An Immunological Approach to Change Detection: Algorithms, Analysis and Implications

Size: px
Start display at page:

Download "An Immunological Approach to Change Detection: Algorithms, Analysis and Implications"

Transcription

1 An Immunological Appoach to Change Detection: Algoithms, Analysis and Implications Patik D haeselee Dept. of Compute Science Univesity of New Mexico Albuqueque, NM, patik@cs.unm.edu Stephanie Foest Dept. of Compute Science Univesity of New Mexico Albuqueque, NM, foest@cs.unm.edu Paul Helman Dept. of Compute Science Univesity of New Mexico Albuqueque, NM, helman@cs.unm.edu Abstact We pesent new esults on a distibutable changedetection method inspied by the natual immune system. A weakness in the oiginal algoithm was the exponential cost of geneating detectos. Two detecto-geneating algoithms ae intoduced which un in linea time. The algoithms ae analyzed, heuistics ae given fo setting paametes based on the analysis, and the pesence of holes in detecto space is examined. The analysis povides a basis fo assessing the pacticality of the algoithms in specific settings, and some of the implications ae discussed. 1. Intoduction It is impactical to find and patch evey secuity hole in a lage compute system. Thus, the need fo a moe compehensive appoach to secuity is inceasing. Any single potection mechanism is likely vulneable to some class of intusions. Fo example, elying on a potection mechanism that is designed fo known types of intusion implies vulneability to novel intusion methods. It is ou belief that a multi-faceted appoach is most appopiate, in which, simila to natual immune systems, both specific and non-specific potection mechanisms play a ole. This pape is concened with one aspect of ou oveall stategy: the vey geneal poblem of change detection. The method discussed is non-specific, in the sense that it is not specifically aimed towads cetain wellknown attacks, as opposed to, fo example, one using known signatues. It is also geneal in the sense that it could be used fo a wide vaiety of change-detection poblems, including those equiing some toleance of noise, o involving dynamic steams of data (such as activity pattens in unning pocesses [7]). On the othe hand, it might not always be as efficient as some of the knowledge-intensive special-pupose mechanisms fo detecting specific kinds of changes o known attacks. Its stength, howeve, is its geneality; it potentially could To appea at the 1996 IEEE Symposium on Secuity and Pivacy. be applied in many settings as a safety net to catch changes that might othewise go undetected. The change-detection method we ae studying was inspied by the geneation of T-cells in the immune system. In the thymus, T-cells with essentially andom eceptos ae geneated, but befoe they ae eleased to the est of the body, those T-cells that match self poteins ae deleted [9, 10]. Similaly, ou method distinguishes self stings (the potected data o activities) fom nonself stings (foeign o malicious data o activities) by geneating detectos fo anything that is not in the set of self stings. This pinciple of tying to match anything that has not peviously been encounteed we call "negative detection." Many methods fo change detection ely on a centalized detection potocol, i.e., each object has to be checked in its entiety, and the monito has to contain all the infomation about the oiginal objects. Ou method on the othe hand is inheently distibutable: Small sections of an object can be checked fo change independently. Diffeent independently geneated detecto sets (unning on diffeent machines fo example) can be used to achieve a highe detection ate fo a single object. The failue ate deceases exponentially with the numbe of independent detecto sets used. The individual detectos in the detecto set can be un independently as well, fo instance in a scheme with autonomous agents (such as the one pesented in [1]), whee each agent would contain one o a few detectos. We think this distibutability popety is cucial because it allows each copy of the algoithm to use a unique set of detectos. Having identical potection algoithms can be a majo vulneability in lage netwoks of computes because an intusion at one site implies that all sites ae vulneable. The negative detection method was intoduced in [6]. Ou cuent emphasis is on extending the theoetical basis of the method and addessing the impotant question of pacticality, including (i) the feasibility of geneating detectos, (ii) detemining how to choose paametes fo the algoithm, and (iii) discussing the

2 implications fo eal-wold poblems. This pape pesents algoithmic and analytical esults that enable us to addess these questions. The oiginal algoithm simply geneated andom detectos and then censoed the ones that matched self stings (accoding to a pedefined matching ule). We pesent two new algoithms, both of which ae moe efficient at geneating detectos. Section 2 gives an oveview of these algoithms, thei time and space complexity and some of the fomulas and paamete bounds deived fom them. Section 3 compaes esults obtained with the diffeent algoithms and fomulas, both on andomly geneated files and on a eal binay file. Section 4 touches on some of the pactical issues, including guidelines on applying the method, how to choose the paametes, and the fomulas involved. Section 5 pesents conclusions and outlines aeas fo futhe study. Cuently we estict ouselves to the case whee both self stings and detectos ae stings of length l ove an alphabet of size m. In this pape, the alphabet is usually binay (m=2). Self consists of an unodeed set of these stings (a multiset, because stings can occu moe than once). Figue 1 shows the elevant sets of stings and how they elate to each othe. The goal of ou method is to find a detecto set R that matches as many of the nonself stings in N as possible, without matching any of the self stings in S. We define the failue pobability as the pobability that a andom nonself sting will not be matched by any of the detectos in R. We futhe U detected undetected holes self stings D S N' N Matches Matches MatchedBy C R C Ud Figue 1: Sets of stings and thei elations. Sting space U and detecto space U d ae dawn sepaately fo claity, even though U=U d fo this pape. P is MatchedBy Q iff Q contains all the detectos matching any sting in P. Q Matches P iff P contains all the stings matched by any detecto in Q. S: self stings; N: nonself stings; C: candidate detectos; R: detecto epetoie chosen fom C; N : detectable nonself stings; D: detected nonself stings. Not indicated ae the set of holes H=N-N, and the set of undetected nonself stings F=N -D. define the matching pobability P m as the pobability that a andomly chosen sting and detecto match accoding to the specified matching ule. To simplify the notation, we will wite N X fo the size (i.e. cadinality) X of a set of stings X. In paticula, N S is the size of the self set and is the detecto set size. 2. Detecto geneating algoithms This section descibes thee diffeent algoithms fo geneating detecto sets: the oiginal exhaustive geneating algoithm and two new algoithms, based on dynamic pogamming, which un in linea time with espect to the size of the input. See [6] fo an exposition of the exhaustive detecto geneating algoithm (2.1). Fo moe details on the linea time algoithm (2.2), see [8] and [3]. This last epot also coves the geedy algoithm (2.3) and the algoithm fo counting the holes (2.4), including some examples and a deivation of the time and space complexities Exhaustive detecto geneating algoithm This algoithm mios most closely the geneation of T-cells in the immune system. Candidate detectos ae dawn at andom fom U d and checked against all stings in S. If they fail to match any of the self stings, they ae kept as valid detectos. This pocess of andom geneation and checking against S is epeated until the equied numbe of detectos is geneated. This algoithm equies geneating a numbe of candidate detectos ( 0 : initial detecto epetoie size, befoe negative selection). that is exponential in the size of self (fo a fixed matching pobability P m ) [2]: ln( Pf ) NR 0 = N Pm 1 P S. ( m) Fo independent detectos, we can appoximate the failue pobability achieved by detectos by: ( ) Pf 1 Pm. (1) Fo P m sufficiently small and sufficiently lage, this gives: ln ( ) P m. (2) The assumption that the detectos ae independent is not entiely valid. As N S o P m inceases, the candidate detecto set (C in Figue 1) will shink., so the detectos chosen become less independent. Ovelap among the detectos deceases the amount of sting space coveed, esulting in a highe failue pobability than (1) would indicate. The time complexity of this algoithm is popotional to 0, the numbe of candidate detectos that need to be examined, and N S (because each sting may have to be compaed against all self stings). Space complexity is detemined by N S :

