Probabilistically Tracking System Calls
|
|
- Rose Ross
- 7 years ago
- Views:
Transcription
1 Probabilitically Tracking Sytem Call Saurabh Goyal, and Akah Lal Computer Science Department Univerity of Wiconin, Madion {aurabh, May, 2005 Abtract Monitoring ytem call made by an application i ueful for debugging, for diagnotic a well a for ecurity application. Exiting tool for monitoring ytem call either uffer from a large runtime overhead, or require root permiion to change the kernel of the operating ytem. We propoe an approach that tackle both of thee iue. We implemented a tool that run completely in uer pace and require no change to the operating ytem. It work by probabilitically ampling a few of the ytem call made a proce, thu lowering it overhead. We how that by uing proper ampling technique, our tool i able to figure out the ame information a a tool that track all ytem call. 1 Introduction With increaing oftware complexity, debugging i becoming an important tak. There i a need for tool that can help a uer undertand the execution behavior of a program running on hi ytem. In the abence of detailed undertanding, or the ource code, of a program, the only way to undertand it execution i by monitoring it interaction with the environment. Thi type of black-box debugging approach, where no aumption are made about the program ha the advantage of being applicable to all oftware. In thi paper, we decribe an approach for monitoring the interaction of a program with the operating ytem by recording the ytem call made by the program. We focu our attention on the Linux operating ytem a it i commonly ued, and i le helpful than other operating ytem. Thu, our approach will work on other operating ytem a well. There are a hot of utilitie on Linux that can monitor ytem call of a proce [3, 4]. However, they either uffer from a large runtime overhead, or from requiring root permiion to change the kernel of the operating ytem. We propoe an approach that tackle both of thee iue. We have implemented a tool that run completely in uer pace without requiring any change to the operating ytem. It probabilitically ample a few of the ytem call made a proce, thu lowering it overhead. We how that by uing proper ampling technique, our tool i able to figure out the ame information a a tool that track all ytem call. We alo how that our tool will epecially be helpful in ecurity application that require continuou ytem call monitoring. One uch application i hotbaed intruion detectin ytem (HIDS). Like blackbox debugging, HIDS guard againt ecurity vulnerabilitie without making any aumption about the tructure of a program. They monitor ytem call made by an application and look for deviation from normal ytem call behavior to detect a compromie in the ecurity of the application. The ret of thi paper i organized a follow. Sec- 1
2 tion 2 decribe a Linux tool that can monitor ytem call in uer pace. In Section 3 we modify thi tool to probabilitically monitor ytem call. In Section 4, we preent reult that how overhead and preciion of our tool. The ection alo explain hot-baed intruion detection ytem further. Section 5 dicue ome of the related work, and Section 6 conclude with ome final remark and future work. 2 STRACE A common Linux utility ued for tracking ytem call made by a proce i trace [3]. It entirely execute in uer-mode, and can be ued to attach onto any proce running in the ame uer pace. Once attached, it can track all ytem call made by the proce, and print them out on tandard output in human-readable form. trace alo build up a ummary of ytem call made that maintain information like the number of ytem call made, and the time pent per ytem call type, e.g., it can how the total time taken by all read ytem call, and the average time pent per read ytem call. trace i baed on a Linux ytem call, called ptrace, which i alo the heart of all debugger in Linux. ptrace i ued to attach a parent proce onto a running proce, uch that the parent can oberve and control it execution. The ret of thi ection decribe how trace ue the ptrace ytem call. Once a parent proce P i attached onto a child proce C, it can ak the kernel, via ptrace, to raie a ignal (SIGTRAP) whenever C enter and exit a ytem call. Thi ignal i then caught by P, at which point in time the execution of C i topped. P can now examine the regiter and the core image of C. After examining the content of C, P can reume the execution of C, again via theptrace ytem call. The baic tructure oftrace i hown in Fig. 1, where we aume that ignal are only raied becaue of ytem call. The firt line attache trace onto the proce with ID pid and become it parent proce. Inide the loop, at line 3, trace wait for a ignal from the child, which it get once the child make a ytem call. trace then examine the regiter and tack content of the child to figure out what ytem call wa