Scalable Peer-to-Peer Video Streaming in WiMAX Networks

Size: px
Start display at page:

Download "Scalable Peer-to-Peer Video Streaming in WiMAX Networks"

Transcription

1 Scalable Pee-to-Pee Video Steaming in WiMAX Netwoks Muhammad Aman, Biplab Sikda and Shyam Paekh Depatment of ECSE, Rensselae Polytechnic Institute, Toy, NY Bell Labs, Alcatel-Lucent, Muay Hill, NJ Abstact The inceasing populaity and success of web-based pee-to-pee (P2P) systems fo steaming video applications make them likely candidates fo injecting lage volumes of taffic in the emeging WiMAX netwoks. This pape develops a lightweight mechanism fo P2P steaming in WiMAX netwoks that significantly educes the load on the netwok and impoves the scalability of the steaming system. The poposed system uses the boadcast mechanism povided in the IEEE mechanism fo poviding the scalability, without beaking the P2P semantics. The scalability of the poposed system is analytically evaluated and also quantified using simulations. Ou esults show that the degee of impovement in the pefomance of the poposed system is lowe bounded by the aveage numbe of pees seved by an Access Sevice Netwok Gateway in the WiMAX netwoks. I. INTRODUCTION An inceasingly popula application in the Intenet today is pee-to-pee (P2P) video steaming [1], [2], [3]. With the advent of many commecial gade systems that ae feely available, P2P steaming has attained a lage numbe of uses. Fo example, the Chinese New Yea celebations wee boadcast by a commecial P2P steaming systems to ove 200,000 uses in the Intenet with bits ates in the ange Kbps [4]. When one consides ealistic futue scenaios with potentially millions of uses watching steams of 500 Kbps o moe, the Intenet backbone and access netwoks such as those offeed by WiMAX can be easily ovewhelmed with taffic. In the context of WiMAX as the access netwok fo the uses of these sevices, in addition to the scalability povided by the P2P steaming systems, additional WiMAX specific featues may be equied to ensue satisfactoy use expeience. Fom the pespective of WiMAX opeatos, it is thus of inteest to evaluate the scalability of video steaming in thei netwoks and facilitate the integation of featues in the P2P systems that exploit the flexibility and unique featues of the PHY and MAC layes of WiMAX netwoks. Existing wok on P2P steaming systems pimaily focuses on wied netwoks [1], [2], [3] and these solutions ae not well suited fo WiMAX netwoks and neithe ae they capable of exploiting the featues and functionalities of these netwoks. This pape addesses the above issues in two ways: (1) it poposes a mechanism fo P2P steaming specific to WiMAX netwoks that ties to maximize the sevice capacity of the video steaming system by exploiting the multicast sevices povided in IEEE and (2) it evaluates the scalability of P2P steaming sevices in WiMAX netwoks. The poposed steaming mechanism equies only mino changes to existing P2P potocols while maintaining P2P semantics and does not equie any changes to the IEEE standads. Using both analysis and simulations, we show that the poposed scheme can impove the scalability of the P2P steaming system by a magnitude at least as lage as the aveage numbe of pees seved by an Access Sevice Netwok Gateway (ASN-GW). The est of the pape is oganized as follows. In Section II we pesent an oveview the achitectue of popula P2P steaming systems. Section III pesents the poposed mechanism fo P2P steaming in WiMAX netwoks while Section IV pesents the scaling model. Finally, Section V evaluates the pefomance of the poposed system using simulation and Section VI pesents the concluding emaks. II. OVERVIEW OF P2P STREAMING SYSTEMS Existing schemes fo the delivey of steaming multimedia o IPTV content include IP multicasting [5], application level infastuctue ovelays [6], pee-to-pee multicast tees [7] and mesh-pull pee-to-pee steaming [1], [8]. Among these, the mesh-pull based steaming systems such as PPLive, PPSteam and CoolSteaming ae among the most popula. While these systems ae popietay, they follow the basic achitectue of geneic mesh-pull P2P steaming systems shown in Figue 1. A typical mesh-pull P2P steaming system consists of a tacke seve and individual pees that coopeatively distibute the media content among themselves. The media content is initially available at the channel steaming seve which beaks the content into chunks that fom the unit of infomation exchange among the pees. Each pee consists of a steaming engine and a media playe. The steaming engine at each pee downloads media chunks fom othe pees and the channel steaming seves and exchanges these chunks with othe pees. The chunks eceived at a pee ae eassembled to fom the oiginal content and played back by the media playe. When a pee desies to join the netwok and download media, it fist contacts the tacke seve to obtain a list of the media available in the P2P netwok and obtains an initial list of pees that ae cuently watching the same media o channel as the pee wishes to download. The pee then contacts the pees in the list to obtain additional lists of pees watching the same media. As the pee stats to download and view the media, it maintains a buffe with few minutes woth of chunks. These chunks may include those that have aleady been viewed as well as those that ae waiting to be played.