3 ln( Pf ) time : O Pm ( 1 Pm) space : O( l N S ). NS NS, 2.2. Linea time detecto geneating algoithm The geneate-and-test algoithm descibed above is inefficient because most of the candidate detecto stings ae ejected. Howeve it does wok fo abitay matching ules. Fo specific matching ules we might be able to find a moe efficient detecto geneating algoithm. Hee, we descibe a two-phase algoithm fo the -contiguous-bits matching ule (two l-bit stings match each othe if they ae identical in at least contiguous positions) that uns in linea time with espect to the size of the input (fo fixed matching paametes l and ). In Phase I, we solve a counting ecuence fo the numbe of stings unmatched by stings in S (candidate detectos, set C in Figue 1). In Phase II, we use the enumeation imposed by the counting ecuence to pick detectos andomly fom this set of candidate detectos. We will adopt the following notation: s denotes a bit sting. ŝ denotes s stipped of its fist (leftmost) bit. s b, whee b {0,1}, denotes s appended with b. In paticula, ŝ b is s stipped of its fist bit and appended with b. A template of ode is a size l sting consisting of l- blank symbols (epesented by asteices hee) and fully specified contiguous bits. In paticula, a template t i,s, is that template in which the specified bits stat at position i and ae given by the -bit sting s. Fo example, with l=6, =3, s=010: t 2,s =*010**. A sting (o template) matches a sting if they ae identical (no blanks) in at least contiguous positions. A ight (left) completion of a template t is that template with all the blanks to the ight (left) eplaced by bits. Fo example: *01011 is a valid ight completion fo *010**. a, b ( ] stands fo the intege inteval (a+1)...b. Phase I: Solving the counting ecuence Fo bit stings s of length and fo 1 i (l + 1), let C i [s] = the numbe of ight completions of t i,s unmatched by any sting in S. Each enty C i [s] in the aay coesponds to an ode template t i,s, i In essence, these templates enumeate all the possible ways two stings can match each othe ove contiguous bits. In paticula, fo i=l-+1, t i,s consists of l- blanks, followed by consecutive bits. Thee ae no blanks to the ight, so the only ight completion of such a template is the template itself. Theefoe C l-+1 [s] will be zeo if the template t l-+1,s is matched in S, one othewise: C l +1 [s] = 0,if t l +1,s is matched in S 1, othewise Fo 1 i < (l + 1), we can calculate the numbe of unmatched ight completions based on the numbe of unmatched ight completions at i+1. If t i,s is diectly matched in S, C i [s] is zeo. Othewise, we can subdivide the ight completions of t i,s into those with a 0 bit diectly following the significant bits of s, and those with a 1 bit thee. These ae exactly the numbe of ight completions fo ŝ 0 and ŝ 1 espectively: C i [s] = 0, if t i,s is matched in S C i+1 [ŝ.0]+ C i+1 [ŝ.1], othewise Fo example, with l=6, =3, suppose s 1 = is one of the stings in S, then the following templates ae diectly matched by this sting: 110***, *101**, **010* and ***100. Theefoe, C 1 [110] = C 2 [101] = C 3 [010] = C 4 [100] = 0. Suppose sting s 2 = is also in S. The template **110* is not diectly matched by s 1 no s 2. Howeve, because both ***100 and ***101 ae matched in S (by s 1 and s 2 espectively), **110* will not have any unmatched ight completions eithe: C 3 [110] = C 4 [100] + C 4 [101] = 0. This can easily be veified: **110* has two ight completions: **1100 and **1101. The fist one is matched by s 1, the second by s 2. Phase II: Geneating stings unmatched by S Note that as the ecuence pogesses fom column C l-+1 [.] of the C aay to column C 2 [.], the emaining blanks in the ight completions ae gadually filled up, and fo C 1 [.], the ight completions ae fully specified l- bit stings. Theefoe, C 1 [s] denotes the numbe of unmatched l-bit binay stings stating with the -bit binay sting s. The total numbe of stings unmatched by S is T = C 1 [s]. s C 1 [.] can be viewed as a patitioning of the space of unmatched stings into patitions of size C 1 [s] fo each initial -bit sting s. Of all the unmatched stings stating with s, we know that C 2 [ŝ.0] have a 0 bit next, while C 2 [ŝ.1] have a 1 bit next, so C 2 [.] can be viewed as a futhe patitioning of this space. Similaly fo C 3 [.] to C l-+1 [.]. Afte patitioning accoding to C l-+1 [.], each patition consists of one single l-bit sting. We can theefoe impose an explicit numbeing fom 1 to T on the unmatched stings, based on the natual ode of bit stings. Given this explicit numbeing, we can geneate andom integes in {1..T} and etieve the coesponding stings. Fo a numbe k {1.. T}, we find the k th unmatched sting u k in the following way: Fist, do a binay seach on C 1 [.] to find s 1 such that P 1 = C 1 [s] < k Q 1 = C 1 [s]. s<s 1 All unmatched stings in (P 1,Q 1 ] have s 1 as thei leading bits. The sting u k we ae looking fo is in the s s 1