made, (1) ptrace(pid, ATTACH); (2) while(true) { (3) wait4(pid); (4) proce call tart (5) ptrace(pid, CONT); (6) wait4(pid); (7) proce call end (8) ptrace(pid, CONT); (9) } Figure 1: The baic tructure of trace. The ytem call wait4(pid) upend the execution of calling proce until a ignal i raied by proce with ID pid. The call ptrace(pid, CONT) i ued to reume the execution of the (topped) proce with ID pid. and with what argument (line 4). The child proce i then reumed, after which trace repeat thee three tep in line 6 8 to proce the exit from the ytem call. At the exit, trace record the return value, and alo the time it took for the ytem call to complete. Thi whole proce repeat for the next ytem call. 3 Probabilitic Strace A i evident from the decription of trace preented in Section 2, each ytem call entry and exit require two context witche: from the monitored proce to trace, and back. Thi reult in a large overhead, which ometime low down the monitored proce coniderably. Some meaurement of thi overhead are hown in Section 4. The context witche are actually unavoidable if we want to track ytem call in uer pace. Therefore, in order to reduce the overhead, we mut decreae the number of ytem call monitored, or implement the monitoring 2
3 inide the kernel. A mentioned in the introduction, we want a tool that can be ued by any uer without changing hi ytem. Thu, we dicard the latter approach of changing the kernel. The ret of thi ection decribe ptrace (Probabilitic-trace), a modified verion of trace that lower the overhead by a uerdefined amount by probabilitically monitoring only ome of the ytem call. Suppoe that we want ptrace to monitor every 10 th ytem call of a proce. One approach would be to monitor a ingle ytem call like trace doe; detach from the proce to let it run freely; leep until the proce make 9 ytem call; and then attach back onto the proce to repeat thi whole thing again. Thi would decreae the overhead by 9 time, becaue we only require 2 context witche for 10 ytem call, intead of the 20 context witche that trace required (at the cot of monitoring fewer ytem call). However, implementing thi approach on top of the Linux operating ytem i impoible becaue there i no way of finding out the number of ytem call that a proce made while ptrace wa detached from it. To get around thi difficulty, we meaure the time that the proce took to make a ingle ytem call, and then ue it to etimate the time it would take the proce to make 9 more ytem call. ptrace can then leep for thi amount of time, and attach back onto the proce with the hope that it made exactly 9 ytem call during the time for which ptrace lept. We now formalize thi approach. Suppoe that the uer want to meaure percent of the ytem call (0 < < 100). Then for each ytem call made by a proce, ptrace hould leep for n = ( 100 ) ytem call, i.e., for = 25, ptrace will leep for 3 ytem call for each monitored call. The baic tructure of ptrace i hown in Fig. 2. It involve one mall, but important change. Intead of monitoring jut one ytem call and then leeping for n ytem call, we monitor b ytem call and then leep for b n ytem call. There are two advantage of doing thi. Firt, the mallet time meaurement for the uer time taken by a proce i 10 m (provided in the /proc file ytem), which i too large to meaure the time taken to make a ingle ytem call. A reaonably well choen value of b (1000 or more) enure that our time meaurement are accurate. The (1) ptrace(pid, ATTACH); (2) while(true) { (3) do(b time) { (4) wait n proce tart(pid); (5) wait n proce end(pid); (6) } (7) ptrace(pid, DETACH); (8) leep(b 100 (9) ptrace(pid, ATTACH); (10) } ytem call); Figure 2: The baic tructure of ptrace. The function wait n proce tart i an abbreviation of line 3 5 in Fig. 1, and the function wait n proce end i an abbreviation of line 6 8 in the ame figure. econd advantage of having the parameter b i that it allow u to obtain conecutive equence of ytem call. A we hall in Section 4.1, thi i eential for ecurity application to obtain a fair etimate of a proce behavior. We call b a the burt ize. The etimate of time taken by a proce to make a ytem call i calculated a follow: proce time(pid) + (real time proce time(ptrace)) 2 b Here, proce time i the um of uer and ytem time taken by a proce, and real time i wall-clock time. Thi formula i baed on averaging two etimate of how much proceing the proce took to make a ytem call. Each meaurement i taken for the time it took to execute the loop in line 3 6 in Fig. 2. A running average of thi time i ued to calculate the exact time ptrace will leep for in line 8 by multiplying it by (b 100 ). There i till one deficiency in the ptrace model preented in Fig. 2. Conider monitoring a program that make 100read call followed by 100write call, 3
