Lcast: Software-Defined Inter-Domain Multicast

Size: px
Start display at page:

Download "Lcast: Software-Defined Inter-Domain Multicast"

Transcription

1 Last: Software-Defined Inter-Domain Multiast Florin Coras a,, Jordi Domingo-Pasual a, Fabio Maino b, Dino Farinai b, Albert Cabellos-Apariio a a Universitat Politènia de Catalunya, UPC BarelonaTECH, Barelona, Spain b Ciso Systems, San Jose, CA, USA Abstrat Traditionally, effiient inter-domain data delivery may be implemented either as a network or appliation layer multiast servie. However, while the former has seen little uptake due to prohibitive deployment osts the latter is widely used today, but often without a minimum guaranteed performane. In this paper we present Last, a network-layer single-soure multiast framework designed to merge the robustness and effiieny of IP multiast with the onfigurability and low deployment ost of appliation-layer overlays. The arhiteture involves no end-host hanges and only requires the upgrading of a small set of routers to support the Loator/ID Separation Protool (LISP), an inrementally deployable enhanement to the urrent global routing infrastruture. Content distribution over the Internet s ore is done by means of a router overlay while within domains, end-hosts interfae with Last using onventional multiast protools. The overlay s salability and topologial onfigurability is sustained by logially entralizing group management. We illustrate the versatility of our solution by designing and assessing the salability and performane of three management strategies for low lateny ontent distribution. Our analysis is based on large sale simulations supported by realisti user behavior and Internet-like network topologies. The results show Last s low management overhead and ability to optimize delivery to meet various operational onstraints. Notably, we find that it an deliver traffi with latenies lose to uniast ones, independent of overlay size. Keywords: inter-domain multiast; Loator/ID Separation Protool; software-defined networking 1. Introdution The Internet is gradually beoming the preferred infrastruture for delivering live ontent suh as sports events or news to large user sets. Aording to reent Corresponding author addresses: foras@a.up.edu (Florin Coras), jordi.domingo@a.up.edu (Jordi Domingo-Pasual), fmaino@iso.om (Fabio Maino), dino@iso.om (Dino Farinai), aabello@a.up.edu (Albert Cabellos-Apariio) Preprint submitted to Computer Networks September 11, 2013

2 reports, video streaming is among the largest and the fastest growing bandwidth onsumers [1] and IPTV driven revenues are to rise from less less than USD 9.7B in 2011 to USD 21.3B in 2017 [2]. For suh senarios, where one-to-many ontent delivery to large number of reeivers is required, IP multiast [3, 4] is perhaps the most effiient solution in terms of bandwidth onsumption. However, although often supported within the onfinements of ampus, enterprise or servie provider networks, IP multiast deployments have been generally done disregarding inter-domain onnetivity, thereby resulting in disonneted multiast islands [5, 6, 7]. One fundamental ause for the slowly advaning deployment is the requirement that all routers be upgraded to support the protool. But other, frequently ited, reasons regard management omplexity and the lak of a lear ommerial servie [8]. While the former inurs high operational expenditure the latter leads to situations when multiast implementation over links with uniast eonomial agreements result in loss of revenue. The low uptake of IP multiast has led over the last deade to the development of many appliation-layer multiast (ALM) solutions that build end-host overlays to ensure Internet wide ontent dissemination. They are designed to be very flexible in aommodating globally spread users and adaptable to hanging network onditions. However, the inongruene they introdue between overlay and underlying network topology diminishes their delivery effiieny with respet to that of IP multiast. Furthermore, performane analysis has unovered signifiant limitations of these arhitetures in saling user quality of experiene with the inrease of lient population [9]. Reasons often reported are unavailability of inter-peer bandwidth, hurn or, in some ases, insuffiient upload apaity. Sine they are related to either end-host behavior or upload abilities, these limitations are intrinsi to the overlay s design and, therefore, not avoidable through optimized overlay management. In this paper, we propose a network-layer single-soure multiast framework designed to merge the benefits of IP multiast and ALM while avoiding their respetive deployment and saling issues. Our goal is to enable large sale single-soure streaming by interonneting existing multiast apable domains devoid of end-host software upgrades and transparently for the greater part of existing multiast routers. This approah is omplementary to existing ALM solutions as it aims to offer overlay management ontrol to network operators in exhange for improved reliability and more effiient network resoure use but at the ost of minimal infrastruture support. To ahieve our goal, we exploit a unique window of opportunity offered by the development and deployment of the Loator/ID Separation Protool (LISP) [10], a protool meant to improve the urrent routing infrastruture, whih we use as support for our proposal. In light of the intrinsi dependeny on LISP, we refer to our solution as LISPasting or shortly, Last. Last reates and optimizes a LISP router overlay and transparently interfaes with end-hosts and legay multiast routers by means of existing IP multiast protools [3, 4, 11]. Group management funtions are logially entralized and performed by an overlay oordinator whereby members require no prior 2

