Optmal Revocatons n Ephemeral Networks

Size: px
Start display at page:

Download "Optmal Revocatons n Ephemeral Networks"

Transcription

1 Optmal Revocatons n Ephemeral Networks: A Game-Theoretc Framework Igor Blogrevc, Mohammad Hossen Manshae, Maxm Raya and Jean-Perre Hubaux Laboratory for computer Communcatons and Applcatons (LCA1), EPFL, Lausanne, Swtzerland Emal: {gor.blogrevc, hossen.manshae, maxm.raya, jean-perre.hubaux}@epfl.ch Abstract Revocaton of publc-key certfcates s an mportant securty prmtve. In ths paper, we desgn a fully dstrbuted local certfcate revocaton scheme for ephemeral networks - a class of extremely volatle wreless networks wth short-duraton and short-range communcatons - based on a game-theoretc approach. Frst, by provdng ncentves, we can guarantee the successful revocaton of the malcous nodes even f they collude. Second, thanks to the records of past behavor, we dynamcally adapt the parameters to nodes reputatons and establsh the optmal Nash equlbrum (NE) on-the-fly, mnmzng the socal cost of the revocaton. Thrd, based on the analytcal results, we defne a unque optmal NE selecton protocol and evaluate ts performance through smulatons. We show that our scheme s effectve n quckly and effcently removng malcous devces from the network. Index Terms Game Theory, Wreless Securty, Ephemeral Networks, Socal Optmum I. INTRODUCTION The emergng avalablty of wreless devces able to communcate drectly wth other peers s openng new ways for people to nteract and exchange nformaton ([1], [2], [3]). The absence of a centrally-managed nfrastructure, however, makes t harder to cope wth msbehavor. In the lterature, a consderable effort s beng devoted to the analyss of securty mechansms performed by self-nterested agents [4]. In partcular, the revocaton of compromsed publc-key certfcates s a very mportant prmtve for envronments where authentcaton s requred. In ephemeral networks, the short-lved and heterogeneous contacts among nodes (potentally unbeknownst to each other) make t mperatve to address the revocaton ssue n a dstrbuted and effcent way. One step n ths drecton has been taken by Raya et al. [5] through ther game-theoretc local certfcate revocaton protocol RevoGame. Ther model, however, has some lmtatons. Frst, t s often dffcult to obtan correct estmates of crucal parameters very frequently and thus the outcome of the revocaton could be unpredctable. Second, the dynamc knd of games used by ther model assumes that each node can observe the actons of the others before takng ts own decson, whch s not always be feasble n ephemeral envronments. For example, the duraton of the related publc-key operatons, such as sgnature verfcaton and generaton, mght take an excessve amount of tme. In ths paper, we desgn a substantally mproved and extended local certfcate revocaton framework for ephemeral networks. Wth respect to [5], our contrbuton s fourfold. Frst of all, we consder revocatons n whch nodes take actons smultaneously,.e. they do not know others decsons before takng ther own, as t mght take too much tme n practce and the nodes mght have already lost contact. Second, we provde ncentves that stmulate partcpaton and guarantee a successful revocaton of malcous nodes even when they collude or when the parameter estmatons are dffcult. Thrd, by consderng the past behavor of devces as ther reputaton, we are able to allow for personalzed and dynamc costs that depend on the behavor of each node n past games. Fourth, as each devce could potentally have a dfferent reputaton, we desgn a fully dstrbuted on-the-fly NE selecton protocol that establshes, f more than one NE exst, the best course of acton for each player wth the least socal cost. Smulaton results fnally show that our analytcal framework s effectve n removng the msbehavng nodes certfcates through the socally optmal NE of the revocaton game. The paper s organzed as follows. After dscussng the related work n Secton II, we present our system model n Secton III. We descrbe the revocaton process n Secton IV and we perform the game theoretc analyss n Secton V. We devote Secton VI to the desgn of the socally optmal Nash equlbrum selecton protocols and we evaluate ther performance through smulatons n Secton VII. We conclude the paper n Secton VIII. II. RELATED WORK L et al. [6] propose a key management model based on a web of trust, where nodes sgn each other s certfcates wthout any trusted thrd party. Revocaton s performed by a sngle node that broadcasts the revocaton request to all twohop neghbors, who then add the accused node s certfcate to ther blacklsts. However, the communcaton overhead related to blacklst exchange and the trust assumptons derved from ndrect chans of certfcates could lead to securty compromses when dealng wth nodes wthout prevous frsthand knowledge. A vrtual CA s envsaged by Luo et al. [7], where no sngle node s trusted to ssue certfcates on ts own, but any k trusted nodes together are allowed to ssue and revoke certfcates. Assumng a system-wde fxed value for k, new nodes wshng to enter the network are forced to mgrate n places where at least k already trusted devces are wllng to sgn the publc/prvate key par of the newcomer. Chnn et al. [8] propose a herarchcal trust model where a trusted thrd party (CA) s responsble for the generaton of