4 where each call take approximately the ame amount of time. If we chooe b = 100, and our timing i accurate enough, we will oberve all read call but will entirely mi out on the write ytem call. Thi violate our goal of providing a fair etimate of a program behavior. We ue randomization to olve thi problem. Conider a equence of event (in our cae, event are ytem call). We want to oberve each event with an equal probability, ay p (0 < p < 1). Then the following derive the probability of kipping the firt n event, and meauring (n + 1) t event: Pr (Meauring 1 t event) = p Pr (Skipping 1 event, Meauring 2 nd event) = (1 p) p Pr (Skipping 2 event, Meauring 3 rd event) = (1 p) 2 p Pr (Skipping n event, Meauring (n + 1) t event) = (1 p) n p The above i a geometric ditribution with mean (1/p). Therefore, intead of leeping for a fixed number (b 100 ) of ytem call, we hould leep for k ytem call, where k i a random number obtained from a geometric ditribution with mean (b 100 ). Thi give u two probabilitic guarantee: Firt, on an average ptrace will leep for (b 100 ) number of ytem call; and econd, each ytem call i meaured with an equal probability. Thee guarantee are baed on the aumption that the ti mining meaurement are accurate. In practice, the variation in timing i alo a ource of randomne, but i not enough to enure fair ytem call etimate, a we hall ee in Section 4. A imilar trategy of ampling event i ued in program analyi a well, where the objective i to ample certain predefined runtime event, intead of ytem call [8]. The final code tructure of ptrace i hown in Fig Perfect Knowledge ptrace In order to meaure the accuracy of ptrace, we modified the Linux kernel 1 to provide a per-proce meaure of the number of ytem call the proce 1 Appendix A decribe the change. (1) ptrace(pid, ATTACH); (2) while(true) { (3) do(b time) { (4) wait n proce tart(pid); (5) wait n proce end(pid); (6) } (7) ptrace(pid, DETACH); (8) k = rand geo(b 100 ); (9) leep(k ytem call); (10) ptrace(pid, ATTACH); (11) } Figure 3: The complete tructure of ptrace. The function wait n proce tart and wait n proce end are the ame for Fig. 2. The function rand geo(n) generate a random number with geometric ditribution with mean n. made ince it wa tarted. We ued thi meaure to rewrite ptrace and create ktrace (Kernel-baedprobabilitic-trace), which alo run a a uerproce but ha a much better etimate of the time to leep for while detached from the monitored procee. Intead of leeping, ktrace could have pinlocked on the ytem call number to tart monitoring a oon a the right number of ytem call have taken place, but thi would incur an unneceary overhead. Thu, we ue ame time etimate that ptrace ue to calculate leep-time, but we ue the ytem-callnumber information to reolve inaccuracie in uch timing meaurement. After waking up ktrace look at the number of ytem call made while it wa leeping. If thi number, ay n 1, wa different from the required number n 2 = (b 100 ) of ytem call it wanted to leep for, then it adjut the leep time by multiplying it with (n 2 /n 1 ). Thi approach will dynamically try to 4
5 approach the correct leep time value. A a fall-back guard, ktrace alo maintain two global count: the ytem call it ha monitored (g 1 ), and the total number of ytem call the proce ha made (g 2 ), the latter of which i imply obtained from the modified kernel. If the lag in ytem call monitored, defined a ((g 2 /100) g 1 ), exceed twice the burt ize, ktrace decide not to leep at all and continue to monitor the next b ytem call. Thi enure that ktrace i never off it target by much. We preent a detailed evaluation of ktrace along with that of ptrace a it illutrate the improvement in performance of ptrace when the kernel i more helpful that what the Linux kernel i currently. 4 Evaluation For probabilitic tracing of ytem call, there are two major criteria that we have to evaluate the output on. The firt i overhead of the probabilitic tracing and the econd i how well the output tatitic match the true tatitic. In thi ection we how the reult for both the above criteria. We alo preent an experimental reult comparing the reliability of ptrace with ktrace. The lat experimental reult will how the effect of uing the geometric ditribution for calculating the leep time. We evaluated our tool baed on three program, potmark [2], which i a tandard fileytem benchmark, thttpd [5], which i a imple web erver and a toy fileytem program Toy-f that doe a read(), write() and leek() in a loop. Thee program were firt run tandalone and then attached to the original trace program. Then, we ran the program with ptrace and ktrace, four time each. The burt ize for potmark and thttpd wa fixed to 1000, and the burt ize for Toy-f wa fixed to The parameter for percentage of ytem call monitored wa et to 50%, 25%, 10%, and 1% in the four run repectively. Fig. 4 how the overhead of tracking ytem call for the potmark benchmark. The original program ran in 5.62 econd. The total