules for Finding Derivatives 3 Rules for Fining Derivatives It is teious to compute a limit every time we nee to know the erivative of a function. Fortunately, we can evelop a small collection of examples an rules that allow us to

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Innovation Union means: More jobs, improved lives, better society

Innovation Union means: More jobs, improved lives, better society The project follows the Lisbon an Gothenburg Agenas, an supports the EU 2020 Strategy, in particular SMART Growth an the Innovation Union: Innovation Union means: More jobs, improve lives, better society

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

APPLICATION OF CALCULUS IN COMMERCE AND ECONOMICS

APPLICATION OF CALCULUS IN COMMERCE AND ECONOMICS Application of Calculus in Commerce an Economics 41 APPLICATION OF CALCULUS IN COMMERCE AND ECONOMICS æ We have learnt in calculus that when 'y' is a function of '', the erivative of y w.r.to i.e. y ö

More information

Dynamic Network Security Deployment Under Partial Information

Dynamic Network Security Deployment Under Partial Information Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College

More information

Pythagorean Triples Over Gaussian Integers

Pythagorean Triples Over Gaussian Integers International Journal of Algebra, Vol. 6, 01, no., 55-64 Pythagorean Triples Over Gaussian Integers Cheranoot Somboonkulavui 1 Department of Mathematics, Faculty of Science Chulalongkorn University Bangkok

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

Sustainability Through the Market: Making Markets Work for Everyone q

Sustainability Through the Market: Making Markets Work for Everyone q www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

These draft test specifications and sample items and other materials are just that drafts. As such, they will systematically evolve over time.

These draft test specifications and sample items and other materials are just that drafts. As such, they will systematically evolve over time. t h e reesigne sat These raft test specifications an sample items an other materials are just that rafts. As such, they will systematically evolve over time. These sample items are meant to illustrate

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars September 2008 / Issue 21 A legal upate from Dechert s Financial Services Group SEC Issues Propose Guiance to Fun Boars Relating to Best Execution an Soft Dollars The Securities an Exchange Commission

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract

Victor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

arxiv:1404.0542v1 [cs.gt] 2 Apr 2014

arxiv:1404.0542v1 [cs.gt] 2 Apr 2014 Towards a Fair Allocation of Rewards in Multi-Level Marketing TALAL RAHWAN, Masdar Institute VICTOR NARODITSKIY, University of Southampton TOMASZ MICHALAK, University of Oxford MICHAEL WOOLDRIDGE, University

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

A Theory of Exchange Rates and the Term Structure of Interest Rates

A Theory of Exchange Rates and the Term Structure of Interest Rates Review of Development Economics, 17(1), 74 87, 013 DOI:10.1111/roe.1016 A Theory of Exchange Rates an the Term Structure of Interest Rates Hyoung-Seok Lim an Masao Ogaki* Abstract This paper efines the

More information

Aon Retiree Health Exchange

Aon Retiree Health Exchange 2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Example Optimization Problems selected from Section 4.7

Example Optimization Problems selected from Section 4.7 Example Optimization Problems selecte from Section 4.7 19) We are aske to fin the points ( X, Y ) on the ellipse 4x 2 + y 2 = 4 that are farthest away from the point ( 1, 0 ) ; as it happens, this point

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations

Section 3.3. Differentiation of Polynomials and Rational Functions. Difference Equations to Differential Equations Difference Equations to Differential Equations Section 3.3 Differentiation of Polynomials an Rational Functions In tis section we begin te task of iscovering rules for ifferentiating various classes of

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information