3 onfiguration nor need to be manually managed. We stress this as a ruial property sine it irumvents the management omplexity issue that plagues traditional IP multiast deployment and further opens the possibility to dynamially optimize delivery with respet to overlay topology maps. This ability ould be exploited by ontent providers to define their own overlay oordinating algorithms or perform on-line swithing between multiple ones, aording to speifi operational requirements or eonomial agreements. In this sense, Last is akin to Software-Defined Networking (SDN) [12] and, in fat, the two share many of the properties that derive from the implementation of a programmable ontrol plane. From an arhitetural standpoint, Last s ability to aommodate large number of lients is ensured through design, by deoupling the ontrol and forwarding funtions within the overlay. As a result, eah an evolve, be optimized and sale aording to speifi needs. In partiular, data plane salability an be ahieved by onstraining router repliation fators, to avoid performane penalties due to uniast repliation ineffiieny, while ontrol plane salability may be ensured by limiting ommuniation overhead. In both ases the tradeoff is overlay effiieny. To assess ontrol plane salability, the impat of repliation fators on effiieny and overlay onfigurability, we evaluate Last s ability to deliver low lateny ontent in three distint operational setups. Our simulations make use of (i) an Internet-like autonomous system (AS) level topology and (ii) large lient traes that emulate realisti lient behavior, onsisting of 3k ASes and approximately 140k unique IPs obtained through a globally distributed apture of SopCast [13] overlays. First of all, the results show the ontrol plane s ability to sale. Even when ative topology disovery mehanisms are used and lient hurn is high, the load is manageable by a single server ating as overlay oordinator. Seond, repliation fators need not be large for effiient ontent delivery. Finally, the overlay an be easily optimized onsidering various operational onstraints. Notably, if inter-member lateny an be estimated, Last an deliver ontent at lose to uniast latenies, independent of the overlay s size. The rest of the paper is strutured as follows. We disuss the related work in Setion 2 and provide a short overview of LISP in Setion 3. Setion 4 desribes the Last framework and Setion 5 introdues an optimization algorithm and two ways to obtain topology maps that may be used to optimize the overlay. Setion 6 presents our evaluation methodology and in Setion 7 we disuss the results. Finally, we onlude the paper in Setion Related Work As a long standing aademi and ommerial researh hallenge, singlesoure live media streaming benefits from opious amounts of related literature. Consequently, we restrit the disussion to a limited set of solutions and mainly fous on those that bear similarities to Last. Multiast funtionality that enables live media streaming was originally offered as a network-layer servie. But in light of IP multiast s lak of inter- 3

4 domain deployment, network layer solutions have turned into arhitetures that leverage isolated multiast deployments. One notable example is MBone [14], a virtual network designed to onnet multiast islands by means of stati uniast tunnels. Although it was first to support distribution of ontent to users spread in multiple domains, it proved hard to extend sine setting up tunnels involved manual onfiguration. AMT [15] irumvents this limitation by providing mehanisms for automatizing the tunnel setup proess with the help of dediated servers (relays and gateways) plaed in soure and destination domains. However, AMT does not support dynami reonfiguration of the tunnels, i.e., of the inter-domain distribution topology. Therefore, unlike Last, it is not able to adapt to hanging network onditions, lient hurn or to limit repliation overhead. A large set of appliation layer solutions, inluding NICE [16], Narada [17], OMNI [18], ZIGZAG [19] and Sribe [20], have been proposed by aademia in the last deade. Out of them, OMNI [18] is the losest in spirit to our proposal. It requires servie providers to deploy a set of proxying nodes that self organize in an overlay and forward traffi to subsribed lients. The optimizing algorithm employed is a distributed instane of the one we use and the metri onsidered is lateny. In ontrast, Last works at network-layer and is supposed to be deployed, at no additional ost, together with LISP. Moreover, Last s logially entralized ontrol plane allows easy deployment of new optimization algorithms without requiring router hanges. Apart from the aademi solutions, a large array of ommerial ALM arhitetures like SopCast [13], PPLive [21], CoolStreaming [22] or UUSee [23] are widely used for Internet ontent streaming. Being losed soure their arhitetures are not ompletely understood, nevertheless their performane has often been the subjet [24, 25, 26, 27] of aademi srutiny. The results have shown signifiant limitations of these arhitetures in saling user quality of experiene with the inrease of lient population. Last, being an extension of LISP, operates on domain border routers and thus builds an overlay topology that is not diretly exposed to lient hurn. Furthermore, through design it avoids imposing bandwidth strain on overlay members and ould assure ertain performane bounds. Another approah to delivering inter-domain multiast is to onnet islands of multiast enabled end-hosts by means of appliation layer overlays. Two of the solutions to follow this design guideline are Universal Multiast [6] and Island Multiast [7]. They are similar to Last in their use of existing multiast deployments for intra-island ontent delivery and of tunnels to onnet multiast islands. However, they ensure inter-island multiast delivery by building and optimizing overlays onsisting of end-hosts. This gives rise to three fundamental differenes. First, Last does not require hanges to end-hosts as the interdomain router overlay seamlessly interfaes with loal multiast. Seond, Last should use more effiiently the underlying intra-domain network sine paket repliation is always performed in domain border routers and therefore pakets avoid traveling intra-domain prior to being repliated and forwarded to hosts in foreign domains. As a downside to this, when fan-out values are large, the 4

5 routers have a higher proessing overhead however, as shown by our experiments, they need not be large for good performane. Finally, all solutions offer the option to onstrain fan-out values but Last offers ontrol to operators who have a vested interest in the effiieny of the overlay. That is, router out degrees should be generally limited to protet routers from saturating their interfaes and to ensure fairness in distributing the repliation responsibilities. We then believe that providing the ability to onfigure fan-out atually makes Last better suited for operational deployments than its P2P ounterparts. We previously proposed CoreCast [28], a LISP inspired inter-domain streaming arhiteture where soure and lient routers operate aording to a lientserver model. Both CoreCast and Last are based on LISP protool mehanisms but they have quite different approahes to delivering inter-domain traffi. In this sense, CoreCast aims to diminish inter-domain bandwidth use when ompared to P2P live streaming systems while Last aims to provide a salable and easily reonfigurable offloading mehanism for the soure LISP router. Finally, it is worth mentioning that LISP-Multiast [29] integrates IP multiast funtionality into LISP. Naturally, it inherits all the properties of traditional network layer multiast however it also requires ore router support for inter-domain use, thus making it unfeasible for a wide-sale deployment. 3. LISP Bakground LISP [10] is an arhitetural solution to the Internet s salability problem, reently generated by the alarming growth of inter-domain routing tables [30]. To this end, LISP s main goal is to split the semantis of IP addresses with the aim of forming two namespaes that unambiguously identify ore (loators) and edge (identifiers) network objets. Its development is aided by a pilotnetwork [31] and a onsiderable ommunity spanning over 32 ountries, with members pertaining to both aademia and industry. Notably, the protool that has reently undergone IETF standardization [32]. One of LISP s defining features, that also distinguishes it from many of its ompetitors, is its support for an inremental deployment. It is transparent to end-hosts and requires the upgrading of only stub domain border routers. Moreover, to failitate transition from the urrent Internet infrastruture, both loator and identifier namespaes use the existing IP addressing sheme. Therefore, the split does not affet routing within existing stub or transit networks. Nevertheless, as identifiers and loators bear relevane only within their respetive namespaes, a form of onversion, from one to the other, has to be performed at border points between ore and edge networks. LISP enabled border routers make use of a tehnique alled map-and-enap [33] for the translation. Apart from the need for data plane modifiations, map-and-enap also requires the introdution of a new ontrol plane mapping funtion able to provide bindings that link identifiers to loators. Therefore, prior to forwarding a host generated paket (see Figure 1), a LISP router maps the destination address, or what LISP alls an endpoint identifier (EID), to one or more orresponding destination routing loators(s) (RLOC) by means of a mapping obtained from a 5