number of ytem call made by the program i 517K. Tracking all thee call uing trace took econd. A we reduce the Execution time of program (in econd) Number of call traced (in thouand) Figure 4: Change in overhead with the number of ytem call traced for potmark. The original program ran in 5.62 econd Execution time (in econd Number of ytem call traced (in million) Figure 5: Change in overhead with the number of ytem call traced for Toy-f. The original program ran in econd number of ytem call traced, the execution time goe down linearly. For tracing 50K call the time taken i 6.55 econd. The time reduce further, but a we how in other graph, the accuracy of the output below thi point uffer. Fig. 5 how the ame graph for Toy-f. It alo how a linear decreae in execution time. The tandalone program take econd. The table below compare the reliability of ktrace with ptrace. The firt column i the requeted ampling percentage and the other two column how how many call were actually tracked. Thi i for the potmark program. The total number of ytem call made by the program are 517K. 5
6 Sample % ptrace ktrace K 255K K 127K 10 63K 50K 1 7K 5K The table how that ktrace track almot the ame percentage of ytem call that it i aked to, wherea ptrace i lightly off the aked percentage. Thi difference wa more for the toy program. Out of a total of 6 million call, the following i what wa traced. Sample % ptrace ktrace M 3M M 1.48M M 0.57M M 0.04M Again, ktrace follow the requeted percentage cloely. ptrace monitor le ytem call than requeted becaue the ytem call rate of Toy-f wa very high, which made it overetimate the leep-time. The next table how the accuracy of the output tatitic. When the potmark program i run with trace, mot of the time i pent in the ytem call open(), write(), and unlink(). The percentage of time pent in thee call i 27%, 22%, and 19% repectively. The table below how how cloely thee percentage match when all the call are not traced. Sample % ptrace, ktrace open() write() unlink() 50 27, 36 22, 22 19, , 26 23, 24 19, , 27 23, 22 19, , 20 28, 25 17, 30 The time tatitic eem to be reaonably cloe for ampling percentage a low a 10%. For 1% ampling, the accuracy i a bit off, in fact the order of percentage time pent ha changed. More time i hown for write() than for open(). In other experiment, the accuracy for the toy fileytem program wa good only for 50% ampling, while for the thttpd program, it wa good down to 1%. One thing to note here i that the actual number of ytem call tracked wa not the ame for ktrace and ptrace, thee number have been reported earlier. The next experiment how that uing the geometric ditribution to calculate the leep-time reult in improved accuracy at lower ampling rate. We how the comparion on the thttpd program. We made a workload of imple HTTP GET requet and traced the weberver ytem call during that workload. The weberver make 270K call during thi time, and mot time i pent in the ytem call poll(), mmap2(), and end(). The actual percentage time pent in thee call i 84%, 11% and 3% repectively. The firt table, here, how the percentage time pent when the leep time wa jut a contant time the burt ize (Fig. 2). Sample % ptrace, ktrace Call open() mmap2() end() 10 47K,33K 82, 84 10, 10 3, 3 1 6K,4K 88, 88 8, 7 1, 2 We ee that the accuracy at 1% ampling i off the original value. The ame figure when taken after modeling the leep time uing a geometric ditribution are hown in the following table. The value at 1% ampling here, are cloer to the original value. Sample % ptrace, ktrace Call open() mmap2() end() 10 43K,33K 84, 84 10, 10 3, 2 1 5K,4K 82, 87 11, 8 3, 2 While not exhautive, thee reult demontrate that probabilitic tracing of ytem call can reult in ignificant reduction in overhead without much lo in the uability of it output. They alo demontrate the improvement made by making the kernel give ytem call information and by uing a geometric ditribution for calculating the leep time. 4.1 Hot-Baed Intruion Detection In thi ection, we briefly explain the utility of ptrace in ecurity application. A oftware i getting more complicated, it i increaingly common to 6