2 Pimegy Media Playe Tacke Seve Steaming Engine Chunk Delivey Channel Steaming Seve Registation Pee discovey Repoting Chunk Request Steaming Engine Steaming Engine Media Playe Media Playe Fig. 1. Achitectue of mesh-pull P2P steaming systems. Fig. 2. Achitectue of P2P steaming in WiMAX netwoks. Each pee maintains a buffe map that indicates which chunks that it cuently has buffeed fo shaing with othes. Pees exchange buffe maps with othe pees in thei pee list and can equest one o moe chunks fom them. Chunks may also be downloaded fom the oiginal channel steaming seve in paallel with the downloads fom othe pees. While TCP is typically used fo tansfeing the chunks, some mesh-pull P2P systems use UDP as the tanspot potocol in ode to ensue timely delivey. III. PROPOSED ARCHITECTURE Conside a scenaio whee a numbe of SSs in a WiMAX netwok ae inteested in joining a P2P steaming session. When thee ae multiple SSs associated with a single BS that wish to view the same channel o content, the BS has to send the same media chunks to all the pees, sepaately. Thus an intuitive method fo educing the load on the BS and allow the P2P netwok to scale would be to develop a mechanism that can exploit the inheent boadcast natue of the tansmissions fom the BS to avoid edundant tansmissions not only in the last hop (i.e. fom the BS to the SSs), but also inside the coe netwok o the Intenet. Howeve, these need to be done without beaking the P2P semantics and without any majo changes to the undelying P2P potocol. Additionally, the desied solution should be lightweight, scalable and should be implemented without any changes to the WiMAX entities. This section highlights the challenges and the poposed solution fo a scalable P2P steaming system fo WiMAX netwoks. A. Oveview Conside Figue 2 which shows the basic achitectue of a P2P steaming system in WiMAX netwoks. If any of the SSs wants to eceive the P2P steam, it fist contacts the tacke in the same way as any othe P2P node. Howeve, the goal of ou poposed potocol is that if now anothe SS wants to eceive the same steam, it should be able do so without any additional bandwidth equiement. To solve this poblem, we popose that the ASN-GW be the poxy fo a multicast session associated with its SSs that ae involved in the P2P steaming of a paticula channel. Thus, afte one SS stats eceiving the steam, adding anothe SS to the same steam would equie only adding the next SS to the multicast session. Howeve, to do so, the SS should be able to identify and join the taget multicast session. A BS in WiMAX netwoks cannot distinguish an Laye 3 (L3) multicast goup. Consequently when an AS-GW eceives a multicast packet, it has to make a copy of the packet fo each of the SSs in the multicast goup, and delives the copies of the same packets to the BS. To eliminate this edundancy, we use a technique simila to that in [9] whee the BS needs to send the multicast IP addess along with the Multicast Polling Assignment Request (MCA- REQ) messages, so that the SS can identify the L3 multicast goup of the MCA-REQ message and join the coect goup. In the poposed scheme, in addition to the usual attibutes about the pees, the tacke includes two additional fields fo each pee. The fist field consists of one bit to indicate whethe the pee is in a WiMAX netwok o not. Fo pees that ae WiMAX SSs, the second field then stoes the multicast IP addess associated with the SS in its ASN-GW. To populate these enties, pees povide the necessay infomation eithe duing egistation, o late on acquiing a multicast IP addess. When the tacke esponds to new pees with the initial list of pees, it pefeentially lists existing pees that ae WiMAX SSs. This inceases the chances that the new WiMAX pee will be able to find othe pees that ae SSs in its own ASN- GW, if any. Afte eceiving the addesses of the pees and the multicast IP addesses of WiMAX pees, the new pee now listens to the peiodic MCA-REQ messages sent by its BS to check if any of the ongoing multicast sessions matches the ones listed by the tacke. If thee is a match, the pee joins this multicast session to eceive the multimedia steam. We now descibe the poposed mechanism in detail by consideing vaious scenaios of opeation. B. Case 1: No Existing WiMAX Pees in Same ASN-GW We fist conside the case when thee ae no existing WiMAX pees in the ASN-GW of the new pee (SS) that wishes to join the steaming session. In this scenaio, as shown in Figue 3, a new pee stats by contacting the tacke fo a list of available pees, with a pefeence fo pees in WiMAX netwoks. The tacke eplies with a list of available pees with pefeence to pees in WiMAX netwoks and thei multicast IP addesses. On eceiving this infomation, the pee then compaes the listed multicast IP addesses, if any, with the multicast IP addesses in the peiodic MCA-REQ messages sent by its BS. In this case, thee will not be any matches. To