6 LISP Legay MR Mapping System MS 1 2 Internet RLOCA2 3 RLOCA1 4 RLOCB1 RLOCB2 xtr A EIDSRC EIDDST xtr B Figure 1: Example paket exhange between EID SRC and EID DST with LISP. Pakets travel from EID SRC to xt R A aording to intra-domain routing. xt R A obtains a mapping binding EID DST to RLOC B1 and RLOC B2 from xt R C through the mapping-system (steps 1-3). Then, xt R A hooses RLOC B1 as tunnel destination, enapsulates the pakets and forwards them over the Internet s ore to xt R B (step 4). Finally, xt R B deapsulates and forwards the pakets to EID DST. LISP speifi diretory servie, alled the mapping database system [34, 35]. A priority is assoiated to an RLOC to indiate the preferene of it being used, and a weight indiates how traffi is to be load balaned between RLOCs with the same priority. Mappings are requested on-demand, as opposed to being proatively obtained, and stored in a loal map-ahe suh that they may be reused. To retrieve a mapping, a LISP router direts a Map-Request message arrying the destination EID to a Map-Resolver (MR) part of the mapping system and in return reeives as answer a Map-Reply. One the mapping is obtained, the border router selets one of the EID s RLOCs as tunnel destination, enapsulates the paket with a LISP-UDP-IP header and forwards it to orresponding edge network. At the reeiving router, the paket is deapsulated and forwarded to its intended destination. For a detailed example see Figure 1. In LISP parlane, the soure router, that performs the enapsulation, is alled an Ingress Tunnel Router (ITR) whereas the one performing the deapsulation is named the Egress Tunnel Router (ETR). One that performs both funtions is referred to as an xtr. Additionally, LISP makes use of Re-enapsulating Tunnel Routers (RTRs), that perform re-enapsulation, i.e., deapsulation followed by enapsulation, to enable paket re-routing based on EID. It is also in the ETR s duty to register the EID address spae, one or multiple EID-prefixes it is responsible for, with its assoiated Map-Server (MS) by means of Map-Register messages. At their turn, Map-Servers aggregate and advertise the EID-prefixes in the mapping system to enable EID routing. Then, having this information, the mapping system an ensure the delivery of a Map-Request to the MS that originates the EID-prefix overing the request s destination ad- 6

7 dress. Depending on onfiguration, the MS an either answer or forward to an ETR the Map-Requests it reeives. 4. Last Arhiteture This setion presents our proposal for supporting inter-domain multiast streaming. We start by providing an overview of the arhiteture and then desribe in greater detail group management proedures and signaling Arhiteture Overview Last is a LISP extension that provides a single-soure multiast servie to lients in disjoint multiast islands by means of a router overlay. It ompensates for the lak of an inter-domain multiast infrastruture by performing uniast enapsulated, and if possible also multiast enapsulated, repliation of multiast traffi aross the Internet s ore. The resulting overlay interfaes with existing intra-domain IP multiast protools so it does not require any end-host software upgrades. All member domains must be LISP enabled and may partiipate in the overlay with at least one of their border routers (ETRs). On the data path, the soure domain s border router, an ITR, heads the distribution tree and is the first to perform enapsulated repliation. Subsequently, all downstream overlay members, save for the leaves, repliate the reeived pakets up to a ertain fan-out. Note that sine traffi is unidiretional, from multiast soure to lients, all routers but the soure ITR perform either only deapsulation or deapsulation and re-enapsulation. For brevity we refer to all of them as ETRs, although those that perform both funtions also implement RTR funtionality. See Figure 2 for a depition of an example Last data plane. An important drawbak to uniast enapsulated repliation is that it redues throughput proportionally to the repliation fator, if performed multiple times out the same interfae. As a result, inreasing fan-out an quikly saturate router interfaes and therefore not only deteriorate overlay performane but also ongest other flows sharing the same links. Additionally, sine paket repliation is performed sequentially, the time differene between the instane the first and last replias are forwarded may be onsiderable. So, besides inreasing the delay to obtaining the multiast pakets for diretly onneted downstream members, the resulting lateny may aumulate and distribute unevenly aross the hierarhy, randomly leading to branhes with low performane. Finally, apart from the limitations onerning performane, unbounded fan-out an also lead to unfair and/or eonomially unfeasible situations. Generally, Last and other island multiast solutions substantially redue inter-domain traffi exhange, if ompared to simple uniast delivery or unoptimized P2P overlays (see Setion 7). However, if the distribution tree is not arefully onstruted, member routers serving few lients might be requested to repliate a disproportionate number of times, against their interest and to the advantage of other eonomially benefited peers. To avoid these ineffiienies and in the interest of fairness, we request that Last members have a onstrained fan-out whereby the overlay 7