7 find application that have ecurity flaw in them. For example, wu.ftpd (Wahington Univerity ftpd 2.4), a ftp daemon, if miconfigured at compile time, allow uer SITE EXEC acce to /bin. Uer can then run executable uch a bah with root privilege. Such flaw, until dicovered, poe a big rik to the ytem uing thee application, epecially when the application interface with untruted uer on the Internet. Example of uch application are Weberver, client and ftp client [1]. Hot-baed intruion detection ytem (HIDS) are ued by ytem adminitrator to guard againt unknown vulnerabilitie in oftware. One way in which they are ued i the following [9]: Firt, the potentially-vulnerable application i ued by truted uer. HIDS monitor the ytem call made by the application under uch uage, and build a model of the ytem call that the application hould make. Thi model i typically built from conecutive ytem call equence made by the application. In the econd tage, the application in put on the Internet, where untruted uer can ue the application. The ytem call are till monitored, but are checked againt the model built in the previou tage. If in a hort period of time, many ytem call equence do not match any in the model, the application i topped. The intuition i that if there i a break-in into the application, the behavior of the application will change ubtantially o that the ytem call equence made will differ from thoe obtained under valid execution of the application. Thu, a deviation from the normal ytem call that the application make, mean a potential attack i taking place. HIDS preent an intereting cenario for uing ptrace. HIDS require continuou monitoring of ytem call, and overhead mut be mall enough to avoid affecting the performance of the application in quetion. We can ue ptrace to parely ample the ytem call made by the application with low overhead. A oon a ome ytem call equence doe not atify the ytem-call-model, we can increae the ampling rate to monitor more ytem call till the point we are convinced if thi i an attack (more ytem call equence do not match the model) or not (other equence match the model). With the aumption that attack are rare, ptrace will run with very little overhead mot of the time. We have not ued ptrace inide a HIDS, becaue we were not able to imulate real attack cenario. However, we ran ptrace on potmark and recorded all ytem call. Then, we ued a tool called tide [1] to build a databae of all contiguou equence of ytem call of length 6. We found that out of 480K ytem call made by potmark, there were only 159 unique equence. When we ampled down the meaured ytem call to 30K, we till obtained 125 equence. Thi how that there i a high redundancy in the ytem call equence made by a proce, i.e., the ame ytem call equence i made over and over again. Thu, ptrace mie very few ytem call equence. 5 Related Work The idea of ampling program execution behavior i common in dynamic program analyi [8, 6]. The goal there i to monitor the execution of a program by recording the value of program variable at certain program point. Intead of recording the program tate after each intruction, a ampling trategy i ued to monitor only a few location. After recording uch ampled data, certain propertie of the program can be inferred. Like ptrace, the effort i to have a ampling trategy that provide a fair etimate of the program execution. Unlike program variable, tracking ytem call doe not require any emantic knowledge about the program. The ytem community alo make ue of ampling to figure out program behavior. The VMware ESX erver [10] ample the memory page ued by a client operating ytem to etimate the idle memory of the operating ytem. Thi etimate i ued in the page-replacement policy, where higher preference i given to the page of an operating ytem with greater amount of idle memory. The Lottery Scheduler [11] ue a randomized election policy. The guarantee of fairne and proportional haring it provide are probabilitic. Anticipatory cheduling [7] make cheduling deciion baed on an etimate of the time it would take for a proce to make the next requet. Thi i imilar to the leep-time etimate 7
8 thatptrace make for time till the next ytem call. Beide trace, another tool ued for monitoring ytem call i ycalltrack [4]. It i not baed on the ptrace ytem call, but it hijack the ytem call table inide the kernel to call it own function before paing control onto the actual ytem call handler. Thi tool can only be ued by a root uer, a changing the ytem call table require root permiion. However, monitoring ytem call only require an extra function call intead of a context witch. Thi mean that ycalltrack will run with a very mall overhead. One can enviion implementing the ampling trategy of ptrace inide ycalltrack to further reduce it overhead in performance critical application. 6 Concluion and future work In thi paper we have hown the utility of ptrace, a probabilitic ytem call monitoring tool, a a low overhead alternative to trace. We have preented reult that how that overhead can be controlled by the uer by modifying the ampling rate of ptrace. We alo how that a decreae in the ampling rate i not necearily accompanied by a lo in preciion. The ytem call etimate, in the form of percentage time taken per ytem call type, remain fairly accurate in mot cenario. Moreover, the ytem call equence captured at low ampling rate alo faithfully model the actual ytem call equence. Thi motivate the ue of ptrace in ecurity ytem that require uch ytem call information, and alo have a great need for low-overhead continuou ytem call monitoring. A future