3 SS Tacke BS ASN GW Pee/Seve Registation/Pee discoey (WiMAX node pefeence) No WiMAX pees/wimax pees in diffeent ASN GW IGMP join with the IP addess of seve/pee IGMP join Video steaming packet MCA REQ MCA RSP Peiodic MCA REQ message containing multicast IP Goup table check Fig. 3. Potocol opeation in the absence of pees in the same ASN-GW. SS Tacke BS Registation/Pee discoey (WiMAX node pefeence) SS Tacke BS ASN GW Registation/Pee discoey (WiMAX node pefeence) WiMAX pee(s) + multicast IP WiMAX pee(s) + multicast IP Peiodic MCA REQ message containing multicast IP MCA RSP Peiodic MCA REQ message containing multicast IP IGMP join with multicast IP eceived duing egistation MCA REQ MCA RSP Fig. 4. Potocol opeation in the pesence of pees in the same BS and ASN-GW. check if any of the multicast sessions in the eceived list exist in anothe BS seved by its ASN-GW (see case 3 below), the pee then sends IGMP join equests to its ASN-GW fo these multicast IP addesses. The ASN-GW checks its goup table and in the cuent case does not find any match, and dops these equests. Thus the pee concludes that thee thee is no active multicast session fo the equested P2P media steam within its ASN-GW. Thus the new pee initiates a new P2P session with the seve o one of the pees outside its ASN-GW by sending it an IGMP join message. Simila messages may be sent to multiple pees. Moeove, the new pee will equest the seve and the othe pees to send the media steam to its destination multicast addess instead of a unicast addess. Once the seve o the pees join the multicast session, all steaming packets to the new pee ae sent ove the multicast session. At the last hop, the steaming packets ae sent to the pee SSs using MCA-REQ and MCA-RSP exchanges. Finally, the new pee updates the tacke with the multicast IP addess of the sessions that it has initiated. C. Case 2: Existing WiMAX Pee in Same BS and ASN-GW The second scenaio deals with the case when a pee exists in the same BS and ASN-GW as the SS which wants to join the P2P steam. As in the pevious case, when the new pee contacts the tacke fo P2P nodes, it will notify the tacke that it is a WiMAX node, as shown in Figue 4. Fig. 5. Potocol opeation in the pesence of pees in the same ASN-GW but diffeent BS. In tun the tacke will povide the new pee with a list of pees in WiMAX netwoks and othe infomation such as the associated multicast IP addesses. The pee then listens to the MCA-REQ messaged boadcast by its BS and compaes the multicast IP addesses in the list with those in the MCA-REQ messages. In this case thee is a match and the pee then joins the multicast session. Subsequently, it can listen on to the steaming multimedia packets that ae boadcast by the BS. D. Case 3: Existing WiMAX Pee in Same ASN-GW but Anothe BS The thid scenaio deals with the case when no pee exists in the same BS as the new pee but thee exists a pee in the egion of a BS being seved by the same ASN-GW as the BS of the joining SS. In this scenaio, as shown in Figue 5, the new pee will pefom pee discovey as in the pevious two cases. As usual, the tacke eplies with a list of existing pees, with a pefeence to pees in WiMAX netwoks. Howeve, when the SS compaes the multicast IP addesses obtained fom the tacke with the multicast IP addesses eceived in the peiodic MCA-REQ messages fom its BS, the compaison fails. Thus the pee SS sends IGMP join messages to the ASN-GW with the same multicast IP addesses as it eceived fom the tacke. The ASN-GW checks it s goup table and finds out that a multicast session with one of the multicast IP addesses is aleady in pogess and thus adds the new BS