8 s soure lient Last IP multiast s Internet ITR ETR Figure 2: Example Last data-plane arhiteture. The ITR is the first to repliate the ontent and all downstream ETRs may repliate up to a fixed fan-out value. In the example, fan-out is onstrained to 2. must be organized as a degree-onstrained tree, despite the potential to redue distribution effiieny. Fan-out values ould be fixed for the whole overlay or reported at subsription by eah member. It should be noted that, similarly to end-host overlays, purely repliating routers, RTRs, ould be provisioned in transit domains to ensure improved overlay stability, performane and also onsiderably redue or remove altogether the repliation overhead of ETRs. However, suh a solution also implies a business model, different to the one disussed here, where third party entities manage the RTRs and engage in eonomial agreements with the soure and lient edge-domains. Sine we are not ready to model business relationships, or speulate how suh RTRs ould be deployed, in this paper we limit the analysis to overlays where repliation is performed exlusively by ETRs. For a tehnial disussion on how RTRs ould be onfigured to partiipate in the overlay, we refer the interested reader to an Internet-Draft [36] we published on the subjet. Another limitation to having routers partiipate in an overlay, is that they are generally ineffiient at handling omplex omputation tasks sine they are designed to perform fast forwarding of pakets as opposed to general purpose omputing. To irumvent this drawbak, Last leverages LISP s native separation between data and ontrol plane to ensure the logial entralization of group management funtions in an overlay oordinator. Thereby, at data plane level routers only perform enapsulated repliation while at ontrol plane level, the oordinator must ompute a distribution tree and ensure members are organized aording to it. Besides supporting our original goal of having no management osts for routers, this design also opens the possibility for enhaned overlay onfigurability. In this sense, if the oordinator obtains or is onfigured with a map of the loator underlay, it may proeed to optimize the distribution tree with 8

9 respet to a given metri. Moreover, the arhiteture allows the swithing between multiple optimization funtions or metris, even on-line, to meet hanging operational requirements. Note that we are not the first to propose suh split. This ideas has been previously reommended to aid routing salability [37] and is nowadays entral to urrent SDN researh [38]. Possible implementers of the overlay oordinator may be the soure ITR or the MS. Reusing the previous argument, sine the ITR is a router, we onsider the MS better fit for the funtion. In fat, due to its position in the LISP ontrol plane, the MS is required to proess and provide answers to all Map-Requests originated by routers willing to initiate ommuniation with the multiast soure. Then, as it an reognize and keep trak of all overlay members, the MS should also be the one to deide the attahment point for a joining member or the one to optimize the overlay. Although the design allows for the overlay state and/or management funtions to be distributed, in this artile we are interested in evaluating if the ontrol plane overhead is sustainable by one, off-the-shelf, server ating as MS. Last is ompatible with the urrent LISP speifiation, but apart from the anonial LISP messages we introdued in Setion 3, it additionally requires the signaling messages defined in [39] for onveying joining (Join-Request message) and leaving (Leave-Request message) multiast information. They are not Last speifi and have been designed to simplify the onneting of multiast apable sites with LISP-Multiast Member Subsription In Last enabled domains, end-hosts request single-soured multiast ontent, the way they do with traditional IP multiast, namely, by subsribing to a multiast stream using the Internet Group Management Protool (IGMP) [40, 4]. They learn the hannel identifier (S-EID,G), onsisting of the multiast soure address S-EID and a multiast group address G, used to distinguish between the multiple hannels originated by a soure, either through onfiguration or with the help of appliation-layer protools. Exept in the partiular ase when S-EID is part of the same domain, and therefore the ontent may be delivered loally without Last, the subsription request propagates intra-domain up to one of the domain s border routers, an ETR. If the ETR is already a member of the multiast hannel, it starts repliating the multiast ontent towards the requesting end-host and no further ation is taken. If not, the ETR initiates a two step overlay join proedure whereby it first attahes to the Last overlay serving (S-EID,G) and seondly it advertises its ability to repliate multiast ontent. To omplete the first step, the ETR must initially obtain the loator, of at least one of the already onneted routers, to be used as overlay attahment point. It ahieves this by requesting that the hannel identifier be mapped to the loators of potential overlay parents, in essene, by sending a Map-Request for (S-EID,G). The request propagates through the mapping system up to the oordinating MS, whih ensuing the request s reeipt, starts a searh for overlay 9

10 members with spare apaity. The searh may be done randomly or, if additional topologial information exists, in aordane to a predefined heuristi that ould ensure that an optimal attahment point is hosen. One obtained, the result, onsisting of a list of one or multiple RLOCs pertaining to the overlay members able to aommodate new hildren, is onveyed to the joining ETR in a Map-Reply. Typially, the MS will offer an ETR the possibility of hoosing its upstream either when not optimizing the overlay or when all the hoies have an equal ost in the distribution tree. Using loal poliy (e.g., shortest AS path) and the priority and weight values assoiated to the list entries, the ETR hoses the best RLOC and sends it a Join-Request message to request the setting up of an overlay branh between the two. The parent router appends the RLOC of the joining ETR to the list towards whih it performs uniast enapsulated repliation, therefore onluding the ETR s attahment. Alternatively, if the two routers an be onneted by inter-domain multiast, the joining ETR first performs a protool dependent multiast join to the parent in the underlying inter-domain network. Afterwards, it indiates the multiast hannel identifier, to be used as destination for the multiast enapsulated pakets (as opposed to uniast enapsulated), in the Join-Request. A speial ase arises when an ETR is first to join the overlay. In this situation, the ETR requests the multiast ontent from the ITR, but it may happen that the ITR is not yet subsribed to (S-EID,G). Therefore, on reeipt of the Join-Request, the ITR must first subsribe to the multiast soure, using IGMP or a PIM Join [41] message, to obtain the streamed ontent to be repliated towards the joining ETR. The seond step in a member s subsription proedure is to signal that it an perform repliation within the overlay. To this end, one the ETR is attahed, it starts registering (S-EID,G) with the MS. The Map-Register message onveys the ETR s RLOC, that of the hosen parent and the number of intra-domain lients it serves at a ertain time instant. To be noted that the estimating of the membership in a multiast session, although traditionally a diffiult task, an be ahieved within a domain using the expliit traking apabilities of both IGPM and PIM. Then, having for a hannel identifier the registration messages of all the overlay members, allows the MS to build an aggregated (S-EID,G) mapping that provides a omplete view of the overlay s topology, i.e., of how the members organize in a distribution tree. This mapping, together with underlay topologial information, if any exists, is used by the MS to answer Map-Requests of joining ETRs and to optimize the distribution tree. Two additional benefits of the proedure, sine registrations are refreshed periodially, are that the MS impliitly detets the failure of an ETR and also beomes aware of the hanges in lient population within a domain. The way the distribution tree is built has two advantages. First, it ensures that multiast pakets in the soure domain do not reah the ITR if no ETR is joined and the ITR does not partiipate in a loal multiast group. Seond, pakets are forwarded from ITR to all ETRs without mapping database lookups thus, with minimum overhead. 10