work, one can add a recent-time-window ummary of ytem call. Thi will include timing information of recent ytem call, and will incrementally forget timing information of previou ytem call. The benefit of having uch a ummary i that it reflect the current interaction of an application with the operating ytem. Thi i ueful for diagnotic purpoe. In cae the network or the file ytem low down, the recent ummary will how the increaed time for ytem call made to thoe device. A limitation of ptrace i that it calculate leeptime baed on the etimate obtained from timing previou ytem call behavior regardle of what part of a proce i execution. Some part of a proce might make ytem call at a fater rate than other part. Thu, a better approach for ptrace would be to track the leep-time relative to the programcounter of a proce, uch that fewer call are monitored from region with high ytem call rate, and more call are monitored from region with low ytem call rate. Thi type of ampling trategy i followed in [6]. The current implementation of ptrace lack the ability to follow fork in a proce. Monitoring multiple procee uing one intance of ptrace would require implementing an event-driven loop, intead of a imple loop that leep when detached from the monitored proce. The current implementation can till be ued by manually invoking ptrace to track child procee. Reference [1] Computer immune ytem. immec/ytemcall.htm. [2] Potmark: A new file ytem benchmark. library/3022.html. [3] Strace: Sytem call tracing. wichert/trace/. [4] ycalltrack: Tracking ytem call inide the kernel. [5] thttpd: tiny/turbo/throttling http erver. [6] Matthia Hauwirth and Trihul M. Chilimbi. Low-overhead memory leak detection uing adaptive tatitical profiling. In Proc. of Int. Conf. on Arch. Support for Prog. Lang. and Operating Sytem, page , [7] Sitaram Iyer and Peter Druchel. Anticipatory cheduling: A dik cheduling framework to overcome deceptive idlene in ynchronou I/O. In Sympoium on Operating Sytem Principle, page ,
9 [8] Ben Liblit, Alex Aiken, Alice X. Zheng, and Michael I. Jordan. Bug iolation via remote program ampling. In SIGPLAN Conf. on Prog. Lang. Deign and Impl., page , [9] Anil Somayaji Steven A. Hofmeyr, Stephanie Forret. Intruion detection uing equence of ytem call. Journal of Computer Security, 6(3): , [10] Carl A. Waldpurger. Memory reource management in VMware ESX erver. In Operating Sytem Deign and Implementation, [11] Carl A. Waldpurger and William E. Weihl. Lottery cheduling: Flexible proportional-hare reource management. In Operating Sytem Deign and Implementation, page 1 11, A Modifying the Linux Kernel In thi ection, we decribe ome of the change we made to the Linux kernel verion to make it record the number of ytem call made by a proce in it lifetime. The kernel maintain a data-tructure of type tak truct, declared in include/linux/ched.h, for each proce running on the machine. We modified thi tructure to include an extra field (ycall) that count the ytem call made by the proce. The macro INIT TASK, declared in the ame file, i ued to initialize the tak tructure for a new proce. Thi wa changed to et ycall to zero. The next tep wa to change arch/i386/kernel/entry.s aembly file (for i386 architecture). It contain the piece of code that a proce trap to whenever it make a ytem call. We added a call to a new function at thi point that increment the ycall of the current proce. Thee change together keep a perfect account of the ytem call made by a proce. The next change wa to report thi value to the uer. Thi wa accomplihed via the /proc file ytem. The file f/proc/bae.c and f/proc/array.c were changed to create an extra file in /proc/pid/ directory that reported the ytem call count. 9
Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,
MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS
More informationA Review On Software Testing In SDlC And Testing Tools
www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,
More informationProject Management Basics
Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management
More informationUnit 11 Using Linear Regression to Describe Relationships
Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com
More informationDISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle
DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection
More informationCluster-Aware Cache for Network Attached Storage *
Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,
More informationPerformance of a Browser-Based JavaScript Bandwidth Test
Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further
More informationRO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds
!111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg
More informationMSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents
MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................