2 2 publc-key certfcates but revocaton s delegated to nodes. The authors suggest a method to deal wth msbehavng devces by mnmzng ther trust level among the neghbors based on the qualty of servce they provde but, at the same tme, they allow the trust to be reganed and therefore the certfcate renewal nterval can be extended. Smlarly, Arbot et al. [9] perform a game-theoretc securty analyss and compute a trust threshold value by takng nto account the reputatons of both the accused and accusng nodes. An accusaton made by a node wth a low reputaton,.e. a node that has many pendng accusatons on tself, has a lower weght than the accusaton by a node wth a hgher reputaton (wth fewer pendng accusatons). A revocaton s successful f the sum of weghted accusatons s greater than a threshold value, and the revoked certfcate s completely useless for further nteractons. Reputaton mechansms and ther applcatons n moble ad hoc networks have also been studed by Mchard et al. [10]. Ther CORE reputaton scheme naturally excludes nodes from the network, f they do not contrbute to ts functonng, by lowerng ther reputatons, whereas cooperatng nodes can operate and request more servces, as ther reputaton s ncreased for every servce ther provde to the communty. In [5], Raya et al. take a game-theoretc approach for certfcate revocatons n ephemeral networks by extendng the possblty of revocaton just by a sngle node s decson, n addton to the aggregate votng scheme. The nteractons among the well-behavng nodes are vsble to all of them as the game model s a dynamc complete nformaton game. As stated n Secton I, the estmaton of several game parameters, such as the number of detectors and the number of requred voters, coupled wth the sequental strategc behavor, are some of the lmtng factors addressed n ths work. A. Network III. SYSTEM MODEL We consder an ephemeral network wth short-duraton (1-10 sec), short-range ( m) contacts that can take place both n lcensed and unlcensed frequency bands. We only requre the wreless devces to be able to establsh drect communcaton among themselves. Furthermore, we assume that all devces are powerful enough to run publc-key cryptographc algorthms. Ths assumpton s based on the evdence that most of today s smartphones (and future cell phones [11]) have ntegrated publc-key certfcates for connectng to secure HTTPS servers on the Internet or for authentcatng themselves on protected enterprse IEEE WLAN networks. We consder that a trusted thrd party (or partes) exsts n such networks and that each moble node s pre-loaded wth publc-key certfcates ssued by a CA, that are used both for perodcally advertsng ther presence (by broadcastng a sgned beacon message) and for sgnng all sent messages. In order to allow for ntegrty and authentcty checks, we assume that only sgned messages wll be consdered. The unque certfcate seral number [12] serves as a unque ID that dstngushes each devce n a gven revocaton process. We also assume that each node has more than one certfcate n the ntal deployment phase, n order to allow for locaton prvacy protecton and to avod the possblty of beng tracked and dentfed over tme ([13], [14]). We assume that each node has a reserve contanng all vald certfcates, a counter whch measures the quantty of vald certfcates that can be used for revocatons, and a tamperresstant devce, such as a smart-card, where the revocaton protocols are executed. The counter and reserve can be updated and sgned ether by a CA or by the protocols but not by the devce tself. After the ntal deployment, we do not assume an always-on connecton wth the central authorty, but we do assume that nodes wll reconnect wth the CA sporadcally (from every few hours to every few days) through a drect connecton or a pre-deployed nfrastructure managed by the CA. Durng the successve connectons, the CA wll renew ther credentals by updatng the counter and/or reserve, after havng verfed ther past behavor n an approprate way. Nodes can thus obtan vald certfcates by ether (a) buyng them from the CA or (b) by revokng malcous nodes, as a reward for the useful servce provded to the communty. Note that when buyng certfcates, only the reserve s updated by the CA whereas by revokng malcous devces, both reserve and counter are updated by the same amount. By defnton, the level of the reserve cannot be lower than the counter and when the former reaches the latter (due to frequent pseudonym changes for nstance), a node would have to renew ts certfcates n order to contnue ensurng ts locaton prvacy. It s clear that the logstc costs assocated wth the certfcate management (by the CA) and frequent pseudonym changes (by the nodes) could make the lmted reserve of vald certfcates a crtcal resource. B. Threat Model The attacker could potentally be any wreless devce wth exactly the same characterstcs as the other bengn nodes. Examples of msbehavor nclude, for nstance, dssemnatng false nformaton n the network, sendng undesred advertsements or hjackng other nodes wth the ntent to subvert them to the attacker s advantage. We assume that multple attackers can also collude n order to revoke bengn nodes. IV. REVOCATION PROCESS The revocaton procedure begns when a node detects the presence of a msbehavng peer (node m) and decdes to accuse t. Note that for each accused node m, there s one revocaton process and each node can partcpate n at most one at any gven tme, even though there could be many processes runnng n parallel. For smplcty and wthout loss of generalty, n ths paper we consder one revocaton only. Moreover, we focus on the reacton [15] of a set of nodes once a malcous node has already been detected, rather than on the detecton mechansm tself. References on the latter aspect can be found n [16], [17].

3 3 Table I LIST OF SYMBOLS. Intator Partcpants Accused node tme Fgure 1. Revocaton process sequence of events: frst, the ntator broadcasts the accusaton and hs sgned counter and then partcpants and accused node broadcast ther own counters. The acton that each devce can take n a revocaton process s ether abstan, vote or commt self-sacrfce. By abstanng, the node does not take any actve 1 role but expects the other peers to eventually remove the accused node from the network. Votng aganst the ncrmnated node s decsve but a sngle vote s usually not suffcent for a successful revocaton. There should be at least n v votes n order to perform the revocaton. The determnaton of ths mportant parameter s performed n Secton V-B. Yet another possblty s obtaned by allowng a sngle node to entrely revoke the certfcate of the msbehavng node [18]. At the same tme, however, the node performng the revocaton has to sacrfce a consderable amount of ts own certfcates as well, n order to lmt abuses. We call ths powerful but expensve strategy the self-sacrfce. We devote Secton V-D to the fne tunng of the self-sacrfce cost functon. The sequence of events encountered n each revocaton process s shown n Fgure 1 and descrbed hereafter. We assume that there s a set of N = n + M nodes n communcaton range, where n s the number of bengn nodes and M s the number of estmated malcous ones. M could also represent the estmated power of the colludng attackers, and n ths case M/N could be set by the CA to a hgh value n case of a conservatve atttude and repeated colluson attacks by malcous nodes. For nstance, statstcs on nodes behavor can be used by the CA to set the M/N value accordng to the expected power of colludng attackers. In the set n of bengn nodes there s one devce, called ntator, that broadcasts 1) the revocaton request aganst an accused node m, 2) ts sgned counter, 3) the attack-nduced cost parameter c and 4) the number M of malcous nodes to all peers, called partcpants, that are n communcaton range wth both the ntator and the accused node. The partcpants respond to the request by broadcastng ther own sgned counters, such that all partes are aware of the respectve amounts of vald certfcates. When the accused node receves the revocaton request aganst t, a sgned message contanng ts own counter s generated by ts tamper-resstant module and broadcast as well. Once all 1 By actve we mean nodes that have ether voted or commtted self-sacrfce n the revocaton process. SYMBOL DEFINITION N Total number of nodes n comm. range (bengn + malcous) M Number of malcous nodes n comm. range b Beneft for votng B Beneft for self-sacrfcng c Cost of non revocaton of malcous node c s, Cost of self-sacrfcng for player f(m/n) Rsk of attack by colludng malcous nodes for self-sacrfcng e(m/n) Rsk of attack by colludng malcous nodes for votng k If successful revocaton k = 1, otherwse k = 0 m Subscrpt used for the malcous node n v - u v γ(s - ) Number of votes requred for the revocaton Counter of player s vald certfcates for revocatons Cost of votng Sum of counters of players (other than ) that vote the n bengn nodes have complete knowledge of each others counters and M, they do not need to communcate anymore and the off-lne dstrbuted revocaton process (descrbed n Secton VI) begns. Our protocols then defne the unque outcome and the ndvdual actons for all devces. In order to prevent any abuse of bengn nodes and encourage partcpaton n revocatons aganst malcous devces, we need to assgn costs and benefts for every acton performed by a partcpant n any revocaton procedure (Table I). We express these n number of certfcates because they are a vtal (requred to sgn messages) and lmted resource n our network. For nstance, we assume that for any partcpant, castng a vote has a cost of v + e(m/n), where v 0 s a fracton of the counter set by the CA and e(m/n) 0 s a functon that represents the rsk of a retalaton attack by colludng malcous peers aganst a node that chooses to cast a vote. Smlarly, a self-sacrfce costs c s, + f(m/n), where c s, 0 s the ndvdual cost for the self-sacrfce acton and f(m/n) 0 s a functon that models the rsk a retalaton attack by colludng malcous peers aganst a node that performs a self-sacrfce. The two colluson rsk functons are characterzed n Secton V-C. If the revocaton s successful, the CA provdes rewards for votng and commttng self-sacrfce, whch are b and B respectvely. The abstan strategy, on the contrary, does not have a cost or beneft because t does not contrbute the revocaton. If the revocaton s not successful, the benefts are not dstrbuted. Moreover, a faled attempt and the wasted effort of the communty s computed by addng the attacknduced cost value c for all partcpants, whch s estmated by the ntator and broadcast together wth the revocaton request at the begnnng of the process. After each revocaton procedure, a report - contanng all the unque IDs of nodes nvolved n the process together wth the assocated acton - s compled by all nodes and stored. At the next possble occason, each partcpatng node sends the report to the CA who then verfes, n a sutable way,

