A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
|
|
- Veronica West
- 8 years ago
- Views:
Transcription
1 Journal of Coputatonal Inforaton Systes 6:7(200) Avalable at A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School of Coputer and Inforaton Engneerng, Shangha Unversty of Electrc Power Shangha , Chna Abstract Role-based access control s an portant echans to prevent the unauthorzed access n ters of roles. User herarchy s an effcent structure to express the relatons between dfferent roles. The cobnaton between role-based access control and the user herarchy s requred n dfferent context, especally n open nternet envronent where the publshed or delegated data are encrypted for prvacy. In ths paper, we propose a novel role-based access control schee n user herarchy, whch can pleent dynac access control n open nternet envronent. Our approach s pleented by usng one-way hash functon to avod the leakage of keys fro dfferent roles, by usng a hashed value as the dentfer of a role and by usng dervaton functon to derve keys n the lower herarchy fro the keys n the upper herarchy. The key generaton, dentfer coputaton and key dervaton s qute sple, and the paraeters reebered by users are fxed. Keywords: Role-based Access Control; Dynac Access Control; User Herarchy. Introducton In recent years, ore and ore nforaton ncludng senstve data s publshed through nternet. However, the leakage of senstve data, such as edcal records or stocks data, ake the data publcaton developng slowly. In order to protect the senstve data fro unauthorzed or alcous access, ost of proposed papers are focused on adoptng encrypton to guarantee the prvacy of senstve data. Under the encrypton technque, only the user who has the correct decrypton key can decrypt the encrypted data and gets the real senstve data. However, encrypton of data brngs about two probles, one s that the encrypton for all senstve data by usng only one encrypton key akes all data n danger, the other s that the encrypton for each senstve data by usng dfferent encrypton keys akes the key anageent and dstrbuton dffcult. Therefore t s ore attractve and portant to cobne the encrypton wth access control n herarchy to pleent the effcent access control as well as the protecton of senstve data. In ths paper, we concentrate on desgnng a novel access control schee, whch can copute the keys for all users n ters of the dfferent relatons aong users n the herarchy. Related work. Access control n database s an portant echans to guarantee the securty and data prvacy, and there are any access control odels appled to dfferent data anageent systes. Bertno et al[2] states the current challenge of database securty and evoluton of the access control odel n dfferent data anageent syste, and dscussed access controls n obect-orented database systes n []. But n the data publcaton[6] and database outsourcng odel[4], tradtonal access control technology Correspondng author. Eal addresses: tanxuxa_76@sna.co.cn (Xuxa TIAN) / Copyrght 200 Bnary Inforaton Press July, 200
2 2424 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) whch operates on the clent-server archtecture n ters of the assupton that the trusted server s responsble for the desgnng and enforcng of the access control polcy, s challenged, because the data publsher or the database servce provder ay be untrusted for the publshed or delegated data contents. In data publcaton, Mklau et al[6] frst proposed a fraework to enforce access control polces on publshed XML docuents by usng cryptography, n whch the data owner enforce access control polcy by dstrbutng keys to users who are granted to access the correspondng data. In outsourced database, Saarat[3], Vercat [4], Tan[5] et al proposed to cobne the encrypton and access control to realze the effcent access control n ters of the keys dstrbuton. Especally Tan[5] ntroduced a DSP re-encrypton echans to pleent the selectve access control of the encrypted data as well as releve the clent fro the coplex key dervaton procedure. A nuber of works [7][8][9][0][][2][3] relatng