More informationA technical guide to 2014 key stage 2 to key stage 4 value added measures
A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool
More informationCASE STUDY ALLOCATE SOFTWARE
CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT
More informationApigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management
Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4
More informationT-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D
The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from
More informationAssessing the Discriminatory Power of Credit Scores
Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,
More informationCASE STUDY BRIDGE. www.future-processing.com
CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION
More informationINFORMATION Technology (IT) infrastructure management
IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning
More informationA New Optimum Jitter Protection for Conversational VoIP
Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill
More informationBi-Objective Optimization for the Clinical Trial Supply Chain Management
Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective
More informationReturn on Investment and Effort Expenditure in the Software Development Environment
International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar
More informationA Spam Message Filtering Method: focus on run time
, pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department
More informationReport 4668-1b 30.10.2010. Measurement report. Sylomer - field test
Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of
More informationFEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS
Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC
More informationUtility-Based Flow Control for Sequential Imagery over Wireless Networks
Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building
More informationTRADING rules are widely used in financial market as
Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a
More informationSoftware Engineering Management: strategic choices in a new decade
Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk
More informationTwo Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL
Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy
More information1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation
Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted
More information1) Assume that the sample is an SRS. The problem state that the subjects were randomly selected.
12.1 Homework for t Hypothei Tet 1) Below are the etimate of the daily intake of calcium in milligram for 38 randomly elected women between the age of 18 and 24 year who agreed to participate in a tudy
More informationA Note on Profit Maximization and Monotonicity for Inbound Call Centers
OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright
More informationLicense & SW Asset Management at CES Design Services
Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What
More informationTrusted Document Signing based on use of biometric (Face) keys
Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online
More informationControl Theory based Approach for the Improvement of Integrated Business Process Interoperability
www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development
More informationSHARESYNC SECURITY FEATURES
www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over
More informationSCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto
More informationNETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET
Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now
More informationCHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY
Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad
More informationAcceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds
Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden
More informationIndependent Samples T- test
Independent Sample T- tet With previou tet, we were intereted in comparing a ingle ample with a population With mot reearch, you do not have knowledge about the population -- you don t know the population
More information6. Friction, Experiment and Theory
6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationMixed Method of Model Reduction for Uncertain Systems
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced
More informationA Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks
A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International
More informationTIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME
TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic
More informationGroup Mutual Exclusion Based on Priorities
Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio
More informationOptical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng
Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare
More informationPartial optimal labeling search for a NP-hard subclass of (max,+) problems
Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden
More informationName: SID: Instructions
CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/
More informationControl of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling
Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada
More informationRisk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms
Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,
More informationQUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES
Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,
More informationINTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS
INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,
More informationMobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN
Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic
More informationPerformance of Multiple TFRC in Heterogeneous Wireless Networks
Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding
More informationMBA 570x Homework 1 Due 9/24/2014 Solution
MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively
More informationHow Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal
How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing
More informationSupport Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.
The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem
More informationA note on profit maximization and monotonicity for inbound call centers
A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an
More informationThe Cash Flow Statement: Problems with the Current Rules
A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention
More informationChapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS
Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning
More informationSenior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow
Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie
More informationREDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.
International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.