4 patition of unmatched stings numbeed (P 1 +1)...Q 1, theefoe the fist bits of u k ae given by s 1. Now we can detemine fo each i = 2...(l + 1) the bit at position (+i-1) of u k, by checking in which patition k falls. Fo example, to detemine the bit at position +1, we can patition the inteval futhe into (P 1, P 1 + C 2 [ŝ 1.0]] and (P 1 + C 2 [ŝ 1.0],Q 1 ], coesponding to the stings with eithe a 0 o 1 bit coming next. We add a bit b 1 =0 if k is in the fist inteval, b 1 =1 bit if k is in the second one. We then set P 2 and Q 2 using: P i = P, if b = 0 i-1 i 1 P i 1 + C i [ŝ i 1.0], if b i 1 = 1 and Q i = P + C [ŝ.0], if b = 0 i 1 i i 1 i 1 Q i-1, if b i 1 = 1 Let s 2 = ŝ 1 b 1. k is now in the inteval (P 2,Q 2 ], which we can split up into intevals (P 2, P 2 + C 3 [ŝ 2.0]] and (P 2 + C 3 [ŝ 2.0],Q 2 ]. Bit b 2, will be detemined by whethe k falls in the fist o second inteval. Futhe bit positions of u k ae detemined similaly. The pinciple data stuctue used in this algoithm consists of the lage (l ) 2 C aay epesenting all the possible ways two stings can match ove contiguous bits. This has an impact on the time and space complexity of the algoithm: time : O( ( l ) NS )+ O( ( l ) 2 )+ O( l NR), (( ) 2 ) space : O l 2. The above algoithm uns in time linea in the size of the self set and detecto set (fo given paametes l and ). This is in contast to the exhaustive detecto geneating algoithm, which an in time exponential to the size of the self set, but equied essentially only constant space. The linea time algoithm still equies time and space exponential in the length of the matching egion, which may pesent a poblem if we need to choose long stings (l) and matching egions () Geedy detecto geneating algoithm We can achieve a bette coveage of the sting space with the same numbe of detectos (o a smalle detecto set fo the same amount of coveage) by not selecting the detectos at andom, but placing them as fa apat as possible. The geedy algoithm we developed ties to do exactly that. At each step it picks one of the detectos that will match as many as possible of the as yet unmatched nonself stings. To constuct the C aay in Phase I of the pevious algoithm we chose to examine the stings fom ight to left (fom C l-+1 [.] to C 1 [.]). We can also go though the stings fom left to ight, constucting a second aay C stating at C 1[.] and calculating the following levels using a simila ecuence elation as fo C. Because C i [s] epesents the numbe of nonmatching ight completions fo template t i,s and C i[s] the numbe of nonmatching left completions, D i [s] = C i [s] C i [s] epesents the numbe of unmatched fully specified bit stings coesponding to this template. If a given template has a zeo enty in D, we know that all stings containing that template will match some sting in S. Convesely, if we estict ouselves to picking templates with nonzeo enties in D when constucting bit stings, we know those stings will not be matched by any sting in S. Phase I: Geneate D aays: D S and D R The algoithm uses two diffeent D aays, called D S and D R, the fist one based on the self set S and the second one based on the cuent state of the detecto set R. The D S aay tells us which templates we ae allowed to choose fom when constucting detectos. We will call the templates that have nonzeo enties in this D S aay valid detecto templates. Phase II: Geneating stings unmatched by S The second aay D R, based on the cuent detecto set R, will indicate how many stings fo each template ae not yet matched by the peviously geneated detectos. Fo each new detecto to be geneated, we then ty to select the templates matching the most unmatched stings. We have to update this aay D R each time a new detecto is geneated, so it will geneally be cheape to just keep the C R and C R aays aound and update these incementally. Because we begin with R being empty, we can initialize C R and C R with thei ( l + 1 i) ( i ) maximum values: C []= s 2 and C [] s = 2 1 Ri, ( l ) (coesponding to DRi, []= s 2 ). Fo each new detecto, we seach though D R fo the valid detecto template with the lagest enty. If thee is a tie between templates, we choose one at andom. Stating fom this template, we then tavese the D R aay to the left and to the ight, each time choosing to add a 0 o 1 bit to the stating template depending on which epesents the template with the highest numbe of stings not yet matched by R (while still esticting ouselves to valid detecto templates). Next, we have to update the C R and C R aays to eflect that a new detecto has been added to R. We can do this incementally, by setting those enties in C R and C R to zeo that diectly match the detecto, and ecalculating the appopiate enties. We epeat this pocess of picking a detecto and updating C R, C R and D R until all valid detecto templates have zeo enties in D R. At that point, fo any template that is not in S thee ae no moe stings that have not yet been matched by a detecto, i.e., we have coveed all stings that can possibly be coveed by detectos. We call this a complete detecto epetoie. This algoithm also has the attactive popety that we can keep a unning count of the numbe of nonself stings that ae still unmatched by any detecto. Fo a Ri,