to access control n a herarchy have been proposed. In alost all these works, there s a relatonshp between the key assgned to a node and those assgned to ts chldren. The dfference between the related works les ostly n the dfferent cryptographc technques eployed for key generaton. Yang et al[7] addressed an access control schee based on one-way hash functon, but Hsu et al[8] ponted out the securty leakage n Hsu s schee and proposed a new robust dynac access control schee. However, Hsu et al[8] schee ntroduced each user s dentty nforaton nto the hash functon to avod the key leakage. In ths paper, we concentrate on desgnng a schee to solve how to copute the prvate keys for users n ters of the dfferent relatons aong users n the herarchy. In our approach, the users n the herarchy are grouped nto dfferent roles n ters of ther access rghts, that s, the users who have the sae access rghts are assgned nto the sae role. 2. Prelnares 2.. Hash Functon We use H denotng as a hash functon, whch s the functon by nputtng an nforaton of arbtrary length and outputtng a dgest of fxed length. Assue H s an one-way, collson-resstant hash functon, whch eets wth the followng two propertes: ) Coputng H () s easy under the condton of known nforaton, but the reverse s ntractable. 2) If ', then H ( ) H ( ' ). Fg. Hash Functon Workng Prncple Fg. s the workng flow and propertes for hash functon H. Fro Fg. we know that H () s not equal to H (') as long as s not equal to ', that s to say that any bt of changng n nforaton wll result n dfferent hash result H (). The hash functon s the portant securty and effcency
3 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) guarantee for the schee proposed by us Partally Ordered Set (POSET) Due to the practcal organzaton relaton n copany, the access control s always fored as a user herarchy, n whch users are grouped nto dfferent roles, and each role s assgned a dfferent securty clearance, such as, 2,..., n n Fg.2, n s the nuber of roles. If usng < expresses a bnary partally ordered relaton, then < denotes that has hgher securty clearance than, n other words, the users n have the rghts to access data belongng to users n, but the reverse doesn t succeed. For clearness we gve the foral defnton of POSET n the followng. Suppose that an organzaton structure can be represented as a partally ordered set (, < ), s a set of levels n herarchy, and < s the donance relaton between the levels. For splcty, we also use representng the role n that level. In the followng and are two levels respectvely n the herarchy. ) If <, then we say that strctly donates, and s strctly donated by. 2) If < and >, then we say that the two levels are equal and denote ths as =. 3) If ether < or =, then we say that donates, and s donated by and denotes ths as. 4) If nether nor, then we say that the two levels are ncoparable. 5) If < and no z akes < z < succeed, then we say that s a parent of. If < only, then we say that s an ancestor of and s a descendant of. So the organzaton structure n Fg.2 s a POSET, and then satsfes the propertes of POSET. 3. Revew Hash Based Schee 3.. Yang[7] s Schee In Yang[7] s schee, A trusted certfcaton authorty(ca) frst deternes a set of one-way hash functons S H = { H, H 2,..., H n}, where n s the axu degree of the herarchy, n another words, the axu drect chld nodes of one parent node n the herarchy. Assung that there are seven securty clearances, 2, 3, 4, 5, 6, 7, and whch are organzed n a herarchy n Fg.2. The degree s 3 for the herarchy n Fg.2. In ther approach, the CA assgns one secret key k for each securty clearance, 7, such as k for securty clearance, k 2 for securty clearance 2. The dervaton rule s dvded nto the followng three stuatons: ) For the root node. The secret key for the root node s assgned arbtrarly by CA and can t be derved by anyone, such as k for. 2) For the node whch has unque drect parent node. Suppose node s the unque drect parent node of node,, and s the th chld node of, denoted as C,, the chld