4 into the multicast goup. The join messages fo IP addesses not in its goup table ae dopped. Next time when the BS eceives the multicast packet fom the ASN-GW, it will send the MCA-REQ message with multicast IP addess of the P2P steam. Thus, the new pee accepts the MCA-REQ message by sending an MCA-RSP message and stats eceiving the multimedia steam. E. Effect on the P2P Steaming Potocol The poposed potocol can scale a P2P multimedia steam to a lage numbe of WiMAX uses with vey mino changes to the existing P2P potocols. Fistly, each pee adds a bit in the egistation message it sends to the tacke to indicate that it is in a WiMAX netwok. Secondly, the tacke now needs to save the multicast IP as well as the unicast IP addess of the pees in the case of nodes in WiMAX netwoks. The thid change that is equied is that if a non-wimax P2P node eceives an IGMP join message, it should stat sending the chunks to a multicast IP addess athe than to an unicast IP addess. The upload potion of the P2P potocols emains the same, i.e. if a non-wimax node equests a chunk fom a WiMAX node, the pocedue followed will be simila to existing P2P potocols. IV. SCALING BEHAVIOR OF THE PROPOSED PROTOCOL In a steaming session, the usability of any chunk aiving at a pee depends on the time that has elapsed since the chunk was fist geneated by the steaming seve (souce). Thus the numbe of pees that may be suppoted in a P2P steaming session depends on the delay bound as well as the ovelay P2P topology. In this section we evaluate a bound on the numbe of pees that may be suppoted by the poposed P2P system and compae it with that of a native P2P system. We stat with a chaacteization of an optimal P2P steaming session. The optimal session is defined as one that achieves the lagest numbe of pees eceiving data at a given ate within a maximum toleated delay, without consideing fainess among pees. Now, the delay incued by a chunk is a sum of the queueing delays and the popagation delays. Queueing delays ae incued when chunks ae enqueued at a pee waiting to be played o to be elayed to othe pees. It is obvious that thee is no queueing delay in an optimal session. This is because if all pees eceive data at ate, then buffeing is not equied and a pee may immediately play a block it eceives. Consequently, we need to conside only popagation delays. Let d i be the popagation delay fom the souce to pee i, measued in tems of the numbe of P2P ovelay hops. A pee is consideed seved if the upload capacity of the souce and all the existing seved pees have the capacity to seve it at ate, while ensuing that the downloads of none of the existing pees is disupted. We conside a netwok with N pees and without loss of geneality we assume that the N pees ae seved in the ode 1,2,,N. Then the popagation delay fo pee i is k+1 (i.e. d i = k + 1) if k is the smallest intege fo which i 1 + u j I(d j k) i (1) j=1 whee and u j ae the upload bandwidths of the souce and pee j espectively, and I(x) is an indicato function that takes the value of 1 if x is tue and 0 othewise. The optimal steaming session ties to maximize the numbe of pees seved while ensuing that the maximum delay at any pee is not moe than a theshold. Intuitively, placing pees with lage upload capacities close to the souce will incease the numbe of pees that can successfully join the P2P steaming session. This esult can be fomalized as: Claim 1: Conside a P2P steaming session with N pees whee the seve s bandwidth is and the othe pees have a bandwidth dawn fom a distibution F(u). By placing the pees with highe upload capacities close to the souce, the numbe of pees suppoted with delays lowe than a theshold is no less than that of an optimal session. Poof: Assume that thee exists an optimal session Π in which thee exists at least one set of pees (a,a v ) such that the upload capacity u < u v but d > d v. The numbe of pees suppoted by the optimal P2P session is then Ω(Π) = = I(d i < ) 1 I(d i < ) + I(d < ) + +I(d v < ) + i=+1 I(d i < ) I(d i < ) (2) Now conside an altenate topology Π which is identical to Π in all espects except that the positions of a and a v ae swapped. Let the distance fo pee i in this topology be d i. The numbe of pees suppoted by Π is then Ω(Π ) = 1 I(d i < ) + I(d < ) + +I(d v < ) + i=+1 I(d i < ) I(d i < ) (3) Since a pee with highe upload capacity has been placed in position, the new distance d = d. Also, the pees in positions 1 to 1, +1 to, and v+1 to N ae not changed. Thus we have d i = d i fo 1 i 1. The diffeence in the numbe of pees suppoted in the two sessions is then Ω(Π) Ω(Π ) = I(d i < ) + I(d v < ) + I(d i < ) i=+1 i=+1 I(d i< ) I(d v < ) I(d i< ) (4) Now d i = k + 1 if k is the smallest value fo which + i 1 j=1 u ji(d j k) i, i.e. d i = 1 + ag min k i 1 u j I(d j k) + i (5) j=1