5 given acceptable failue pobability we can simply keep geneating detectos until we each the coesponding numbe of unmatched nonself stings (o until we un out of candidate detectos, which would mean that thee ae too many holes to be able to each the desied ). At best, we can spead the detectos apat such that no two detectos match the same nonself sting. This gives us an absolute lowe bound on the numbe of detectos needed [12]: ( ) N 1 P P. (3) R f m Looking at the stuctue of the template aay we can get anothe estimate fo. Each detecto geneated matches one of the 2 templates in each of the (l-) columns of the template aay, and sets the coesponding count thee to zeo. We can zeo out all the enties in a column with at most 2 detectos: 2. This fomula does not take into account the enties in the template aay aleady zeoed out by matching self stings. If we assume the self stings ae independent, each template has a chance (1 2 ) N S of not matching any of the N S self stings. The estimate fo then becomes: ( ) N S (4) Because we need to update the template aay each time a new detecto is geneated, the time complexity is quite a bit highe than fo the pevious algoithm, although the space complexity is of the same ode: time : O ( l ) 2 N, ( R) (( ) 2 2 ). space : O l 2.4. Counting the holes Even though the above algoithm is capable of constucting a complete detecto epetoie, this does not necessaily mean it can constuct a detecto set capable of ecognizing all non-self stings, i.e., all stings not in S. Depending on the matching ule used and the stings in S, thee may be some nonself stings, called holes, fo which it is impossible to geneate valid detectos. Fo example, if S contains two stings s 1 and s 2 that match each othe ove (-1) contiguous bits, they can induce two othe stings h 1 and h 2 that cannot be detected because any candidate detecto would also match eithe s 1 o s 2, as shown below: s1 : a1... akbk bk+ 1 ck+... cl s2 : a1... ak bk bk+ 1 ck +... cl h1 : a1... akbk bk+ 1 ck +... cl h2 : a1... ak bk bk+ 1 ck+... cl whee a i, a i, b i, c i, and c i ae single bits. A simila agument shows that we also can have holes using a Hamming distance matching ule (whee two stings match if thei Hamming distance is less than o equal to a fixed adius ). In fact, almost all pactical matching ules with a fixed matching pobability can be expected to exhibit holes [4, 5]. Howeve, we can eliminate holes altogethe by choosing a matching ule with a vaiable matching adius, such that potential holes ae filled by detectos with high specificity. Because holes will neve be detected by any detecto, they imposes a lowe bound on the failue pobability we can achieve, whethe we use a single set of detectos o seveal independent detecto sets geneated fo the same matching ule. It is theefoe advisable in a distibuted setting to choose a diffeent matching ule (o simply diffeent paametes) fo each machine, so each will have a diffeent set of holes which ae likely coveed by some othe machines. On the othe hand, we can take advantage of the position of these holes to povide a cetain level of noise toleance in ou detection method: because holes ae close to self stings, we might not eally cae if they go undetected. Many othe change-detection algoithms (such as checksums and message digests) ae sensitive to any change in the data and theefoe not applicable when a cetain amount of noise toleance is equied. Running the geedy algoithm until all valid detectos have been used up would tell us exactly how many nonself stings cannot be detected. In [3] we developed a moe efficient algoithm fo counting the exact numbe of holes, simila to the way the numbe of detecto stings not matched by S ae counted in the linea time algoithm. Its space and time complexities ae simila: time : O( ( l ) NS )+ O ( l ) 2, (( ) 2 ) space : O l 2. ( ) The easonably shot unning time makes this a useful tool in discoveing appopiate settings fo the l and paametes of the matching ule. At the vey minimum, we want the numbe of holes N H to be small enough to allow the desied failue pobability : N H 2 l. If we stick close to this uppe bound on the allowed numbe of holes, almost all valid detectos will be needed to cove the vey last nooks and cannies of the detectable nonself sting space. If the numbe of holes is much smalle than this, we may need substantially fewe detectos fo the same. The smalle the faction of non-zeo enties thee ae in the template aay, the moe holes thee will be (because holes consist solely of templates that have zeo enties in the template aay). The template aay becomes spase if N S >> 2, because each of the N S self stings can match one of the 2 templates. In ode to get only a small numbe of holes, we may want to use N S 2. (5)

6 L S (a) N S (b) l (c) (d) 500B KB KB KB P m (e) indep. =0.1 (f) geedy complete (g) estimate complete (h) geedy =0.1 (i) optimal =0.1 (j) entopy =0.1 (k) numbe of holes (l) e e e+08 Table 1: Repetoie sizes and numbe of holes fo diffeent configuations. (a): file size in bytes, (b), (c), (d): paametes chosen fo the matching ule. (e): coesponding matching pobability P m fo the - contiguous-bit matching ule. (f): calculated accoding to fomula (2), fo independent detectos. (g): size of complete detecto epetoie geneated with the geedy algoithm. (h): estimate fo (g) based on fomula (4). (i): geneated by geedy algoithm until 0.1 ( means that 0.1 could not be achieved). (j): lowe bound on (i) based on fomula (3). (k): entopy-based lowe bound on (h). 1 (l): numbe of holes pesent. 3. Results and analysis In this section we use the algoithms and analysis fom section 2 to exploe which paamete settings ae pactical. Subsection 3.1 looks at esults obtained fo elatively small andomly geneated self sets, and daws some conclusions fom compaisons between diffeent algoithms and fomulas. Subsection 3.2 looks at a much lage eal-wold example and examines how the failue pobability scales with detecto set size and matching length Repetoie sizes using diffeent algoithms Table 1 shows detecto epetoie sizes obtained with the diffeent algoithms using andomly geneated self files and a numbe of diffeent paamete sets ( N S, l and ), as well as some uppe and lowe bounds pedicted by the fomulas pesented in the pevious sections. We have abitaily chosen =0.1 as an acceptable failue ate. Because the algoithm might be able to cove moe of the total nonself sting space with a smalle set of detectos if thee is a stuctue to the self stings, independent self stings will tend to be a wost case situation fo estimating (ignoing the effect of the holes on the achievable ). When we compae the esults in columns (f) and (i), we see that the geedy algoithm geneates a detecto set that is fom 8% to 41% smalle than the size pedicted fo the independently chosen detectos. Also note that fomula (2) indicates that the desied should be eachable with a detecto set of a cetain size, although thee might be so many holes in the sting space that this is uneachable, as indicated by the enties maked in (i). Fo the linea time and the exhaustive algoithm, thee is no guaantee that a detecto set of the size indicated by (2) will achieve the specified. This is not a poblem fo the geedy algoithm, because we can continue geneating detectos until exceeds the specification. With a geedy selection of detectos, the last detectos geneated will only match a small numbe of as yet unmatched nonself stings, and will theefoe not have a significant effect on. This means that when going 1 Refeences [4, 5] show that fo a set of independent self stings, the following is a lowe bound on the numbe of detectos needed: N S log 2 ( 1 ) l log 2 (m) (6). This bound is based on the amount of infomation that needs to be stoed in R about S.