4 4 the past behavor of the accused node and decdes whether to permanently revoke the certfcate or not. In case the accusaton was unfunded, the CA can also punsh nodes that have dssemnated false accusatons. Fnally, dependng on the acton taken by each devce, the CA rewards the partcpants wth fresh certfcates and updates the reserves and counters, whch then enable the partcpants to contnue operatng n the network. Clearly, f a devce s seldom requred to partcpate n revocaton procedures, ts counter does not evolve as quckly as that of the frequent partcpants and thus the CA does not need to renew ts credentals due to revocatons. However, all nodes wll have to perodcally renew ther certfcates when the level of the reserve reaches the value of the counter, n order to prevent eavesdroppers from trackng ther locaton. Although the revocaton protocols are run n a tamperresstant devce and certfcates are updated by a CA, there could stll be several possble combnatons of actons by whch each revocaton procedure mght end. Moreover, as the costs for each node depend both on the ndvdual acton (performed by that node) and on the outcome of the revocaton tself (whether the accused node s revoked or not), a gametheoretc framework s well adapted to model and analyze such strategc stuatons. Furthermore, f more than one soluton exst, game theory provdes means for all partes to converge to the socally optmal one, whch maxmzes the aggregated benefts of the communty of nodes. Sectons V and VI are devoted to the applcaton of game theory to local revocatons. V. GAME-THEORETIC ANALYSIS In ths secton, we present our game-theoretc framework and the analytcal results. Frst, we consder revocaton games where payoffs depend on the current strateges and game outcome only. Afterwards, we extend the framework to nclude nodes past behavor n the computatons of payoffs, strateges and outcomes by consderng the counter as the ndcator of a node s reputaton. We defne a non-cooperatve statc revocaton game as G n = {P, S, U}, where P = {P } n =1 s the set of the n wreless players as descrbed n Secton III, S = {S } n =1 s the strategy set and U = {u } n =1 the payoff set. Moreover, we assume the game to be of complete nformaton,.e. every node has complete knowledge about the payoff functons and the counters of all partcpants. Ths assumpton s based on the fact that the game parameters are ether defned n advance on a system-level scale or they are completely defned by the nformaton exchanged durng the revocaton process tself. More often than not, securty decsons are made on mplct assumptons about the strength of the attacker, but here we need to commensurate the response of bengn players to quanttatve values of the current costs and benefts of the game. Therefore, we assume such values to be known to all partcpants before the actual game takes place. a) Strateges: The strateges avalable for each player are ether abstan (A), vote (V), or commt self-sacrfce (S). Each strategy has an assocated beneft and cost that depends Table II PAYOFF u OF PLAYER AFTER THE END OF A REVOCATION GAME, GIVEN THE STRATEGY s. IF THE REVOCATION WAS SUCCESSFUL, WE HAVE k = 1 AND OTHERWISE k = 0. Abstan Self-sacrfce Vote Cost (1-k) c c s, + f(m/n) v + e(m/n) + (1-k) c Beneft 0 B k b Payoff u - (1-k) c B - c s, f(m/n) k b v e(m/n) - (1-k) c on the successful or unsuccessful revocaton of the certfcate as well. b) Payoffs: The payoff functon u of player s defned as the dfference between benefts and costs, expressed n publc-key certfcates and s shown n Table II. The quantty of vald certfcates, avalable for revocaton purposes, s defned as u for each player, whereas the accused node m has u m. Accordng to Secton III, we refer to t as the counter, whch s updated after each game as the sum of the prevous value of the counter and the current payoff,.e. u u + u, such that t s accumulated over tme. The evoluton of u depends therefore on the way nodes partcpate n revocaton games and on ther past behavor. c) Game Solutons: A wdely adopted soluton concept n game theory s the Nash equlbrum (NE), a strategy set s = {s }n =1 from whch no node has ncentve to unlaterally devate, gven that all other players conform to t. In ths paper, we focus on Nash equlbra as the ratonal outcome for any revocaton game G n. Although computng any NE s PPAD hard [19], the fne tunng performed n Secton V-D allows nodes to substantally reduce the number of such computatons by consderng only effcent strategy profles that result n a successful revocaton. A. Revocatons wth Payoffs Let G f n be an n-player revocaton game, where beneft and cost values of Table II are fxed for all players (c s, = c s ). Intally, we assume that the number of votes requred to revoke a certfcate s a fxed value n v. We now establsh the solutons of G f n by means of the NE strateges whch defne, for each player, the strategy to adopt n order to acheve the desred outcome. The proofs of the lemmas can be found n Appendx. Lemma 1: In G f n, for (B = c s ) (b > v), the n- player statc game G n has a unque pure strategy NE profle s = (V,..., V ),.e. all players vote and the accused node s revoked. As the payoff for votng s strctly greater than for selfsacrfcng, all players are better off votng and revokng the certfcate. Lemma 2: In G f n, for (B = c s ) (b < v), f f(m/n) < c then the NE are all strategy profles s that have exactly one self-sacrfce and n-1 abstentons. If f(m/n) c, then the strategy profle all-abstan s a NE. In other words, f the rsk of retalaton by colludng malcous nodes s hgher than the attack nduced cost, then