4 2426 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) are nubered fro the left to the rght. The secret key of can be derved fro k = H ( k ). For C, exaple 3 s the 2 th chld node of, denoted as C,2, and the secret key k 3 can be derved fro equaton k = H ( k ). 3 C,2 3) For the node whch has ore than one drect parent node. Suppose has drect parent nodes,,...,, where 2,, and s the th chld node of, C denoted as,. Assue the secret keys of k, k,..., k respectvely, the 2,,..., are,,2, parent H ( k ), t ust share the other paraeters Ct, t C s the order of t th parent node, t, and t, to derve the secret key of through the equaton: k = H ( H ( k ), H ( k ),..., H ( k )), C, denotes that s the C, C,, C, 2,2 C,, th chld node of. Fg. 2 Key Dervaton n the Herarchy Fg. 3 After Addng a New Node new For exaple, takng Fg.2 as an exaple, explans how to assgn and derve keys for each node n the herarchy through the followng stuatons: ) The secret key of the root node s k. 2) Node 2 can derve the secret key of node 5 by coputng H 2 ( k 2 ), therefore k 5 = H 2 ( k 2 ), and accordng to the sae rule, coputng k 2 = H ( k ), k 3 = H 2 ( k ) et al. Node 6 has two drect parent nodes, so node 2 and node 3 both can derve the secret key of 6 by coputng k 6 = H 3 ( H 3 ( k2 ), H( k3 )) under the condton that nodes 2 and 3 sharng the values of H ) and H ) each other. 3 ( k 2 ( k The Attacks n Yang[7] s Schee and ts Iproveent Paper[8] ponts out that n schee[7] soeone ay overstep hs authorty to access the unauthorzed nforaton n two cases, one s addng a new node, and the other s addng a new node after deletng an old
5 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) one. Fg.3 s the graph after addng a new node n the poston of frst chld n Fg.2. Now the secret key of node 6 s coputed fro H ( k 3 ) and H 4 ( k 2 ) n ters of the coputaton rule, k 6 = H 3 ( H 4 ( k 2 ), H( k3 )), but before ths node 3 has already known the share value H 3 ( k 2 ), whch s now the secret key of node 5. Therefore the securty of node 5 wll be endangered, and the nforaton encrypted by usng secret key H 3 ( k 2 ) for node 5 wll be leaked. Fg.4 s another case, denotng that a new node s nserted n the poston where the old node has ust been deleted. Before the deletng operaton, node 3 knows the secret key H 3 ( k 2 ) of node 6, however, after the deletng operatng of node 5, node 3 wll know the secret key H 2 ( k 2 ) of node 6. Contnung the process, when addng a new node the secret key H 2 ( k 2 ) of the new node new new to the poston where node 5 s deleted, s already known by node 3, so the prvacy of new node new s endangered and the nforaton encrypted by the secret key H 2 ( k 2 ) s dsclosed. Hsu[8] proved the securty of schee proposed by Yang[7] through addng the dentty nforaton nto the process of secret key coputaton, such as k 2 can be coputed by usng the equaton k 2 = H( ID, k, ) 2 ID, where ID, ID 2 are the dentfer for node 2, respectvely. Fg. 4 Addng a New Node new after Deletng an Old Node 5 4. Proposed Schee n User Herarchy 4.. The Identfer Defnton for a Role We assgn an dentfer for each role n the syste, and the dentfer can be coputed and publshed by each role wthout dsclosng any prvacy of user. r d = H ( userd userd 2... userdn ) th Where and s the nuber of roles n the syste, n s the nuber of users n the role. So each te deletng or nsertng a user fro soe role, the dentfer of the role wll be changed at the sae te, Fg.5 llustrates the herarchy of roles n the syste and the correspondng publcaton table for dentfers of roles. For exaple, the herarchy n Fg.5 s an acadec organzaton n soe college n one unversty. The college s anaged by a Dean. Under the dean are the dfferent departents chars, such as coputer scence(cs) char, councaton engneerng(ce) char. The students, who are n the lowest level, are advsed by one or ore tutors n the correspondng teacher groups. In ters of the practcal applcaton, we need to antan the senstve score or transcrpt nforaton of each student. The followng access control requreents need to be satsfed. ) Each student can read hs/her score or transcrpt.