5 Since u > u and u j > u j, j with j v, we have j u i > j u i and d i d i fo < j < v. This in tun implies I(d j < ) I(d j < ) (6) fo < j < s. Now since the nodes in positions and v of Π ae swapped in Π, we have u + u v = u + u v. This implies j u i = j u i fo j > v. As befoe, we again have I(d j < ) I(d j < ) (7) fo j > s. Fom Eqns. (6) and (7) we then have Ω(Π ) Ω(Π) 0 (8) This shows that the session unde Π is no wose than the optimal session. Fom the esult above, we can also conclude that in an optimal session, the seve neve uploads media to pees that ae moe than one hop away. Next we conside a means to obtain a lowe bound on the numbe of suppoted pees by any P2P steaming system. Fo this, we conside the case whee all pees have the same, constant upload capacity. We show that such a system seves as a lowe bound on the numbe of pees that can be suppoted by any P2P steaming system. Claim 2: Conside an abitay upload capacity distibution F a (u) that has the same mean as a constant upload capacity distibution F c (u) = δ(). As the netwok size inceases, the numbe of pees that can be suppoted with delays less than when the pees have upload capacities dawn fom F a (u) is no less than the coesponding numbe of pees suppoted when the upload capacities ae constant. Poof: Fom Claim 1, to maximize the numbe of suppoted pees, we place the pees with the highe upload capacities close to the souce. Also, the pee upload capacities, in deceasing ode, in the abitay distibution ae denoted by a 1,a 2,,a N and in the constant capacity case by b 1,b 2,,b N with b i = b j, i,j. Since the means of the two distibutions is the same, we have lim N 1 N a i = 1 N b i w.p. 1 (9) whee w.p. stands fo with pobability. The pobability that thee exists at least one pee (i.e. the pee with the highest upload capacity) with upload capacity geate than is P[a 1 > ] = 1 As N, we have P[a 1 > ] = N P[a i ] = 1 [P[a ]] N lim 1 [P[a N ]]N = 1 (10) Also since fom Eqn. (9) we have N a i = N b i, Eqn. (10) implies that j a i > j b i, fo 1 j < N, and thus d aj d bj. This in tun implies I(d ai < ) I(d bi < ) (11) fo 1 j < N and hence I(d ai < ) I(d bi < ) (12) which concludes the poof. Next we poceed to obtain the numbe of pees that may be suppoted fo a given delay bound in the native as well as the poposed P2P steaming system using the methodology in [10]. Hee we assume that all pees ae in WiMAX netwoks. Also, the numbe of pees unde each ASN-GW is denoted by M. Note that fom Claims 1 and 2, to compae the wost case pefomance of the two systems, it suffices to compae thei pefomance unde the case of constant upload capacity distibution. We conside the native P2P system fist and assume that / and / ae integes. Based on the atio of and, we have two cases and the following esults summaize the pefomance in each case. Claim 3: The numbe of pees suppoted in the native P2P steaming system fo a delay constaint when is N max = ( ) 1 1 (13) Poof: The steaming seve seves / pees and each of these in tun can seve / pees. With a delay constaint of, we can have 1 such hops. The total numbe of pees suppoted is then N max = 1 i=0 ( ) i = ( ) 1 1 (14) which concludes the poof. When <, the addition of a pee intoduces less upload bandwidth in the netwok than that used by the pee. Thus if is lage, thee will not be sufficient bandwidth to suppot any moe pees afte a numbe of hops, h. In paticula, h is given by the smallest i such that cs ( )i 1 <, i.e. i > log ( ) ( 2 ) + 1 (15) since log α (x) > log α (y) if α < 1 and x < y. The numbe of pees suppoted in this case is given by the following esult. Claim 4: The numbe of pees suppoted in the native P2P steaming system fo a delay constaint when < is N max < ( 3 2 ) cs 1 = cs ( ) 1 1 fo h = log ( ) ( 2 ) + 1 < othewise (16) Poof: In the fist case, the bandwidth is exhausted befoe the delay bound is met. The numbe of suppoted pees is then N max = & log ( ) i=0 2 cs ( ) i < ( 3 2 ) cs 1 (17) In the case whee the delay bound is eached befoe the available bandwidth is exhausted, we can use Eqn. (14) to deive the numbe of suppoted pees. This completes the poof.