5 5 the bengn nodes would prefer not to revoke the msbehavng devce. Lemma 3: In G f n, for [(B < c s ) (b < v)] [B c s f(m/n) > b v e(m/n)], f f(m/n) < B c s +c then the NE are all strategy profles that have exactly one self-sacrfce and n 1 abstentons. If f(m/n) > B c s + c then the strategy profle all-abstan s a NE. Even though both payoffs are negatve, f self-sacrfcng s stll better than votng and the retalaton rsk s contaned, then the revocaton s performed by only one player, because t s n the best nterest of all other players to avod wastng certfcates and thus to abstan. Lemma 4: In G f n, for [(B < c s ) (b < v)] [b v e(m/n) > B c s f(m/n)], f e(m/n) < b v + c then the NE are all strategy profles that have (a) one selfsacrfce wth n 1 abstentons and (b) n v votes wth n n v abstentons. If e(m/n) b v + c then (b) s not anymore a NE. The accused node s revoked by any NE. If the rsk of retalaton for a votng node s contaned, the revocaton could also be performed by the strct mnmum number of voters n v, wthout any self-sacrfce. If the rsk s hgher, then no votng strategy profle s a NE. Most of the NE defned by the precedent lemmas guarantee the revocaton of the accused node s certfcate. However, when costs are greater than benefts, the ratonal strateges do not predct any unnecessary waste of vald certfcates by the players. Only the strct mnmal number of voters n v or exactly one self-sacrfce s selected as NE of the game. The man drawback s, however, that n all cases we have more than one possble NE by whch the game could end. If actve players bear a postve cost, those who abstan beneft from the effort of the others wthout havng to pay for t. Thus, every node would prefer to be one of the abstanng players and enjoy the benefts wthout contrbutng to the well-beng of the communty. The decson about whch player should choose whch strategy s addressed n the followng subsectons, by takng nto account the past behavor of each node when computng ndvdual payoffs. We frst dscuss the number of votes n v and then we focus on self-sacrfce costs c s,. B. Dynamc Vote Prevously, we assumed that n v was a fxed value, e.g. the majorty of players, as we dd not consder reputatons. By accountng for past behavor, however, we can determne the number of necessary votes for a successful revocaton dependng on the devce that actually uses the vote strategy and the reputaton of the accused node. For nstance, one vote by a node wth a hgher reputaton than the accused mght be enough to successfully revoke the certfcate (thus n v = 1), whereas several nodes mght need to vote f ther counter s not greater than the one of the accused devce (n v > 1). We now assume that a revocaton s successful when (a) :s =V u u m,.e. f the sum of counters of the players that vote s greater than the accused node s counter, or when (b) there s at least one self-sacrfcng player. We see that, for any gven strategy profle s = {s } n =1, the actual reputaton of the nodes performng the vote strategy determnes n v. For smplcty of future notaton, for each strategy profle s = (s 1,..., s 1, s +1,..., s n ), we defne the sum of counters of all players k (other than ) that choose to vote as γ(s ) = k :s k =V C. Retalaton Attack Cost Functons For each revocaton game aganst a malcous node, there s a rsk that the accused nodes mght collude and/or respond to the revocaton by accusng the bengn nodes. The more malcous nodes are present n a gven area, the more costly (or rsky) t becomes for bengn nodes to revoke them. Each partcpant n the revocaton game has two decsve actons (vote or commt self-sacrfce) that have dfferent strengths: one vote s usually not suffcent for a revocaton, as opposed to one self-sacrfce whch s entrely suffcent. Thus, the selfsacrfce strategy s more rsky to adopt because t s very easy for the malcous nodes to dentfy the unque player that commtted self-sacrfce and retalate aganst t. Therefore, we assume that 0 < e(m/n) < f(m/n). We choose f(m/n) = M/N and e(m/n) = z M/N, 0 < z 1, to model the retalaton attack cost functons n our games. They assure that n each revocaton game, f M/N s hgh, the nodes wll carefully consder ther actons before commttng to them. D. Self-Sacrfce Cost Functon If we consder the self-sacrfce strategy, we know that only one such strategy s suffcent to revoke the accused node. Thus, the extreme power assocated wth ts use should depend on the past behavor of each node. We make the plausble assumpton that a node wth a hgh counter has most lkely behaved correctly n the past and dd not abuse the revocatons, whereas a node wth a low counter has probably msbehaved. The well-behavng node has a better reputaton and should be gven a greater ncentve to perform the self-sacrfce. The msbehavng node should have to pay an extremely hgh prce for self-sacrfcng, whch would ultmately deplete ts counter and remove t automatcally from the network. Ths would lmt the abuse and ensure that msbehavor s quckly extngushed. We model the self-sacrfce cost c s, by a lnear functon of the counter u,.e. c s, = h g u. We tested several concave and convex functons for whch the cost decreases monotoncally wth the counter. We chose the lnear model because t provdes a good balance between the hgher costs determned by a concave functon and the lower costs dctated by a convex one. The two parameters of c s, to fne tune are h > 0 and g > 0. We begn by delneatng the best response functons for a player, assumng that b v e(m/n) > c,.e. the payoff for a successful vote s greater than the cost of abstanng n case the accused node s not revoked. The NE profles are then obtaned by the set of mutual best responses. The followng lemmas defne the scenaros where 1) the revocaton does not succeed even f votes, 2) the u k