6 2428 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) ) The teacher who teaches the student can read the score or transcrpt of the student. 3) The char of the departent n whch a student s aorng can read the student s score or transcrpt nforaton. 4) The dean can read all students transcrpts. Fg. 5 A Herarchy and ts Correspondng Publshed Identfers for Roles Suppose the Stu s a role whch s coposed of fve students, so the role dentfer for role Stu s n the followng. Stu d = H ( stud stud 2 stud 3 stud 4 stud 5 ) Assue the CS group conssts of three teachers, so the role dentfer for role CS group s as follows. CSgroup d = H ( teacherd teacherd 2 teacherd 3 ) The dentfers for other roles can be derved n ters of the nuber of persons n the roles, and the coputaton process s slar as above. So the deletng or nsertng users fro correspondng roles wll pact the dentfer of the role, and n turn effect the key dervaton fro the upper level to lower level The Proposed Schee Our schee requres satsfyng the followng three stuatons, that s, the key assgnent n the herarchy eet wth the followng three stuatons: ) For the unque parent node. Its secret key k root s assgned arbtrarly by the CA, such as k root = k for the node of role Dean. 2) For the nodes whch only have one drect parent node. If only has one drect parent node, then the secret key for s k = k = H k, ), k s the secret key for ( d, s the dentfer d for role, d can be searched n the publcaton of CA n table n Fg.6. For exaple, CS char can derve the secret key for CS group as follows. k = H ( k, CSgroup ), where CSgroup CSchar d CSgroup d = H ( teacherd teacherd 2... teacherd ), s the nuber of teachers n the CS group. 3) For the node whch has ore than one drect parent node. Suppose has drect parent nodes 2,,...,, where,, and s the th chld node of, denoted as C,. Assue the secret keys of 2,,..., are k, k,2,..., k,, respectvely, the parent ust
7 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) share the other paraeters H ( k, t, d ), d s the dentfer for role, t, and t, to derve the secret key of through the equaton: k = H ( H ( k,, d ), H ( k,2, d ),..., H ( k,, d )). For exaple, the secret key for role Stu2 n Fg.6 can be coputed as follows: k Stu2 = H ( H ( kcsgroup2, Stu2d ), H ( kcegroup, Stu2d )), where Stu 2d = H ( stud stud 2... stud ), s the nuber of students n role Stu2. 5. Dynac Access Control n the Herarchy 5.. Addng a User When addng a new user, there are two dfferent stuatons, the frst s that the new user doesn t belong to any role exst, so t s necessary to create a new role for the user. The second s that the new user belongs to a role exst, so the dentfer of the role exst need to be updated. In the frst stuaton If the new node wll be the new root node, the CA needs to assgn an arbtrary key for the new role, and all keys drect or ndrect wll be coputed agan. For exaple, nsertng a new node nto the root node n Fg.2, the orgnal node becoes the drect chld of new node knew arbtrarly for node new our proposed schee n secton 4.2. new new. The CA assgns a key, and all the other keys wll be regenerated n ters of the three stuatons n If a new node new s nserted nto a branch between and 3 n Fg.2, the drect parent only needs to derve the secret key k = H ( k, ) for the new nserted node new, where new newd newd s the dentfer of the new node, newd = H ( newuserd ). At the sae te the secret keys of drect or the ndrect chld of the new node new are updated, such as the keys for the nodes 3, 6, 7. The dentfers for all roles exst don t need to be updated because of no user nsertng. In the second stuaton If a new user s nserted nto a role exst, then we need to update the dentfer of the role, and at the sae te update the key for the role, such as nsertng a new user nto role 2 n Fg.2, then the dentfer of role 2 becoes H ( 2d d d 2dnew ), 2 dnew s the d of new user. At the sae te the secret keys of drect or the ndrect chld of the role 2 are updated, such as the keys for the nodes 4, 5, 6. Insertng a new user nto the role 6 s the sae as above, but now only the dentfer and secret key of 6 s updated, the others are keep the sae because the node 6 s a leaf node Deletng a User When deletng a user, there are two dfferent stuatons, the frst s to delete a role(a node n the herarchy). The second s to delete a user fro soe role. In the frst stuaton When the deletng node s the root node, then the keys of ts drect or ndrect node should be updated. For exaple, the deletng of node fro Fg.2 results n the CA assgnng keys for nodes 2 and 3 arbtrarly, and then regeneratng the keys for the nodes below the, such as 4, 5, 6, 7. If a node 5 s deleted fro Fg.2, all other keys needn t to be updated because 5 s a leaf node. The dentfers for all roles exst don t need to be updated because of no user deletng.