6 10 3 native poposed native poposed Numbe of Pees Suppoted Numbe of Pees Suppoted Fig. 6. Scalability of the poposed system when >. Fig. 7. Scalability of the poposed system when <. Fo the poposed P2P steaming system, we can use the same esults as above by intepeting N max in the equations above to epesent ASN-GWs athe than pees. Then since each ASN-GW can suppot M pees while using the same download capacity equied by one pee in the native system, the poposed system is at least M times as scalable. Futhe impovements may occu when we conside the fact that each of the M pees in the ASN-GW may now contibute upload bandwidth. V. SIMULATION RESULTS In this section we use simulations to demonstate and quantify the impovement in scalability of the poposed P2P steaming system fo WiMAX netwoks. The simulations wee conducted using a custom built simulato. In the scenaio consideed, the netwok had a total of 100 ASN-GWs with thee BSs in each ASN-GW. Also, each BS had five SSs that ty to paticipate in the P2P steaming session. The equied download ate at each pee is = 340 Kbps and the upload capacity at each pee depends on its distance fom its BS and the coesponding highest modulation and coding scheme that can be suppoted. The possible modulation and coding schemes wee BPSK(1/2), QPSK(1/2), QPSK(3/4), 16 QAM(1/2), 16 QAM(3/4), 64 QAM(2/3) and 64 QAM(3/4). Fo each simulation setting, the esults pesented ae the aveage ove 10 uns of the simulato. In the fist scenaio, the nodes ae andomly placed such that they ae moe likely to be close to the BS and the aveage upload capacity of the pees was Kbps, i.e. >. Fo this case, Figue 6 compaes the numbe of pees suppoted by the poposed P2P steaming system with that of the oiginal, native system. We see that the impovement in the poposed system povides is of the ode of the numbe of pees in an ASN-GW, as shown in the pevious section. The degee of impovement inceases as the delay bound inceases. Figue 7 shows the coesponding esults fo the case whee the aveage upload capacity of the pees was 323 Kbps, i.e. <. In this case, the numbe of pees suppoted satuates much faste in the native P2P steaming system. Also, the impovement in the poposed system inceases as the delay bound inceases. VI. CONCLUSION In this pape we poposed a mechanism fo impoving the scalability of P2P steaming potocols in WiMAX netwoks. The poposed potocol is based on exploiting the multicast featue of WiMAX netwoks to avoid edundant, multiple tansmissions of the same packet fom the BS to multiple pee SSs. A potocol fo facilitating the multicast tansmissions is poposed and the scalability of the poposed system is evaluated. Ou esults show that the poposed system can significantly impove the scalability of P2P steaming systems when the pees ae pat of a WiMAX netwok. REFERENCES [1] X. Zhang, J. Liu, B. Li and T.-S. Yum, DONet/CoolSteaming: A Data-diven Ovelay Netwok fo Live Media Steaming, Poc. IEEE INFOCOM, Mach [2] M. Zhang, Q. Zhang, L. Sun and S. Yang, Undestanding the powe of pull-based steaming potocol: Can we do bette?, IEEE Jou. on Sel. Aeas in Comm., vol. 25, no. 9, pp , Decembe [3] F. Pianese, D. Peino, J. Kelle and E. Biesack, Pulse: an adaptive, incentive-based, unstuctued p2p live steaming system, IEEE Tansaction on Multimedia, vol. 9, no. 8, pp , Decembe [4] X. Hei, C. Liang, J. Liang, Y. Liu and K. Ross, A Measuement Study of a Lage-Scale P2P IPTV System, IEEE Tansactions on Multimedia, vol. 9, no. 8, pp , Decembe [5] S. Deeing and D. Cheiton, Multicast outing in datagam intenetwoks and extended LANs, ACM Tansactions on Compute Systems, vol. 8, no. 2, pp , May [6] L. Kontothanassis et. al., A Tanspot Laye fo Live Steaming in a Content Delivey Netwok, Poceedings of the IEEE, vol. 92, no. 9, pp , [7] Y. Chu, S. Rao and H. Zhang, A Case Fo End System Multicast, Poc. ACM SIGMETRICS, pp. 1-12, Santa Claa, CA, June [8] X. Hei, Y. Liu and K. Ross, IPTV ove P2P Steaming Netwoks: the Mesh-pull Appoach, IEEE Communications Magazine, vol. 46, no. 2, pp , Feb [9] K. Lee, S. Rhee and H. Youn, A MAC Laye Multicasting Appoach fo WiMAX Access Netwoks, Poc. IEEE PeCom, Mach [10] T. Small, B. Liang and B. Li Fundamental Scaling Laws of Pee-to-Pee Live Multimedia Steaming, Poc. ACM Multimedia, Octobe 2006.