6 6 revocaton succeeds f votes and 3) the revocaton succeeds even f abstans. Lemma 5: If s s such that u + γ(s ) < u m and n absence of a self-sacrfce, the best response functon for any player s defned as { br (s ) = arg max u A f u < τ 1 (s, s ) = s {A,V,S} S otherwse where τ 1 = h B c+f(m/n) g. Lemma 6: If s s such that u + γ(s ) u m and n absence of a self-sacrfce, the best response functon for any player s defned as br (s ) = { V f u < τ 2 S otherwse where τ 2 = h B v+b e(m/n)+f(m/n) g. Lemma 7: If s s such that γ(s ) u m or t has at least one self-sacrfce, the best response functon for any player s defned as A f b v < e(m/n) u < τ 3 V f b v > e(m/n) u < τ 2 br (s ) = S f (b v < e(m/n) u τ 3 ) (b v > e(m/n) u τ 2 ) where τ 3 = h B+f(M/N) g. Thanks to the best response functons, we can already fne tune h such that mn (τ 1, τ 2 ) > 0 as u 0, whch yelds h > B + c f(m/n). In addton, we are now able to mpose the followng three condtons on the game parameters: 1) Postve cost. We want that c s, + f(m/n) > 0 for all players P, otherwse t would encourage the abuse of self-sacrfce by malcous aganst bengn nodes. c s, = h g u + f(m/n) > 0, = 1..., n whch s equvalent to c s, = h g max u + f(m/n) > 0 h + f(m/n) max u > g (1) 2) Guaranteed revocaton. Consderng s of Lemma 5, we do not want abstan to be a best response for at least one player, otherwse the accused node would not be revoked. In other terms, we need that max u > h B c + f(m/n) g g > h B c + f(m/n) max u Ths requrement s essental f we want to protect ourselves n case the estmaton of the cost parameters assocated wth the attack of the accused node s dffcult or prone to errors. (2) 3) System-wde effcency. Consderng s of Lemma 7, we do not want self-sacrfce to be a best response. The malcous node would be revoked anyway, even f abstans (and thus does not ncur n any costs). We can guarantee ths by settng the largest threshold of the game lower than the maxmum counter. (a) If b v < e(m/n): max u < τ 3 (b) If b v e(m/n): g < h B + f(m/n) max u = τ 4 (3) max u < τ 2 h B v + b e(m/n) + f(m/n) g < max u = τ 5 (4) By mergng the upper bounds (1), (3), (4) and the lower bound (2) we have f b v < e(m/n): f b v e(m/n): h B c + f(m/n) max u h B c + f(m/n) max u < g < τ 4 < g < τ 5 In addton to the condtons 1) - 3) expressed prevously, n our NE selecton protocol defned n Secton VI we requre the exstence of at least one NE strategy profle. Thanks to bounds on the cost parameters h and g, we state the followng Theorem for b v < e(m/n) (when b v > e(m/n), the soluton s trval because there s always a unque NE, accordng to Lemma 1): Theorem 1: In G n, for b v < e(m/n), there s always a pure strategy NE profle s wth exactly one self-sacrfce and n 1 abstentons. Moreover, the player that commts selfsacrfce s the one wth the largest u. The proof s provded n Appendx. VI. SOCIAL WELFARE AND PROTOCOLS In ths secton, we descrbe the method that we use to select a sngle NE, n case more are present, wth the related protocols. The underlyng prncple s that of the prce of anarchy [20], whch takes nto account the utlty of all players or, n other words, the socal welfare functon ω. There are dfferent knds of these functons and two among them are the utltaran and egaltaran functons: n Utltaran: ω(s) = u (s) =0 Egaltaran: ω(s) = mn u (s)

7 7 By maxmzng ω(s) over all possble strategy profles s = (s 1,..., s n ) S, we acheve the socal optmum welfare Socal Optmum = max s S ω(s) The prce of anarchy (PoA) s then defned as the rato of the socal optmum welfare to the welfare of the worst NE strategy profle s Socal Optmum PoA = mn s NE ω(s ) The dea s that t gves a measure of how well selfsh players (NE) perform compared to the socal optmum. To solve the ssue and help players make consstent decsons,.e. to select the same NE strategy, we use the noton of socal optmum but n a slghtly dfferent way. We do not try to maxmze the welfare functon ω over all possble profles s but only over the NE profles s, because we are nterested n selectng one NE that s optmal wth respect to the gven ω. Consequently, all players wll be able to make ndependent, but mutually consstent, decsons about a unque NE. We now descrbe the unque optmal NE selecton protocols that are run durng the revocaton process, as descrbed n Secton IV. Frst of all, each player computes all NE as the frst step of the NESelect protocol. Knowng the optmzed game parameters, nodes can use heurstcs to mmedately dscard all strategy combnatons that do not result n a revocaton or that are neffcent, thus reducng the tme requred for the NE computatons. If more than one NE exsts, the second protocol OptNE s executed and the set G of all NE satsfyng the optmalty crtera (utltaran egaltaran or vce versa) defned by the varable frstoptcond s determned. We choose the utltaran crtera frst because t compares the aggregate utltes of all players at once, as opposed to the one-to-many comparson of each utlty, for all NE, done by the egaltaran crtera. The frst protocol then looks whether ths set s a sngleton or not and f so, t outputs the unque optmal NE profle s, otherwse t changes the optmalty crtera and restarts. If ths process ends up wth G havng more than one optmal NE as well, the player that ntated the revocaton game selects one optmal NE from the set G at random and broadcasts t to all partcpants. The fnal output of the two protocols s the unque socally optmal NE profle s. By agreeng on ths NE, all players are guaranteed not to pay the extra cost c that would result from the faled revocaton and to receve rewards from the CA. The functon getnext(.) takes the next n lne element of (.), SelectRandom(.) chooses one element of (.) at random, Broadcast(.) sends a broadcast message wth the element (.) to all neghbors and ReceveOpt(.) wats for the broadcasted element sent by the node wth the (.) ID. VII. PERFORMANCE EVALUATION We mplemented and smulated the optmal NE selecton protocols n Matlab, assumng a sngle attacker, although there could be as many attackers as revocaton games runnng n Protocol 1 NESelect. 1: AllNE = {s s NE} 2: f AllNE = 1 then 3: s = getnext(allne) 4: else 5: G = OptNE(utltaran, AllNE) 6: f G = 1 then 7: s = getnext(g) 8: else 9: G = OptNE(egaltaran, AllNE) 10: f G = 1 then 11: s = getnext(g) 12: else 13: f thsnodeid = ntatorid then 14: s = SelectRandom(G) 15: Broadcast(s ) 16: else 17: s = ReceveOpt(ntatorID) Protocol 2 OptNE(frstOptCond, AllNE). 1: f frstoptcond = utltaran then 2: ω 1 (s) = n =0 u (s) 3: ω 2 (s) = mn u (s) 4: else 5: ω 1 (s) = mn u (s) 6: ω 2 (s) = n =0 u (s) 7: G 1 = {s s = arg max s AllNE [ω 1 (s)] 8: f G 1 = 1 then 9: G = G 1 10: else 11: G 2 = {s s = arg max s G1 [ω 2 (s)] 12: G = G 2 13: return G parallel. We run 10 teratons for each number of players between 2 and 15, as we assume a hghly moble envronment and short-range communcatons. The confdence nterval s 95%. As n Secton V-D for the system-wse effcency of the self-sacrfce cost c s,, we assume here that b v < e(m/n) n order to avod any unnecessary effort due to the use of the vote strategy as well. The exact game parameters are: u [0 10] unformly at random, where we use the same maxmum value through all subsequent smulatons. h = 4.5 > B = 1 > c = 0.5 > v = 0.3 > b = 0.2 [certfcates], z = g = 2(h B+f(M/N)) c s the mddle pont between the 2 max u lower (2) and upper bounds (3) to the slope of c s,. The rato of malcous/total nodes s M/N = 0 and M/N = 0.3. The man results are dscussed n the followng subsectons. A. Number of Nash Equlbra In Fgure 2 we see that by usng the dynamc vote, the number of vote NE s only 1/25 of the number obtaned