7 fom = 0.1 to = min NR ( ), quite a lage numbe of exta detectos may have to be added to match all of the tiny unmatched egions of nonself sting space. This explains the lage diffeence in detecto set size between, fo example, 90% detection ate and the maximum detection ate (complete epetoie). Both (3) and (6) (columns (j) and (k) in Table 1) ae indeed effective lowe bounds on the size of the detecto set needed fo a failue pobability of =0.1. The entopy-based lowe bound is less stict, patially because it does not take the popeties of the matching ule into account. The lowe bound in column (j) is based on optimal spacing of the detectos, which is pecisely what the geedy algoithm ties to achieve, so we could view column (j) as the optimal detecto set size fo the geedy algoithm. Inteestingly, when the geedy algoithm aims fo an optimal detecto set size that is smalle o almost equal to the size indicated by the entopy-based lowe bound (i.e., (j) (k)), it is unable to do so (enty in (i) is ) because the numbe of holes in the sting space (column (l)) is too lage with espect to the desied. This suggests that ( ) ( 1 ) P m N log 1 P S 2 f (7) l log 2 (m) is an inteesting lowe bound on the value fo P m (and theefoe ) given N S, l and. Within one set of ows with the same N S and l, we see that the epetoie size deceases with matching length. Howeve, the numbe of holes in sting space seems to incease in an exponential fashion with deceasing up to the point whee we can no longe find an adequate detecto set fo the acceptable failue pobability. Since P m inceases exponentially with (l-), a smalle matching length means that each detecto matches moe stings, so fewe detectos ae needed. Howeve, each self sting will also match moe detectos, so the space of candidate detectos becomes smalle and the numbe of holes due to inteaction between self stings gets lage. Fo the smallest fo which we can constuct an adequate detecto set R, a lage numbe of the nonself stings not matched by R ae holes. As mentioned befoe, using diffeent matching lengths at the same time would allow us to combine matching all nonself stings and coveing most of the nonself sting space by a small numbe of detectos. By looking at ows with the same L S, we can get an idea of the effect of choosing a shote o longe sting length to split the data up in self stings. Fo instance, the ows with N S =250 and l=32 ae geneated fo the same data as the ows with N S =500 and l=16. Similaly fo N S =500, l=32 and N S =1000, l=16. We see that with a longe sting length l, a smalle numbe of detecto is needed to achieve = 0.1. If we look at how much space is taken up by the detecto set ( l ), the lage sting length still comes out ahead. Note that with the lage sting length the numbe of holes in the sting space is substantially lage (fo the same values of ). This is due to the fact that the sting space itself is much lage as well. Howeve, the faction of sting space occupied by holes is smalle fo lage l because the self stings ae spaced fathe apat and theefoe inteact with each othe less. This means that fo a lage sting length l, we can choose smalle and still have an acceptable detecto set. This is exactly opposite to what we would expect if we wanted to keep the matching pobability P m constant vesus fo a eal data file Figue 2 shows how vaies with fo a binay file (GNU emacs v SGI binay, 3.2MB). The data (a) (b) Figue 2: vesus fo a binay file. (a): linea scale fo ; (b): log scale fo.