11 4.3. Member Failure and Unsubsription If a member loses network onnetivity, its data path hildren will sense the failure either as a lak of multiast pakets or by means of a LISP speifi mehanism, alled RLOC-Probing. This proedure, used by xtrs, onsists in the use of Map-Request messages to determine reahability of peer xtrs and to estimate round-trip times (RTT). One the hildren detet the failure they look for new overlay parents by either sending Join-Requests to other RLOCs in the mapping assoiated to (S-EID,G) or, if no other exists, by redoing the whole subsription proedure. Still, suh irumstanes will result in paket loss for all members of the subtree headed by the affeted router and out of band mehanisms would be required for remedying the failure. Suh mehanisms are out of the sope of the urrent paper. However, sudden loss of network onnetivity for a domain s border router should be a seldom ourrene. An ETR initiates its unsubsription from the Last overlay when the last of its lients leaves the intra-domain multiast group. First, if the ETR repliates ontent to other overlay members, it inrements the priority of the RLOC registered with the MS to the least preferable value and replies to RLOC-Probing messages indiating that its RLOC is unreahable. The update fores the MS to avoid assigning the ETR new hildren and fores the existing ones to find new overlay parents. The lookup proedure is idential to the one followed in the event of a parent failure however, in this ase there are no paket losses. Alternatively, when the MS senses the departure of an ETR, it ould proeed to optimizing the whole affeted subtree to avoid performane degradation. As a seond step, the ETR sends a Leave-Request to its overlay parent and stops registering (S-EID,G) with the MS, onluding the unsubsription Distribution Tree (Re)Configuration The position of an overlay member on the data-path is established at subsription time, however the MS ould be onfigured to further optimize the distribution tree, if provided with information about the overlay s topology. In this ase, distribution effiieny is ontrolled by the MS through optimal plaement of joining ETRs and/or through periodi or enfored tree reshaping. When reorganizing the distribution tree, the MS informs members of their new positions through updated mappings. To avoid paket loss and to assure a seamless transition, members use a make before break proedure when swithing parents. Hene, prior to sending Leave-Request to their overlay parents, members first attah to those indiated in the updated mappings. If any dupliate pakets arise, they should be disarded by end-hosts at appliation layer. This type of entralized management enables the easy ustomization of the distribution tree as routers are oblivious to optimization algorithm hanges. In fat, a key feature of Last, is that an operator in ontrol of the MS an perform on-line swithing between multiple optimization algorithms or topology disovery protools, if more are supported, to better adapt the overlay to operational onstraints. In the next setion, we provide as example a possible tree optimizing algorithm and ways of obtaining topologial information that ould be implemented in Last. 11

12 5. Overlay Optimization The onfiguration of the Last overlay ontroller is appliation and operator speifi. To illustrate this point, in this setion we onsider the lassial problem of delivering lateny onstrained ontent (e.g., live streaming of news and sports events) and show how Last ould be used to solve it. We first propose an algorithm to ompute the distribution tree and afterwards point out how ITR-loal BGP routing tables and organized inter-domain lateny measurements ould be used to approximate overlay topology. For brevity, we further refer to the ombination of an optimization algorithm and a topology disovery mehanism as an optimization strategy Distribution Tree Optimization Algorithm In what follows, we use the term distane when referring to a relative length or amplitude of a metri, observed on a path onneting two points, but when the exat nature of the metri is of no interest. Considering our goal of delivering ontent for delay sensitive appliations, the funtion we minimize in our experiments is the maximum distane (e.g. lateny or number of AS hops) from a lient to the multiast soure. Notie that the referene is the end-host and not the domain border router (ETR). Thus, what matters in deiding an ETR s position in the overlay tree is not solely its distane to the ITR but also the number of lients it serves. Then, a router lose to the soure but serving few lients might find itself lower in the hierarhy than another with a slightly higher distane but with a larger lient set. In other words, the algorithm tries to improve average end-host quality of experiene by optimizing the router overlay onsidering two dimensions, inter-router distane and the size of the lient set served by a router. This also ensures the algorithm is fair to members. Domains with fewer lients are more likely to beome leaves while those with larger user sets, the ones that benefit most from Last, are required to ontribute by repliating. The problem desribed above, heneforth named minimum average distane, degree-bounded spanning tree (MADDBST), may be formally stated the following way: Definition 1. Given an undireted omplete graph G=(V,E), a designated vertex r V, a degree bound d(v) d max, v V, d max N, a vertex weight funtion (v) N and an edge weight funtion w(e) R +, edge e E. Let Pr,v T be the set of edges e on the path from vertex r to v in the graph s spanning tree T. Also, let Wr,v T = e P w(e) represent the ost of the path linking r and r,v T v in the spanning tree T. Find the spanning tree T of G, routed at r, satisfying d T (v) d max, suh that v V,v r (v)w r,v T is minimized. We note that [42] and [18] have previously defined and solved similar optimization problems. Shi et al. [42] also proved that a partiular instane of the problem, where all verties have weight 1, is NP-omplete for degree onstraints 2 d max V 1. Similarly to our approah, they were interested in 12