More informationTowards Control-Relevant Forecasting in Supply Chain Management
25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem
More informationQueueing Models for Multiclass Call Centers with Real-Time Anticipated Delays
Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science
More informationScheduling of Jobs and Maintenance Activities on Parallel Machines
Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department
More informationReview of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015
Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize
More informationGrowth and Sustainability of Managed Security Services Networks: An Economic Perspective
Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,
More informationMimicry Attacks on Host-Based Intrusion Detection Systems
Mimicry Attack on Hot-Baed Intruion Detection Sytem David Wagner Univerity of California, Berkeley daw@c.berkeley.edu Paolo Soto Univerity of California, Berkeley paolo@xcf.berkeley.edu ABSTRACT We examine
More informationFour Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations
Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open
More informationOhm s Law. Ohmic relationship V=IR. Electric Power. Non Ohmic devises. Schematic representation. Electric Power
Ohm Law Ohmic relationhip V=IR Ohm law tate that current through the conductor i directly proportional to the voltage acro it if temperature and other phyical condition do not change. In many material,
More information2. METHOD DATA COLLECTION
Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,
More informationSELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE
SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,
More informationDUE to the small size and low cost of a sensor node, a
1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang
More informationG*Power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences
Behavior Reearch Method 007, 39 (), 75-9 G*Power 3: A flexible tatitical power analyi program for the ocial, behavioral, and biomedical cience FRAZ FAUL Chritian-Albrecht-Univerität Kiel, Kiel, Germany
More information1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3
Proceeding of the 3 rd International Conference on Information Sytem, Logitic and Supply Chain Creating value through green upply chain ILS 2010 Caablanca (Morocco), April 14-16 The right information to
More informationCapital Investment. Decisions: An Overview Appendix. Introduction. Analyzing Cash Flows for Present Value Analysis
f. Capital Invetment Deciion: An Overview Appendix Introduction Capital invetment deciion are the reponibility of manager of invetment center (ee Chapter 12). The analyi of capital invetment deciion i
More informationPekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T
Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping
More informationLaureate Network Products & Services Copyright 2013 Laureate Education, Inc.
Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate
More informationCHAPTER 5 BROADBAND CLASS-E AMPLIFIER
CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e
More informationTap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms
Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:
More informationAuction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing
1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and
More informationMANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *
MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald
More informationProfitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations
Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari
More informationGlobal Imbalances or Bad Accounting? The Missing Dark Matter in the Wealth of Nations. Ricardo Hausmann and Federico Sturzenegger
Global Imbalance or Bad Accounting? The Miing Dark Matter in the Wealth of Nation Ricardo Haumann and Federico Sturzenegger CID Working Paper No. 124 January 2006 Copyright 2006 Ricardo Haumann, Federico
More informationTHE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE
THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity
More informationDistributed, Secure Load Balancing with Skew, Heterogeneity, and Churn
Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load
More informationMECH 2110 - Statics & Dynamics
Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight
More informationModule 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur
Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor
More informationProgress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools
Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review
More informationSimulation of Sensorless Speed Control of Induction Motor Using APFO Technique
International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra
More informationA Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University
A Communication Model with Limited Information-Proceing Capacity of Recipient Oleg V. Pavlov WPI Robert K. Plice San Diego State Univerity Nigel Melville Univerity of Michigan, Ann Arbor Keyword pam, email,
More informationBio-Plex Analysis Software
Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware
More informationSocially Optimal Pricing of Cloud Computing Resources
Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett
More informationNetwork Architecture for Joint Failure Recovery and Traffic Engineering
Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,
More informationOffice of Tax Analysis U.S. Department of the Treasury. A Dynamic Analysis of Permanent Extension of the President s Tax Relief
Office of Tax Analyi U.S. Department of the Treaury A Dynamic Analyi of Permanent Extenion of the Preident Tax Relief July 25, 2006 Executive Summary Thi Report preent a detailed decription of Treaury
More informationPOSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING
POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING Pavel Zimmermann * 1. Introduction A ignificant increae in demand for inurance and financial rik quantification ha occurred recently due to the fact
More informationnaifa Members: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS
naifa Member: SERVING AMERICA S NEIGHBORHOODS FOR 120 YEARS National Aociation of Inurance and Financial Advior Serving America Neigborhood for Over 120 Year Since 1890, NAIFA ha worked to afeguard the
More informationOnline story scheduling in web advertising
Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where
More informationA Life Contingency Approach for Physical Assets: Create Volatility to Create Value
A Life Contingency Approach for Phyical Aet: Create Volatility to Create Value homa Emil Wendling 2011 Enterprie Rik Management Sympoium Society of Actuarie March 14-16, 2011 Copyright 2011 by the Society
More informationHealth Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,
Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking
More information