8 fo each value of was deived fom a single lage detecto set geneated with the linea time algoithm (one million detectos fo =16 and =18; 5 million detectos fo =19) nonself stings wee checked against each of these detecto sets, and fo each nonself sting we ecoded the fist detecto to match the sting. We can then deive the pobability of success (1- ) as the cumulative histogam ove these values. Note that this means that the points in each cuve ae not completely independent. Howeve, this appoach gives us a easonable appoximation fo a much smalle computational effot. The figue shows a shap dop in the failue pobability fo the fist couple of hunded thousand detectos. This is due to the pobabilistic natue of coveage of the sting space by detectos. We would expect this decline to be even moe ponounced if we wee to geneate the detectos using the geedy algoithm, because then the detectos chosen fist ae those which cove as many nonself stings as possible. The decline in is shape fo smalle values of, and theefoe fo lage matching pobabilities, because each detecto matches a lage faction of sting space, so most of the space is coveed by a small numbe of detectos. Howeve, as the detecto set size inceases, levels off at a highe level fo smalle because thee ae moe holes. Note also that fo each detecto set size thee is an optimal value fo. In geneal, if we want to have a smalle detecto set, we will have to use a smalle value fo (such that each detecto matches moe nonself stings). Similaly, fo each value of thee is an optimal value fo. As the acceptable failue ate deceases, we will have to go to lage values of (moe specific detectos) and lage detecto sets. Finally, if we want to exploit the fact that the failue pobability deceases exponentially with an inceasing numbe of machines, each of which is unning its own detecto set, we may aleady be satisfied with 0.5. Figue 2 shows that this can be achieved with a epetoie as small as 30,000 to 120,000 detectos. This is quite an achievement given that the oiginal self file contains about one million stings. 4. Summay of fomulas, pactical issues and ules of thumb This section gives a summay of the appopiate fomulas fo the -contiguous-bits matching ule, and gives step-by step instuctions on how to choose the matching ule paametes fo a eal data steam Choosing the alphabet size The lage the alphabet size used, the hade it becomes to make an optimal choice fo the matching length. This is due to the fact that fo the matching ules consideed hee, the matching pobability P m m [11, 13]. Assuming that P m has to stay within cetain bounds fo the detection algoithm to pefom efficiently, the ange of acceptable values fo becomes vey naow with inceasing alphabet size. Fo some applications, howeve, a non-binay alphabet may be moe appopiate. Fo example, [6] descibes an expeiment in which a C pogam compiled fo a RISC achitectue was checked fo changes. Each opcode was mapped into one of 104 symbols (m=104). An impotant aea of futue investigation is to study the pefomance of diffeent size alphabets, especially in those cases whee a non-binay alphabet is most natual Choosing the sting length Fist, we detemine a lowe bound fo l by equiing that the self stings should occupy only a faction of the total sting space: N S L S l 2 l. Table 2 illustates some values fo L S and the coesponding lowe bounds fo l. L S 384 2K 10K 49K 229K 1M 4.7M 21M 92M 403M l Table 2: L S vesus lowe bound fo l Note that this is not an exact lowe bound fo l, because splitting up the data into l-bit stings may cause many duplicate stings, so N S L S l. If we want to know the exact lowe bound fo l (o if the data to be checked fo changes is not a fixed size file but athe a continuous steam of data) we can explicitly count the numbe of unique l-bit stings fo diffeent values of l. The second step in selecting sting length is to detemine whethe thee exists a natual sting length imposed by the data. Fo instance, if the data to be potected is a database consisting of a seies of 4-byte ecods, then a multiple of fou bytes would be an obvious sting length to ty because it peseves the stuctue of the data. If the data does not exhibit any natual sting length, we might still be able to find by inspection cetain ecuing featues that we want to be able to captue. The sting length will have to be longe than these featues fo them to be peseved in the self stings. Finally, thee will be an uppe bound to the sting length, imposed by the geneating algoithms. Inceasing l usually also means has to be inceased (cetainly if we want the matching pobability to emain constant). Howeve, fo lage l and the algoithms descibed in this epot become computationally vey expensive Choosing the matching length To keep the numbe of holes low, we want to pick such that N S 2 (5). Again, we might want to eplace

9 N S in this fomula by the numbe of unique l-bit stings that appea in the data. As illustated by Table 1, fomula (7) gives an appoximate uppe bound on P m (and thus a lowe bound on, fo a given sting length l) in ode to be able to constuct a detecto epetoie fo the acceptable failue pobability : ( ) ( 1 ) P m N log 1 P S 2 f. (7) l log 2 (m) Finally, afte a minimum value fo has been chosen, we may want to count the exact numbe of holes pesent in the sting space. If this exceeds the acceptable numbe of holes of N H 2 l, we choose a smalle matching pobability (i.e. lage ) and ty again. In geneal, because we don t have an exact pocedue to detemine the optimal values fo l and, a numbe of valid combinations may have to be tied and weighed against each othe in tems of ease of constuction of the detecto set, size of the esulting detecto set, attainable failue pobability, etc Choosing the numbe of detectos Above we have seen a numbe of lowe bounds and estimates fo unde diffeent assumptions. We will go though these one by one, fom the least tight lowe bounds to what we expect to be the best estimates. If the paametes of the self set and matching ule ae such that geneating the detectos using the geedy algoithm is too expensive, we can use the linea time algoithm to select a set of detectos independently chosen fom the candidate detectos. If we assume the detectos chosen ae also independent of each othe with espect to the total sting space, we get the lowe bound fom (2): ln( ) P m. (2) This last independence assumption usually doesn t hold: because of the limited numbe of candidate detectos, thee will be moe ovelap between detectos than we would expect fom stings chosen independently fom the entie sting space. If this is the case, the numbe of detectos needed to achieve can be quite a bit lage than the value indicated by (2). We may have to estimate the actual a posteioi ove a sample of nonself stings. If we use an algoithm that attempts to spead out the detectos, such as the geedy algoithm, the minimum numbe of detectos needed to achieve an acceptable is given by (3): ( 1 ) P m. (3) This is an absolute lowe bound, in the sense that it is impossible to cove that much of sting space with fewe detectos. Howeve, depending on the stuctue pesent in the self data, it may be had to pick detectos that ae spead apat optimally. Note that if we have chosen accoding to fomula (7), using this lowe bound fo will automatically imply that we also satisfy the entopy lowe bound (6). Using (3) to calculate the numbe of detectos needed fo the geedy algoithm is only inteesting in tems of getting a ballpak figue fo to evaluate whethe the paametes l and have been chosen efficiently. If we ae satisfied with the estimate we simply un the geedy algoithm until it eaches exactly the desied. If we ae inteested in achieving the minimum possible failue pobability, we can constuct a complete detecto epetoie by unning the geedy algoithm till exhaustion. (4) povides a faily close estimate fo the size of the complete detecto set fo independent self stings: ( ) N S Detection scheme. (4) One aea that we have not yet examined closely is how best to implement the actual detection scheme once an appopiate detecto set has been geneated. Hee ae some possible examples: Maximum secuity: evey sting needs to be checked against the entie detecto set. Othe, moe conventional, change-detection algoithms may be moe appopiate in this case. Intemittent checking: evey so often a small numbe of stings can be checked against a small numbe of detectos chosen at andom fom the detecto set. This elies on the pobabilistic natue of this change-detection method. It assumes that if a change is undetected, it will be detected duing some othe check, o on anothe machine. This might not be acceptable if a single occuence of the change can be fatal. Weighted detection: detectos can be chosen moe fequently depending on pevious pefomance, based on known expected changes (known failue modes, vius signatues, etc.), o in ode to get a homogeneous coveage of nonself sting space (some aeas of nonself sting space may be coveed by moe detectos than othes). Distibuted detection: the detecto set is split up ove a numbe of autonomous agents (see [1]) each doing checks in paallel. This is also the scheme used in the eal immune system, whee each T-cell coesponds to a single detecto. Distibuted independent detection: each agent has a detecto set geneated independently fom all othe agents. This is simila to a population of individuals with immune systems. The advantage is that holes in one individual s immune system can be coveed by anothe s, so an infection cannot spead though the entie population. A simila setup can be used to potect a whole netwok of computes.