13 a entralized solution whereas Banerjee et al. [18] have suessfully managed to distribute the algorithm. The heuristi we used to solve the MADDBST problem is similar to the one used by Banerjee and it is a variant of the one proposed by Shi. In short, the algorithm works by inrementally growing a tree started at the root node r until it beomes a spanning tree. For eah node v, not yet a tree member, it selets a potential parent node u in the tree T, suh that the metri δ(v) = (W T r,u + w(u, v))/(v), i.e., the distane to the soure per lient, is minimized. At eah step, the node with the smallest metri value is added to the tree and the parent seletion is redone BGP-based Topology Map One of the best soures of topologial information that is not or an not be ommonly used by appliation layer overlays is the BGP routing table. The BGP information an AS router holds attempts to present an Internet wide interonnetion map. But, due to the algorithm s distributed nature and its use of poliy, both inauraies and inomplete information may exist. The ITR has two options for obtaining BGP topologial information. First, it may aggregate partial BGP feeds from multiple overlay members (global view) or seond, it may itself onnet to BGP (loal view). The former ould ensure a more detailed desription of the topology, and thus grounds for better deisions, while the latter a more restrited, partial view of the interonnetion map and seemingly worse performane. Another aspet to be onsidered regarding the global view is that an off-line obtained BGP map may be rendered inadequate due to hurn whereas one obtained through on-line aggregation of multiple BGP tables may be a tehnially hallenging task. Even more so as some domains may be relutant to provide suh information whih they often deem as sensitive. By ontrast, the loal, on-line topology gathering mehanism requires nothing more than BGP feeds from the ITR. Additionally, there is no need for a ommuniation protool between the MS and the overlay members for the onveying of BGP reahability information. To ompare the two alternatives, we take as global view the Internet-like topology we use in our evaluation and as loal view the routing table of the ITR. More details on how we obtained the dataset an be found in Setion 6.2. Using these two topologies we omputed the relative AS path length inrease of the loal view and the distribution of the path lengths for both. Results are depited in Figure 3. If we fous on Figure 3a, we see that 99% of the loal view paths are at most 2 hops longer than in the global view and about 20% have an idential length. On average, path length in the loal view inreases only about 1.1 hops. This is also illustrated in Figure 3b where we an also note that, save for the average 1 hop inrease, the distributions of hop lengths are similar. Given the relatively small differene, we are lead to onlude that the loal view presents a reasonably aurate desription of the topology. Due to its relatively good auray and, more importantly, due to the implementation simpliity, we opted in our experiments for the BGP topology disovery mehanism based on loal information. The metri it provides, inter 13

14 Cumulative Probability Cumulative Probability global view loal view relative path length inrease (AS hops) path length (AS hops) (a) Cumulative probability of the relative path(b) Cumulative probability of the AS path length inrease due to loal view lengths Figure 3: Comparison of BGP loal and global views AS hops, in ombination with the optimization algorithm results in a degreeonstrained shortest AS path tree optimization strategy. For brevity, we shall refer to it as bgp. Should there be interest in obtaining a minimum AS hop ost tree, at the expense of larger number of hops to the soure, a degree-onstrained minimum spanning tree heuristi should be used Lateny-based Topology Map Inter-member lateny is a metri ommonly employed by appliation layer overlays in topology optimizations. Yet, obtaining an inter-member lateny map may sale poorly with the population size and therefore its implementation may be both expensive and tehnially hallenging. For instane, in a topology onsisting of N members, a naive approah, whereby eah member measures all possible peers, would require N-1 measurements per member. To prevent saling the number of measurements with the size of potentially large overlays, a more intelligent approah for the seletion of link latenies worth estimating is needed. We avoid performing a large number of measurements and assure they are arried out in an optimized order by exploiting a mehanism similar to the one used by Banerjee et al. for the group management of NICE [16]. The solution onsists in lustering nodes that are lose to one another in terms of lateny and limiting the inter-member measurements to just the pairs finding themselves in lose proximity. The amortized ost analysis shows that the number of ontrol plane peers (i.e., the number of peers measured) at an average member is onstant O(k) while in the worst ase it an reah O(k log(n)). Where, k is a onstant limiting the node degree and the size of the luster and N is the number of overlay members. Even in the worst ase, given that N may be in the range of thousands to tens of thousands, this is a onsiderable derease from O(N). 14

15 Another advantage of the entralized group management is that the lateny disovery mehanism, when implemented in Last, has a lower per member ommuniation overhead than in NICE, as members do not partiipate in a separate ontrol plane protool. However, LISP s extension to provide for a simple mehanism to onvey lateny measurements between ETRs and the MS is required. Sine ETRs hek the liveness of the loators assoiated to ahed mappings with RLOC-probing, the extension requires just the implementation of a message, similar to a Map-Reply for reporting the RTT estimates. The ombination of the lateny topology disovery protool and the optimization algorithm results in an optimization strategy we further refer to as lat. 6. Evaluation Methodology To ompare the performane of the overlay optimization strategies proposed in the previous setion, we implemented an event-based simulator. In what follows we desribe the simulator s omponents and our evaluation methodology. We start by desribing the datasets and the proedure followed to build an Internet-like inter-domain topology. Subsequently, we present the methodology used to generate traes that emulate realisti lient behavior and explain our simulation setup. We onlude the setion with a brief presentation of the metris used to evaluate overlay performane Simulation Methodology Our experimental evaluation simulates a set of 140k end-hosts spread in 3k autonomous systems, wathing a live stream over an Internet-like topology with the help of Last. For this purpose, we developed a event-base simulator apable of handling large sale Last overlays and several optimization strategies. This resulted in the partial implementation of Map-Server and ETR funtionality. In all the experiments we employ as ontent soure an arbitrary autonomous system as we observed that the hoie does not influene the results. Client ASes partiipate in the overlay with one ETR and their deision to subsribe or unsubsribe is triggered by the ativity of intra-domain users they serve. To simulate various types of user behavior, the latter is provided as input to the simulator in the form of trae files that log end-host join and leave events. ETR subsriptions are not optimized, but done at the first randomly found free position in the distribution tree not to bias the effet of the optimization strategies and are always based on uniast onnetions. The distribution tree is optimized by the MS periodially (10 min) or if more than a third of the members sustain an inrease of the served lient set above 10 or drop to 1, join or leave the overlay. These values were hosen to balane the omputation osts and the overlay s ontent delivery effiieny. Additionally, to evaluate the influene of tree optimizations on ommuniation overhead, we require that all member departures trigger the optimization of the affeted sub-trees instead of only having the affeted hildren reperform the subsription proedure. We 15