8 2430 X. Tan et al. /Journal of Coputatonal Inforaton Systes 6:7(200) In the second stuaton When deletng a user n soe role exst, then we need to update the dentfer of the role, and at the sae te update the key for the role, such as deletng a user fro role 3 n Fg.2, then the dentfer of role 3 becoes 3d = H ( 3d 3d d ( ) ), s the nuber of users n role 3 after deletng. The key for 3 becoes k = H ( k, 3 ) 3 d, and all keys for drect or ndrect node under node 3 are updated n ters of the schee proposed by us. 6. Conclusons and Future Work In ths paper a dynac access control schee n user herarchy based on hash functon s proposed. A dervaton functon s proposed and used to derve keys for dfferent users n the herarchy. Our approach not only provdes the dynac nsertng and deletng support for users, but also s applcable to general case. Securty analyss shows that our schee s securty aganst the key leakage when users change ther roles or leave the roles. In the future, we respect to fnd ore flexble approaches on provng effcency to both the space and the coputaton, especally reduce the share nforaton. Acknowledgeent The authors are grateful for the anonyous revewers who ade constructve coents. Ths work was supported by Research Fund for Excellent Youth Scholars of Shangha Hgher Educaton(No. Z ). References [] E. Bertno, S. Jaoda, and P. Saarat. Access Controls n Obect-Orented Database Systes: Soe Appproaches and Issues. In Advanced Database Concepts and Research Issues, 993, LNCS 759. [2] E. Bertno and R. Sandhu. Database securty-concepts, approaches and challenges. IEEE Transactons on Dependable and Secure Coputng, 2005,2():2-8. [3] P. Saarat. A data outsourcng archtecture cobnng cryptography and access control. Proc. of the st Coputer Securty Archtecture Workshop, Farfax, VA, 2007, pp [4] S. De Captan d Vercat, S. Forest, S. Jaoda, S. Parabosch, and P. Saarat. Over-encrypton: anageent of access control evoluton on outsourced data. In Proc. of the 33rd VLDB Conference, Venna, Austra, 2007, pp [5] X. Tan, X. Wang, and A. Zhou. DSP RE-Encrypton: A Flexble Mechans for Access Control Enforceent Manageent n DaaS IEEE Internatonal Conference on Cloud Coputng, 2009, pp [6] G. Mklau and D. Sucu. Controllng access to publshed data usng cryptography. In Proc. of the 29th VLDB Conference, Berln, Gerany, 2003,pp [7] C. Yang and C. L. Access control n a herarchy usng one-way hash functons. Coputers and Securty, 2004, 23( 8) : [8] C.L. Hsu, P.L. Tas, and Y.C Chou. Robust dynac access control schee n a user herarchy based on one-way hash functon.2009, [9] S. G. Akl and P. D. Taylor. Cryptographc Soluton to a Multlevel Securty Proble. Advances n Cryptology: Proceedngs of CRYPTO, Plenu Press, NY, 982, pp [0] S. G. Akl and P. D. Taylor. Cryptographc Soluton to a Proble of Access Control n a Herarchy. ACM Transactons on Coputer Systes, 983,(3): [] F. H. Kuo, V. R. L. Shen, T. S. Chen, and F. La. Cryptographc key assgnent schee for dynac access control n a user herarchy. Proceedngs of Coputers and Dgtal Technques, 999, 46(5): [2] T. C. Wu and C. C. Chang. Cryptographc key assgnent schee for herarchcal access control. Coputer Systes Scence and Engneerng, 200, 6(): [3] J. Crapton, K. Martn, and P. Wld. On key assgnent for herarchcal access control. In Proc. Of the 9th IEEE CSFW, Vence, Italy, 2006,pp.98-.