8 8 # of Nash equlbra Vote NE Majorty Vote NE Dynamc, M/N=0 Vote NE Dynamc, M/N=0.3 Sacrfce NE % of selectons Type of selected NE Majorty vote, M/N=0 Dynamc v. / u m =14, M/N=0 Dynamc v. / u m =14, M/N=0.3 Dynamc v. / u m =16, M/N=0 Dynamc v. / u =16, M/N=0.3 m # of players # of players 8 7 Fgure 2. Average number of Nash equlbra. # of votes requred for successful revocaton Majorty vote Dynamc v. / u m =14 Fgure 4. Percentage of vote Nash equlbrum selectons. to the greater number of players needed by the majorty and the consequently hgher socal cost. # of votes for succ. revoc Dynamc v. / u m =16 Dynamc v. / u m = # of players Fgure 3. Number of votes requred for a successful revocaton. when usng the majorty vote for 15 players. Ths comes from the fact that there are fewer combnatons of players whose aggregate votes would result n a successful revocaton, compared to any combnaton of the majorty of players n the other case. The mpact of the presence of colludng malcous nodes that could retalate aganst the players s neglgble. We notce that the number of self-sacrfce NE s the same n both systems, because the self-sacrfce strategy s lmted to the one or two players that have the hghest counter and does not depend on the votng scheme beng used. B. Number of Votes for Revocaton Fgure 3 shows the number of players that are requred to vote n order to revoke the accused node s certfcate. For the majorty vote, the number of votes ncreases wth the total number of players, rrespectve of ther reputatons. Wth the dynamc vote, on the contrary, we see that the number of votes tends to decrease as the number of players ncreases. Thanks to the greater dversty of counters as the number of players ncreases, t becomes easer to fnd few players wth hgh counters (or reputatons), such that the vote NE becomes socally less costly. If the game were to end by votng, only these few players would need to vote, compared C. Type of Selected Nash Equlbrum Fgure 4 shows the percentage of vote NE that have been selected as the unque optmal NE by the protocols for, respectvely, majorty and dynamc votes. The percentage of selected optmal self-sacrfce NE s smply the dfference between 100% and the vote NE selecton percentage. Wth majorty votes, the vote NE s domnant n games wth less than 4 players, whereas wth 4 players and more, the selfsacrfce takes over. Ths s justfed by the socal optmalty crtera as the vote NE wll be less socally costly than the sacrfce f and only f (b v) n v > c/2. For our parameters, we have that the nequalty holds f n v 2, meanng that up to three players, a vote s less costly as the majorty s n v = 2, and afterwards t becomes more costly and therefore the selfsacrfce strategy s selected. Wth dynamc votes, we see that for relatvely low u m, the vote NE s domnant wth respect to the self-sacrfce because very few players are needed to vote and, as explaned earler, the vote s more socally optmal f and only f the two most wealthy players are suffcent to revoke the accused node. When u m ncreases, more players would be needed for the revocaton by vote and f most of them have a relatvely low u, t mght not even be feasble. In ths case, the self-sacrfce strategy would be the only opton. Fnally, we see that by ncreasng the number of players, there are more chances of fndng players wth relatvely hgh u and thus revocaton by vote would be less costly than self-sacrfce. When the number of colludng malcous nodes ncreases, the revocaton s done by self-sacrfce. Gven our parameters, t s socally less costly to rsk the revocaton of one bengn node that commtted self-sacrfce than two devces that voted. VIII. CONCLUSION In ths paper, we have desgned a game-theoretc framework for local certfcate revocaton n ephemeral networks. Frst, we have provded ncentves n order to guarantee the revocaton