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

IBM Research Smarter Transportation Analytics

IBM Research Smarter Transportation Analytics IBM Reseach Smate Tanspotation Analytics Laua Wynte PhD, Senio Reseach Scientist, IBM Watson Reseach Cente lwynte@us.ibm.com INSTRUMENTED We now have the ability to measue, sense and see the exact condition

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it.

FXA 2008. Candidates should be able to : Describe how a mass creates a gravitational field in the space around it. Candidates should be able to : Descibe how a mass ceates a gavitational field in the space aound it. Define gavitational field stength as foce pe unit mass. Define and use the peiod of an object descibing

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Define What Type of Trader Are you?

Define What Type of Trader Are you? Define What Type of Tade Ae you? Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 1 Disclaime and Risk Wanings Tading any financial maket involves isk. The content of this

More information

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360!

Figure 2. So it is very likely that the Babylonians attributed 60 units to each side of the hexagon. Its resulting perimeter would then be 360! 1. What ae angles? Last time, we looked at how the Geeks intepeted measument of lengths. Howeve, as fascinated as they wee with geomety, thee was a shape that was much moe enticing than any othe : the

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

The Role of Gravity in Orbital Motion

The Role of Gravity in Orbital Motion ! The Role of Gavity in Obital Motion Pat of: Inquiy Science with Datmouth Developed by: Chistophe Caoll, Depatment of Physics & Astonomy, Datmouth College Adapted fom: How Gavity Affects Obits (Ohio State

More information

Exam #1 Review Answers

Exam #1 Review Answers xam #1 Review Answes 1. Given the following pobability distibution, calculate the expected etun, vaiance and standad deviation fo Secuity J. State Pob (R) 1 0.2 10% 2 0.6 15 3 0.2 20 xpected etun = 0.2*10%

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

Carter-Penrose diagrams and black holes

Carter-Penrose diagrams and black holes Cate-Penose diagams and black holes Ewa Felinska The basic intoduction to the method of building Penose diagams has been pesented, stating with obtaining a Penose diagam fom Minkowski space. An example

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Do Vibrations Make Sound?