10 5. Conclusion The linea time algoithm has made it pactical to constuct efficient detecto sets fo lage data sets. The space equiements fo this constuction algoithm ae substantial. Howeve, this space is only needed once, to calculate the detecto set, and can be discaded aftewads. The geedy algoithm allows us to sacifice some of the speed of detecto geneation in exchange fo a moe compact detecto set and a failue pobability guaanteed to be below the acceptable. We have also made significant impovements towads quantifying the ange of acceptable values fo the diffeent paametes associated with the detection method, to the point that we can give guidelines fo setting up a detection system like this fo any given data set. The distibuted natue of this algoithm is pomising fo netwoked and distibuted computing envionments. As a vey geneal-pupose change-detection method it can supplement moe specific, and theefoe moe bittle, potection mechanisms. We imagine a layeed compute immune system, with specific potection mechanisms against well known o peviously encounteed intusions, and non-specific potection mechanisms like the one pesented hee to intecept those intusions that evade the specific mechanisms. Thee ae a numbe of emaining issues to be examined. Hee ae the most impotant ones: It might be possible to deive moe exact fomulas fo non-andom data by looking at some measues of the self stings (entopy, aveage numbe of nonzeo enties in the template aays, numbe of holes etc.) It is possible to constuct a linea time algoithm fo the Hamming distance matching ule. This matching ule might give impoved pefomance because it does not limit the length of the matching templates and should theefoe be able to captue lage stuctues in the self stings. Fom a secuity point of view, it might be useful to have a matching ule fo which it is povably had to constuct (and thus to foge) a detecto set. Can we come up with matching ules based on some NPcomplete poblems fo instance? The effect of using negative detection as opposed to positive detection is not vey well undestood. Moe eseach would be needed to claify this issue. 6. Acknowledgments: The authos thank Dipanka Dasgupta, Deek Smith, Ron Hightowe and Andew Kosoesow fo thei useful suggestions and citical comments. The idea of a compute immune system gew out of a collaboation with D. Alan Peelson though the Santa Fe Institute. This wok is suppoted by gants fom the National Science Foundation (gant IRI ), Office of Naval Reseach (gant N ), Inteval Reseach Copoation, Geneal Electic Copoate Reseach and Development, and Digital Equipment Copoation. Refeences: [1] M. Cosbie and G. Spaffod, "Defending a Compute System using Autonomous Agents", in Poceedings of the 18th National Infomation Systems Secuity Confeence, [2] R. J. De Boe and A. S. Peelson, How divese should the immune system be? in Poceedings of the Royal Society London B, v.252, London, [3] P. D haeselee, Futhe efficient algoithms fo geneating antibody stings, Technical Repot CS95-3, The Univesity of New Mexico, Albuqueque, NM, [4] P. D haeselee, A change-detection algoithm inspied by the immune system: Theoy, algoithms and techniques, Technical Repot CS95-6, The Univesity of New Mexico, Albuqueque, NM, [5] P. D haeselee, An Immunological Appoach to Change Detection: Theoetical Results, accepted to the 9th IEEE Compute Secuity Foundations Wokshop, [6] S. Foest, A. S. Peelson, L. Allen and R. Cheukui, Self-nonself discimination in a compute, in Poceedings of the 1994 IEEE Symposium on Reseach in Secuity and Pivacy, Los Alamitos, CA: IEEE Compute Society Pess, [7] S. Foest, S. A. Hofmey, A. B. Somayaji and T. A. Longstaff, A sense of self fo UNIX pocesses, submitted to the 1996 IEEE Symposium on Secuity and Pivacy, [8] P. Helman and S. Foest, An efficient algoithm fo geneating andom antibody stings, Technical Repot CS-94-07, The Univesity of New Mexico, Albuqueque, NM, [9] J.W. Kapple, N. Roehm, P. Maack, "T cell toleance by clonal elimination in the thymus." in Cell, 49: , [10] W. E. Paul, Ed., Fundamental Immunology, Raven Pess Ltd. New Yok, 88-90, [11] J. K. Pecus, O. E. Pecus and A. S. Peelson, Pobability of Self-Nonself discimination in Theoetical and Expeimental Insights into Immunology, [12] A. S. Peelson and G. F. Oste, Theoetical Studies of Clonal Selection: Minimal Antibody Repetoie Size and Reliability of self-nonself Discimination in Jounal of Theoetical Biology, [13] J. V. Uspensky, Intoduction to Mathematical Pobability, McGaw-Hill, NY, 1937.