9 9 of the malcous node even n presence of naccurate estmaton of the attack-nduced cost. Second, we have consdered reputatons, based on each node s past behavor, and we have optmzed the game model such that the adapted cost parameters guarantee a successful revocaton of the malcous node n the most socally effcent way. Based on the analytcal results, we then desgned a novel reputaton-based on-the-fly local revocaton scheme that establshes a unque optmal Nash equlbrum n a dstrbuted fashon. Smulaton results llustrated that, by consderng the past behavor of all partes nvolved n the process, our revocaton protocols are effectve n determnng the unque most effcent outcome that s also socally optmal,.e. that generates the least costs for the communty of players. As part of future work, we ntend to extend our gametheoretc model to other breeds of networks wth smlar characterstcs, and to nclude role attrbuton to a subset of players, where herarchy and past behavor wll be consdered whle determnng the outcome of the revocaton games. REFERENCES [1] [2] star. [3] [4] J. Katz, Brdgng game theory and cryptography: Recent results and future drecton, Lecture Notes n Computer Scence, vol. 4948, p. 251, [5] M. Raya, M. Manshae, M. Félegyhaz, and J.-P. Hubaux, Revocaton games n ephemeral networks, n Proceedngs of the 15th ACM conference on Computer and communcatons securty. ACM New York, NY, USA, 2008, pp [6] R. L, J. L, H. Kameda, and P. Lu, Localzed publc-key management for moble ad hoc networks, n IEEE Global Telecommuncatons Conference, GLOBECOM 04, vol. 2, [7] H. Luo, P. Zerfos, J. Kong, S. Lu, and L. Zhang, Self-securng ad hoc wreless networks, n Seventh IEEE Symposum on Computers and Communcatons (ISCC02), [8] S. Chnn, J. Thomas, G. Ghnea, and Z. Shen, Trust model for certfcate revocaton n ad hoc networks, Ad Hoc Networks, vol. 6, no. 3, pp , [9] G. Arbot, C. Crépeau, C. Davs, and M. Maheswaran, A localzed certfcate revocaton scheme for moble ad hoc networks, Ad Hoc Networks, vol. 6, no. 1, pp , [10] P. Mchard and R. Molva, Core: a collaboratve reputaton mechansm to enforce node cooperaton n moble ad hoc networks, n Advanced communcatons and multmeda securty: IFIP TC6/TC11 Sxth Jont Workng Conference on Communcatons and Multmeda Securty, September 26-27, 2002, Portorož, Slovena. Kluwer Academc Pub, 2002, p [11] Wreless Publc Key Infrastructure - Man Specfcaton. [Onlne]. Avalable: Rev. 2.2, [12] IETF RFC [13] M. Gruteser and D. Grunwald, Enhancng locaton prvacy n wreless lan through dsposable nterface dentfers: a quanttatve analyss, Moble Networks and Applcatons, vol. 10, no. 3, pp , [14] Mx zones: User prvacy n locaton-aware servces. [15] H. Yang, H. Luo, F. Ye, S. Lu, and L. Zhang, Securty n moble ad hoc networks: challenges and solutons, IEEE Wreless Communcatons, vol. 11, no. 1, pp , [16] H. Yang, J. Shu, X. Meng, and S. Lu, Scan: self-organzed networklayer securty n moble ad hoc networks, IEEE Journal on Selected Areas n Communcatons, vol. 24, no. 2, pp , [17] S. Radosavac, J. Baras, and I. Koutsopoulos, A framework for mac protocol msbehavor detecton n wreless networks, n Proceedngs of the 4th ACM workshop on Wreless securty. ACM New York, NY, USA, 2005, pp [18] T. Moore, J. Clulow, S. Nagaraja, and R. Anderson, New strateges for revocaton n ad-hoc networks, Lecture Notes n Computer Scence, vol. 4572, p. 232, [19] C. Daskalaks, P. Goldberg, and C. Papadmtrou, The complexty of computng a nash equlbrum, Commun. ACM, [20] T. Roughgarden, Selfsh routng and the prce of anarchy. The MIT Press, APPENDIX Proofs of Lemmas 1-7 and Theorem 1. Lemma 1: By defnton, we know that a strategy profle s s a NE ff no sngle player has ncentve to unlaterally devate from hs equlbrum strategy s, gven the strateges of other players s. If we consder the payoff for any player correspondng to the strategy profle s = (V,..., V ) we have that s = A u (V,..., A, V,..., V ) = 0 s = V s = S u (V,..., V,..., V ) = b v e(m/n) u (V,..., S, V,..., V ) = B c s f(m/n) Gven the condtons of the Lemma, b v e(m/n) > 0 f(m/n) and thus for any s s, the correspondng payoff s lower than f s = s. Lemma 2: We consder the strategy profle s wth one self-sacrfce and n 1 abstentons. In ths case, the payoffs are u = (B c s f(m/n), 0,..., 0) = ( f(m/n),..., 0), where the self-sacrfcng player could be any of the n players. The payoffs are f s = S :u (A,..., s, A,..., A) = 0 f(m/n) u (A,..., A,..., A) = c u (A,..., V, A,..., A) = v e(m/n) c f s = A :u (s 1,..., s,..., s n) = 0 u (s 1,..., V, s +1,..., s n) = b v e(m/n) u (s 1,..., S, s +1,..., s n) = 0 f(m/n) For s = S, u (A,..., A) = c < u (s, A,..., A) = f(m/n) f and only f f(m/n) < c. For s = A, u (S, A,..., A) = 0 > u (S, A,..., S, A,..., A) = f(m/n) for all f(m/n) > 0. We see that f player s the only sacrfcng partcpant, he has no ncentve to devate from ths strategy f the rsk of retalaton s low (f(m/n) < c). In ths case, any strategy profle s wth exactly one self-sacrfce and n 1 abstentons s a NE. If, on the other hand, the rsk of retalaton s hgh, he would prefer to abstan and thus the all-abstan strategy profle would be a NE. Lemma 3: The proof s analog to the one of Lemma 2. Lemma 4: For the case (a), the proof s analog to the one of Lemma 2. For the case (b), we consder the strategy profle s that has exactly n v votes and n n v abstentons. Wthout loss of generalty, we assume that the frst n v players vote and the remanng players abstan. We refer to a votng player as

10 10 and to an abstanng player as j. If s 1 = V :u 1 (s 1,..., V, A,..., A) = b v e(m/n) u 1 (A, V,..., V, A,..., A) = c u 1 (S, V,..., V, A,..., A) = B c s f(m/n) If s n = A :u 1 (V,..., V, A,..., s n) = 0 u n (V,..., V, A,..., V ) = b v e(m/n) u n (V,..., V, A,..., S) = B c s f(m/n) Accordng to the condtons of the Lemma, we have that s = V s better than s = S for any votng player. Smlarly, we see that s = V s also better than s = A f and only f b v e(m/n) > c, or f e(m/n) < b v + c. Moreover, s j = A s better than s j = V or s j = S for any abstanng player j. Therefore, the strategy profle s wth exactly n v votes and n n v abstentons s a NE f and only f e(m/n) < b v c, otherwse s s not a NE. Lemma 5: We look at the payoff functons for the dfferent possble s, gven all s that respect the condton of the lemma. s = A s = V u (A, s ) = c u (V, s ) = c v e(m/n) s = S u (S, s ) = B h + g u f(m/n) From the above equatons we know that the strategy vote wll never be a best response snce the assocated payoff s always lower than the one gven by abstan. The only choce s then between the strategy S and A. Solvng the nequalty B h+g u f(m/n) > c we have that the best response of player s to abstan f u < h c B+f(M/N) g and to self-sacrfce otherwse. Lemmas 6, 7: The proof s analog to that of Lemma 5. Theorem 1: Let us consder the strategy profle s = (A,..., A, S, A,..., A), where the only S strategy s adopted by the player wth the largest u (we call hm P S ) and all the remanng n 1 players adopt the strategy abstan (we refer to any of these players as P A ). Usng the bounds found n Secton V-D for h and g, we show that s s always a NE. Frst, let us analyze the ndvdual payoffs for each player and for all hs possble strateges, gven the strateges of the other n 1 players. (a) For any P A : Moreover, we can see that u PA,(S,s ) u PA,(A,s ) = B c s,pa f(m/n) (a) < B h + h B + f(m/n) u P max u A f(m/n) = (1 u P A max u )(B h f(m/n)) (b) < (1 u P A ) max u (B B c + f(m/n) f(m/n)) } {{ } >0 = (1 u P A max u )( c) < 0 u PA,(S,s ) < u PA,(A,s ) where (a) follows from the lower bound (3) and (b) from the fne tunng of h,.e. h > B +c f(m/n). Therefore, no player P A has ncentve to unlaterally devate from hs equlbrum strategy abstan. (b) For P S, where u P S = max u : u PS,(A, s ) = u PS,(A,s ) = c u PS,(V, s ) = u PS,(V,s ) = c v e(m/n) u PS,(S, s ) = u PS,(S,s ) = B c s,ps f(m/n) Agan, to vote s not an opton for P S snce the strategy abstan would always gve hm a better payoff. Furthermore, we have u PS,(S,s ) u PS,(A,s ) = B c s,ps f(m/n) + c = B h + g u P S f(m/n) + c (c) > B h + h B c + f(m/n) max u u P S f(m/n) + c (d) = B h + h B c + f(m/n) u u P S f(m/n) + c P S = 0 where (c) follows from the lower bound (2) and (d) from = max u. Summng up, we have that u P S u PS,(S,s ) u PS,(A,s ) > 0 or u PS,(S,s ) > u PS,(A,s ) Therefore, P S has no ncentve to unlaterally devate from hs equlbrum strategy S. In the end, no player s better off devatng from hs equlbrum strategy and thus s s a Nash equlbrum n any n-player revocaton game G n. u PA,(A, s ) = u PA,(A,s ) = 0 u PA,(V, s ) = u PA,(V,s ) = b v e(m/n) u PA,(S, s ) = u PA,(S,s ) = B c s,pa f(m/n) Here, we can already exclude the second possblty as the correspondng payoff s always smaller than the other two.