16 detail the optimization algorithm, the Internet-like topology and the three traes that desribe user behavior in the next setions. The performane of eah optimization strategy is evaluated by running simulations with respet to the lient trae and fan-out values, whih we vary between 2 and 10 to understand how repliation fators influene performane. For eah suh simulation run, we sample and store for analysis overlay state one per minute and ontrol traffi overhead one per seond. Finally, to better gauge the performane of bgp and lat, we also define and evaluate a very simple overlay management strategy that does not perform topology disovery or tree optimizations. In this senario, we further refer to as rnd, members join at random positions in the distribution tree and member departures always require the affeted hildren to repeat the subsription proedure Internet Inter-Domain Topology To obtain a realisti global inter-domain topology we aggregated datasets that estimate how autonomous systems interonnet from multiple soures: iplane [43], RouteViews [44], CAIDA [45] and RIPE [46]. All the data used is from April The dataset laks link speifi BGP poliy information that ould transform part of the AS graph s edges in ars (direted links). Most affeted by this assumption are the links between ustomers and their upstream providers and peering links between stub ASes. The first type may not be used by upstream providers for transiting traffi to destinations other than those found in their lients network. The seond type may not be used to transit traffi to destinations outside a peer s network. Sine, Last only repliates traffi between stub domain border routers, the two types of links may be misused only when a non-member stub domain transits traffi to or from an Last member. However, stub domains generally have a muh less diverse onnetivity than transit domains thereby, suh situations should be a seldom ourrene. For the resulting inter-as topology, we observed that the log-log plot for the omplementary umulative distribution funtion (CCDF) of the AS-node degree follows a straight line, a property found in power law distributions. Aordingly, as previously shown in [47] and [48], the Internet AS topology is a sale-free network with power law node degree distribution. Further, the average path length in our topology is 3.5 or 5.4% lower than the 3.7 observed [49] in the Internet. These two results orroborate our laim that the aggregate topology has properties similar to those of Internet s AS graph. For estimating inter-as lateny, we made use of iplane s [43] proven lateny predition abilities for IP pairs [50]. Beause we needed to estimate the lateny between domain border routers we had to elet for all partiipating ASes a representant. We did so by using iplane s estimations that assoiate points of presene (PoP) to ASes and their inter-onnetion map. For any domain, the PoP with the largest degree was eleted as the representant. In about 30% of the ases, when iplane failed to provide an answer, we used a lateny estimator based on geographial distane desribed in [51]. 16

17 6.3. The Client Traes To ensure a thorough evaluation of the optimization strategies, we make use of lient traes that emulate omplementary types of user behavior. The domains that partiipate in the overlay and their respetive number of lients were obtained from a passive distributed apture of several P2P TV hannels whereas the lient hurn was modeled in aordane to reent results in the field. We detail both efforts in what follows. SopCast [13] is one of the P2P TV appliations frequently used for streaming of live sports events. Wanting to model lient distribution for large events of global, or at least wide-spread interest, we aptured the traffi pertaining to several SopCast overlays during an 2011 UEFA Champions League semifinal. To this end, we used 2 vantage points in USA, 5 in Europe and 2 in Asia, spanning a total of 6 ountries. We were interested in understanding how lients luster in autonomous systems, not in the speifi performane of a hannel s overlay. Thus, depending on the upload apabilities of eah vantage point, we joined a number of P2P hannels, streaming the same event, at eah node. As a result, the traes finally ontained more than 145k unique IPs spread in over 3.8k ASes. Out of them, in our simulations we used 3k ASes for whih we ould ompute pairwise lateny estimates. More information about the traes we aptured and their properties an be found in [52]. In spite of the large size of our aptured dataset, lak of logs from the overlay s bootstrapping server made it impossible to approximate lient lifetime in the overlay. We thus resorted to syntheti modeling of lient hurn. As shown by several studies [53, 25, 24, 27, 26], it is generally aeptedthat lient arrival proess, at least for periods spanning dozens of minutes, an be modeled by a Poisson proess. Furthermore, Sripanidkulhai et al. observed in [53], after analyzing 3 months worth of Akamai logs, that short duration events, whih last a ouple of hours, present flash rowds whereas non-stop streams have a time of day behavior. These findings were onfirmed by Veloso in [27] who also noted that for long streams lient inter-arrivals an be modeled through a Pareto or a pieewise stationary Poisson proess. For lient session lengths however, onsensus ould not be found. Thus, depending on stream length or the type of system being analyzed by either paper, they may follow different distributions. Still, with the exeption of [25], there seems to be an agreement that sessions should have lengths distributed aording to a power law but opinions diverge when assessing the weight of the tail. Considering the works disussed above, in order to perform an evaluation of our proposed arhiteture that aknowledges the wide range of lient behavior, we generated 3 traes with omplementary properties. The goal was to model a short event, spanning 2h 30min, with a piee-wise Poisson arrival proess but with different shapes for the session length distributions. In order to apture the flash rowd effet we required that 80% of the lients join during the first 30min, and the rest spread over the time left. For the session lengths we used a Pareto distribution with a shape parameter of 1.5 and a sale parameter, 17

Lcast: Software-defined Inter-Domain Multicast

Lcast: Software-defined Inter-Domain Multicast Last: Software-defined Inter-Domain Multiast Florin Coras, Jordi Domingo-Pasual, Fabio Maino Dino Farinai and Albert Cabellos-Apariio Universitat Politénia de Catalunya (BarelonaTECH) Ciso Systems Abstrat