Do Vibrations Make Sound? Do Vibations Make Sound? Gade 1: Sound Pobe Aligned with National Standads oveview Students will lean about sound and vibations. This activity will allow students to see and hea how vibations do in fact

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Faithful Comptroller s Handbook

Faithful Comptroller s Handbook Faithful Comptolle s Handbook Faithful Comptolle s Handbook Selection of Faithful Comptolle The Laws govening the Fouth Degee povide that the faithful comptolle be elected, along with the othe offices

More information

QNA-MC: A Performance Evaluation Tool for Communication Networks with Multicast Data Streams

QNA-MC: A Performance Evaluation Tool for Communication Networks with Multicast Data Streams QNA-MC: A Pefomance Evaluation Tool fo Communication Netwoks with Multicast Data Steams Gaby Schneide 1, Mako Schuba 1, Boudewijn R. Havekot 1 Infomatik 4 (Communication and Distibuted Systems), RWTH Aachen,

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Manual ultrasonic inspection of thin metal welds

Manual ultrasonic inspection of thin metal welds Manual ultasonic inspection of thin metal welds Capucine Capentie and John Rudlin TWI Cambidge CB1 6AL, UK Telephone 01223 899000 Fax 01223 890689 E-mail capucine.capentie@twi.co.uk Abstact BS EN ISO 17640

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Nontrivial lower bounds for the least common multiple of some finite sequences of integers

Nontrivial lower bounds for the least common multiple of some finite sequences of integers J. Numbe Theoy, 15 (007), p. 393-411. Nontivial lowe bounds fo the least common multiple of some finite sequences of integes Bai FARHI bai.fahi@gmail.com Abstact We pesent hee a method which allows to

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

Experiment 6: Centripetal Force

Experiment 6: Centripetal Force Name Section Date Intoduction Expeiment 6: Centipetal oce This expeiment is concened with the foce necessay to keep an object moving in a constant cicula path. Accoding to Newton s fist law of motion thee

More information

Unveiling the MPLS Structure on Internet Topology

Unveiling the MPLS Structure on Internet Topology Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

DNS: Domain Name System

DNS: Domain Name System DNS: Domain Name System People: many identifies: m SSN, name, Passpot # Intenet hosts, outes: m IP addess (32 bit) - used fo addessing datagams (in IPv4) m name, e.g., gaia.cs.umass.edu - used by humans

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

NUCLEAR MAGNETIC RESONANCE

NUCLEAR MAGNETIC RESONANCE 19 Jul 04 NMR.1 NUCLEAR MAGNETIC RESONANCE In this expeiment the phenomenon of nuclea magnetic esonance will be used as the basis fo a method to accuately measue magnetic field stength, and to study magnetic

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques Loyalty Rewads and Gift Cad Pogams: Basic Actuaial Estimation Techniques Tim A. Gault, ACAS, MAAA, Len Llaguno, FCAS, MAAA and Matin Ménad, FCAS, MAAA Abstact In this pape we establish an actuaial famewok

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Controlling the Money Supply: Bond Purchases in the Open Market

Controlling the Money Supply: Bond Purchases in the Open Market Money Supply By the Bank of Canada and Inteest Rate Detemination Open Opeations and Monetay Tansmission Mechanism The Cental Bank conducts monetay policy Bank of Canada is Canada's cental bank supevises

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

The Impact of Radio Propagation Models on Ad Hoc Networks Performances

The Impact of Radio Propagation Models on Ad Hoc Networks Performances Jounal of Compute Science 8 (5): 752-760, 2012 ISSN 1549-3636 2012 Science Publications The Impact of Radio Popagation Models on Ad Hoc Netwoks Pefomances 1 Rhattoy, A. and 2 A. Zatni 1 Depatment of Compute,

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information