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Economic Models for Cloud Service Markets

Economic Models for Cloud Service Markets Economc Models for Cloud Servce Markets Ranjan Pal and Pan Hu 2 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de Abstract. Cloud computng

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Trust Formation in a C2C Market: Effect of Reputation Management System

Trust Formation in a C2C Market: Effect of Reputation Management System Trust Formaton n a C2C Market: Effect of Reputaton Management System Htosh Yamamoto Unversty of Electro-Communcatons htosh@s.uec.ac.jp Kazunar Ishda Tokyo Unversty of Agrculture k-shda@noda.ac.jp Toshzum

More information

Chapter 11 Practice Problems Answers

Chapter 11 Practice Problems Answers Chapter 11 Practce Problems Answers 1. Would you be more wllng to lend to a frend f she put all of her lfe savngs nto her busness than you would f she had not done so? Why? Ths problem s ntended to make

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development

Abteilung für Stadt- und Regionalentwicklung Department of Urban and Regional Development Abtelung für Stadt- und Regonalentwcklung Department of Urban and Regonal Development Gunther Maer, Alexander Kaufmann The Development of Computer Networks Frst Results from a Mcroeconomc Model SRE-Dscusson

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE

AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage Analyzng Self-Defense Investments n Internet Securty Under Cyber-Insurance Coverage Ranjan Pal Department of Computer Scence Unv. of Southern Calforna Emal: rpal@usc.edu Leana Golubchk Department of Computer

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16

Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16 Return decomposng of absolute-performance mult-asset class portfolos Workng Paper - Nummer: 16 2007 by Dr. Stefan J. Illmer und Wolfgang Marty; n: Fnancal Markets and Portfolo Management; March 2007; Volume

More information

RUHR-UNIVERSITÄT BOCHUM

RUHR-UNIVERSITÄT BOCHUM RUHR-UNIVERSITÄT BOCHUM Horst Görtz Insttute for IT Securty Techncal Report TR-HGI-2006-002 Survey on Securty Requrements and Models for Group Key Exchange Mark Manuls Char for Network and Data Securty

More information

Equlbra Exst and Trade S effcent proportionally

Equlbra Exst and Trade S effcent proportionally On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

PRIVATE SCHOOL CHOICE: THE EFFECTS OF RELIGIOUS AFFILIATION AND PARTICIPATION

PRIVATE SCHOOL CHOICE: THE EFFECTS OF RELIGIOUS AFFILIATION AND PARTICIPATION PRIVATE SCHOOL CHOICE: THE EFFECTS OF RELIIOUS AFFILIATION AND PARTICIPATION Danny Cohen-Zada Department of Economcs, Ben-uron Unversty, Beer-Sheva 84105, Israel Wllam Sander Department of Economcs, DePaul

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Trivial lump sum R5.0

Trivial lump sum R5.0 Optons form Once you have flled n ths form, please return t wth your orgnal brth certfcate to: Premer PO Box 2067 Croydon CR90 9ND. Fll n ths form usng BLOCK CAPITALS and black nk. Mark all answers wth

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Portfolio Loss Distribution

Portfolio Loss Distribution Portfolo Loss Dstrbuton Rsky assets n loan ortfolo hghly llqud assets hold-to-maturty n the bank s balance sheet Outstandngs The orton of the bank asset that has already been extended to borrowers. Commtment

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

RESEARCH DISCUSSION PAPER

RESEARCH DISCUSSION PAPER Reserve Bank of Australa RESEARCH DISCUSSION PAPER Competton Between Payment Systems George Gardner and Andrew Stone RDP 2009-02 COMPETITION BETWEEN PAYMENT SYSTEMS George Gardner and Andrew Stone Research

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Managing Resource and Servent Reputation in P2P Networks

Managing Resource and Servent Reputation in P2P Networks Managng Resource and Servent Reputaton n P2P Networks Makoto Iguch NTT Informaton Sharng Platform Laboratores guch@sl.ntt.co.jp Masayuk Terada NTT DoCoMo Multmeda Laboratores te@mml.yrp.nttdocomo.co.jp

More information

Inequity Aversion and Individual Behavior in Public Good Games: An Experimental Investigation

Inequity Aversion and Individual Behavior in Public Good Games: An Experimental Investigation Dscusson Paper No. 07-034 Inequty Averson and Indvdual Behavor n Publc Good Games: An Expermental Investgaton Astrd Dannenberg, Thomas Rechmann, Bodo Sturm, and Carsten Vogt Dscusson Paper No. 07-034 Inequty

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information