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Carter-Penrose diagrams and black holes

Carter-Penrose diagrams and black holes Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

MATHEMATICAL SIMULATION OF MASS SPECTRUM

MATHEMATICAL SIMULATION OF MASS SPECTRUM MATHEMATICA SIMUATION OF MASS SPECTUM.Beánek, J.Knížek, Z. Pulpán 3, M. Hubálek 4, V. Novák Univesity of South Bohemia, Ceske Budejovice, Chales Univesity, Hadec Kalove, 3 Univesity of Hadec Kalove, Hadec

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

CRRC-1 Method #1: Standard Practice for Measuring Solar Reflectance of a Flat, Opaque, and Heterogeneous Surface Using a Portable Solar Reflectometer

CRRC-1 Method #1: Standard Practice for Measuring Solar Reflectance of a Flat, Opaque, and Heterogeneous Surface Using a Portable Solar Reflectometer CRRC- Method #: Standad Pactice fo Measuing Sola Reflectance of a Flat, Opaque, and Heteogeneous Suface Using a Potable Sola Reflectomete Scope This standad pactice coves a technique fo estimating the

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Manual ultrasonic inspection of thin metal welds

Manual ultrasonic inspection of thin metal welds Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011 Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project

Spirotechnics! September 7, 2011. Amanda Zeringue, Michael Spannuth and Amanda Zeringue Dierential Geometry Project Spiotechnics! Septembe 7, 2011 Amanda Zeingue, Michael Spannuth and Amanda Zeingue Dieential Geomety Poject 1 The Beginning The geneal consensus of ou goup began with one thought: Spiogaphs ae awesome.

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

Physics 235 Chapter 5. Chapter 5 Gravitation

Physics 235 Chapter 5. Chapter 5 Gravitation Chapte 5 Gavitation In this Chapte we will eview the popeties of the gavitational foce. The gavitational foce has been discussed in geat detail in you intoductoy physics couses, and we will pimaily focus

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Lab #7: Energy Conservation

Lab #7: Energy Conservation Lab #7: Enegy Consevation Photo by Kallin http://www.bungeezone.com/pics/kallin.shtml Reading Assignment: Chapte 7 Sections 1,, 3, 5, 6 Chapte 8 Sections 1-4 Intoduction: Pehaps one of the most unusual

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Problem Set # 9 Solutions

Problem Set # 9 Solutions Poblem Set # 9 Solutions Chapte 12 #2 a. The invention of the new high-speed chip inceases investment demand, which shifts the cuve out. That is, at evey inteest ate, fims want to invest moe. The incease

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

Valuation of Floating Rate Bonds 1

Valuation of Floating Rate Bonds 1 Valuation of Floating Rate onds 1 Joge uz Lopez us 316: Deivative Secuities his note explains how to value plain vanilla floating ate bonds. he pupose of this note is to link the concepts that you leaned

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Explicit, analytical solution of scaling quantum graphs. Abstract

Explicit, analytical solution of scaling quantum graphs. Abstract Explicit, analytical solution of scaling quantum gaphs Yu. Dabaghian and R. Blümel Depatment of Physics, Wesleyan Univesity, Middletown, CT 06459-0155, USA E-mail: ydabaghian@wesleyan.edu (Januay 6, 2003)

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary

PAN STABILITY TESTING OF DC CIRCUITS USING VARIATIONAL METHODS XVIII - SPETO - 1995. pod patronatem. Summary PCE SEMINIUM Z PODSTW ELEKTOTECHNIKI I TEOII OBWODÓW 8 - TH SEMIN ON FUNDMENTLS OF ELECTOTECHNICS ND CICUIT THEOY ZDENĚK BIOLEK SPŠE OŽNO P.., CZECH EPUBLIC DLIBO BIOLEK MILITY CDEMY, BNO, CZECH EPUBLIC

More information

On Some Functions Involving the lcm and gcd of Integer Tuples

On Some Functions Involving the lcm and gcd of Integer Tuples SCIENTIFIC PUBLICATIONS OF THE STATE UNIVERSITY OF NOVI PAZAR SER. A: APPL. MATH. INFORM. AND MECH. vol. 6, 2 (2014), 91-100. On Some Functions Involving the lcm and gcd of Intege Tuples O. Bagdasa Abstact:

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

Experiment MF Magnetic Force

Experiment MF Magnetic Force Expeiment MF Magnetic Foce Intoduction The magnetic foce on a cuent-caying conducto is basic to evey electic moto -- tuning the hands of electic watches and clocks, tanspoting tape in Walkmans, stating

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

The Detection of Obstacles Using Features by the Horizon View Camera

The Detection of Obstacles Using Features by the Horizon View Camera The Detection of Obstacles Using Featues b the Hoizon View Camea Aami Iwata, Kunihito Kato, Kazuhiko Yamamoto Depatment of Infomation Science, Facult of Engineeing, Gifu Univesit aa@am.info.gifu-u.ac.jp

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

Experiment 6: Centripetal Force

Experiment 6: Centripetal Force Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee

More information

Questions for Review. By buying bonds This period you save s, next period you get s(1+r)

Questions for Review. By buying bonds This period you save s, next period you get s(1+r) MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

Supporting Efficient Top-k Queries in Type-Ahead Search

Supporting Efficient Top-k Queries in Type-Ahead Search Suppoting Efficient Top-k Queies in Type-Ahead Seach Guoliang Li Jiannan Wang Chen Li Jianhua Feng Depatment of Compute Science, Tsinghua National Laboatoy fo Infomation Science and Technology (TNList),

More information

Gauss Law. Physics 231 Lecture 2-1

Gauss Law. Physics 231 Lecture 2-1 Gauss Law Physics 31 Lectue -1 lectic Field Lines The numbe of field lines, also known as lines of foce, ae elated to stength of the electic field Moe appopiately it is the numbe of field lines cossing

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

The force between electric charges. Comparing gravity and the interaction between charges. Coulomb s Law. Forces between two charges

The force between electric charges. Comparing gravity and the interaction between charges. Coulomb s Law. Forces between two charges The foce between electic chages Coulomb s Law Two chaged objects, of chage q and Q, sepaated by a distance, exet a foce on one anothe. The magnitude of this foce is given by: kqq Coulomb s Law: F whee

More information