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers To Coordinate Or Not To Coordinate? Wide-Area Traffi Management for Data Centers Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang Department of Computer Siene, and Department of Eletrial

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction

AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Construction AngelCast: Cloud-based Peer-Assisted Live Streaming Using Optimized Multi-Tree Constrution Raymond Sweha Boston University remos@s.bu.edu Vathe Ishakian Boston University visahak@s.bu.edu Azer Bestavros

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Scalable TCP: Improving Performance in Highspeed Wide Area Networks

Scalable TCP: Improving Performance in Highspeed Wide Area Networks Salable TP: Improving Performane in Highspeed Wide Area Networks Tom Kelly ERN - IT Division Geneva 3 Switzerland tk@am.a.uk ABSTRAT TP ongestion ontrol an perform badly in highspeed wide area networks

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method

In order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation

Online Energy Generation Scheduling for Microgrids with Intermittent Energy Sources and Co-Generation Online Energy Generation Sheduling for Mirogrids with Intermittent Energy Soures and Co-Generation Lian Lu Information Engineering Dept. he Chinese Univ. of Hong Kong Jinlong u Information Engineering

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

A Design Environment for Migrating Relational to Object Oriented Database Systems

A Design Environment for Migrating Relational to Object Oriented Database Systems To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

Dynamic and Competitive Effects of Direct Mailings

Dynamic and Competitive Effects of Direct Mailings Dynami and Competitive Effets of Diret Mailings Merel van Diepen, Bas Donkers and Philip Hans Franses ERIM REPORT SERIES RESEARCH IN MANAGEMENT ERIM Report Series referene number ERS-2006-050-MKT Publiation

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005 DOI: 10.4054/DemRes.2005.13.

VOLUME 13, ARTICLE 5, PAGES 117-142 PUBLISHED 05 OCTOBER 2005  DOI: 10.4054/DemRes.2005.13. Demographi Researh a free, expedited, online journal of peer-reviewed researh and ommentary in the population sienes published by the Max Plank Institute for Demographi Researh Konrad-Zuse Str. 1, D-157

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS

INTELLIGENCE IN SWITCHED AND PACKET NETWORKS 22-24 Setember, Sozool, ULGRI INTELLIGENCE IN SWITCHED ND PCKET NETWORKS Ivaylo Ivanov tanasov Deartment of teleommuniations, Tehnial University of Sofia, 7 Kliment Ohridski st., 1000, hone: +359 2 965

More information

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING

TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING INTERMAN 7 TRENDS IN EXECUTIVE EDUCATION: TOWARDS A SYSTEMS APPROACH TO EXECUTIVE DEVELOPMENT PLANNING by Douglas A. Ready, Albert A. Viere and Alan F. White RECEIVED 2 7 MAY 1393 International Labour

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

Srinivas Bollapragada GE Global Research Center. Abstract

Srinivas Bollapragada GE Global Research Center. Abstract Sheduling Commerial Videotapes in Broadast Television Srinivas Bollapragada GE Global Researh Center Mihael Bussiek GAMS Development Corporation Suman Mallik University of Illinois at Urbana Champaign

More information

Bandwidth Allocation and Session Scheduling using SIP

Bandwidth Allocation and Session Scheduling using SIP JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat

More information

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks

A Game Theoretical Approach to Gateway Selections in Multi-domain Wireless Networks 1 A Game Theoretial Approah to Gateway Seletions in Multi-domain Wireless Networks Yang Song, Starsky H.Y. Wong and Kang-Won Lee IBM Researh, Hawthorne, NY Email: {yangsong, hwong, kangwon}@us.ibm.om Abstrat

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Product Warranties and Double Adverse Selection

Product Warranties and Double Adverse Selection rodut Warranties and Double Adverse eletion David A. oberman Assistant rofessor of Marketing INEAD Boulevard de Constane 77305 Fontainebleau Cede, Frane The author thanks rofessors Andy Mithell, Jak Mintz,

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

The Advantages of Using Aountable Care Organizations ( ACOs)

The Advantages of Using Aountable Care Organizations ( ACOs) JLEO, V3 S i77 Struturing Inentives within Aountable Care Organizations Brigham Frandsen Brigham Young University James B. Rebitzer* Boston University Shool of Management and ational Bureau of Eonomi Researh

More information

Public DNS System and Global Traffic Management

Public DNS System and Global Traffic Management . This paper was presented as part of the main tehnial program at I INFOCOM 211 Publi DNS System and Global Traffi Management Cheng Huang Mirosoft Researh David A. Maltz Mirosoft Researh Albert Greenberg

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

A Theoretical Analysis of Credit Card Reform in Australia *

A Theoretical Analysis of Credit Card Reform in Australia * A Theoretial Analysis of Credit Card Reform in Australia * by Joshua S. Gans and Stephen P. King Melbourne Business Shool University of Melbourne First Draft: 12 th May, 2001 This Version: 5 th May, 2003

More information

SupermarketPricingStrategies

SupermarketPricingStrategies SupermarketPriingStrategies PaulB.Ellikson Duke University SanjogMisra University of Rohester November 13, 2006 Abstrat Most supermarket firms hoose to position themselves by offering either Every Day

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Optimal Allocation of Filters against DDoS Attacks

Optimal Allocation of Filters against DDoS Attacks Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T

A Comparison of Default and Reduced Bandwidth MR Imaging of the Spine at 1.5 T 9 A Comparison of efault and Redued Bandwidth MR Imaging of the Spine at 1.5 T L. Ketonen 1 S. Totterman 1 J. H. Simon 1 T. H. Foster 2. K. Kido 1 J. Szumowski 1 S. E. Joy1 The value of a redued bandwidth

More information

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential)

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential) Plan Basis The D.C. Long Term Disability Insurane Plan Exlusively for NBAC members Issued by The Prudential Insurane Company of Ameria (Prudential) What does it over? The D.C. Long Term Disability Insurane

More information