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationA Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security
Internatonal Journal of Network Securty, Vol.7, No., PP.3 34, Sept. 8 3 A ryptographc Key Assgnment Scheme for Access ontrol n Poset Ordered Herarches wth Enhanced Securty Debass Gr and P. D. Srvastava
More informationSecure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna z.t.ang@163.co Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
More informationBANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
More informationA Cryptographic Key Binding Method Based on Fingerprint Features and the Threshold Scheme
A Cryptographc Key ndng Method Based on Fngerprnt Features and the Threshold Schee 1 Ln You, 2 Guowe Zhang, 3 Fan Zhang 1,3 College of Councaton Engneerng, Hangzhou Danz Unv., Hangzhou 310018, Chna, ryouln@gal.co
More informationAn Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
More informationHow Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
More informationYixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
More informationTwo-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationResearch Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
More informationRevenue Maximization Using Adaptive Resource Provisioning in Cloud Computing Environments
202 ACM/EEE 3th nternatonal Conference on Grd Coputng evenue Maxzaton sng Adaptve esource Provsonng n Cloud Coputng Envronents Guofu Feng School of nforaton Scence, Nanng Audt nversty, Nanng, Chna nufgf@gal.co
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationAn Enhanced K-Anonymity Model against Homogeneity Attack
JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: wangqan@cqu.edu.cn Zhwe
More informationBasic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
More informationInventory Control in a Multi-Supplier System
3th Intl Workng Senar on Producton Econocs (WSPE), Igls, Autrche, pp.5-6 Inventory Control n a Mult-Suppler Syste Yasen Arda and Jean-Claude Hennet LAAS-CRS, 7 Avenue du Colonel Roche, 3077 Toulouse Cedex
More informationAn Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationPKIS: practical keyword index search on cloud datacenter
Park et al. EURASIP Journal on Wreless Communcatons and Networkng 20, 20:64 http://jwcn.euraspjournals.com/content/20//64 RESEARCH Open Access PKIS: practcal keyword ndex search on cloud datacenter Hyun-A
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationTraffic Demand Forecasting for EGCS with Grey Theory Based Multi- Model Method
IJCSI Internatonal Journal of Coputer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org 6 Traffc Deand Forecastng for EGCS wth Grey Theory Based Mult- Model
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co; rsrkant@llnos.edu
More informationStochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn sva.theja@gal.co;
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationII. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION
Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationCONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, sdwangp1975@163.co Zhyng
More informationInternational Journal of Industrial Engineering Computations
Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler
More informationVirtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
More informationA new anonymity-based protocol preserving privacy based cloud environment
Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal
More informationCross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing
Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We
More informationA Fuzzy Optimization Framework for COTS Products Selection of Modular Software Systems
Internatonal Journal of Fuy Systes, Vol. 5, No., June 0 9 A Fuy Optaton Fraework for COTS Products Selecton of Modular Software Systes Pankaj Gupta, Hoang Pha, Mukesh Kuar Mehlawat, and Shlp Vera Abstract
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationWeb Service-based Business Process Automation Using Matching Algorithms
Web Servce-based Busness Process Autoaton Usng Matchng Algorths Yanggon K and Juhnyoung Lee 2 Coputer and Inforaton Scences, Towson Uversty, Towson, MD 2252, USA, yk@towson.edu 2 IBM T. J. Watson Research
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationLeast Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
More informationGanesh Subramaniam. American Solutions Inc., 100 Commerce Dr Suite # 103, Newark, DE 19713, USA
238 Int. J. Sulaton and Process Modellng, Vol. 3, No. 4, 2007 Sulaton-based optsaton for ateral dspatchng n Vendor-Managed Inventory systes Ganesh Subraana Aercan Solutons Inc., 100 Coerce Dr Sute # 103,
More informationIntra-year Cash Flow Patterns: A Simple Solution for an Unnecessary Appraisal Error
Intra-year Cash Flow Patterns: A Smple Soluton for an Unnecessary Apprasal Error By C. Donald Wggns (Professor of Accountng and Fnance, the Unversty of North Florda), B. Perry Woodsde (Assocate Professor
More informationA Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationResearch on Transformation Engineering BOM into Manufacturing BOM Based on BOP
Appled Mechancs and Materals Vols 10-12 (2008) pp 99-103 Onlne avalable snce 2007/Dec/06 at wwwscentfcnet (2008) Trans Tech Publcatons, Swtzerland do:104028/wwwscentfcnet/amm10-1299 Research on Transformaton
More informationR-HASH: HASH FUNCTION USING RANDOM QUADRATIC POLYNOMIALS OVER GF(2)
R-AS: AS FUNCTION USING RANDO QUADRATIC POLYNOIALS OVER GF() Dhananoy Dey 1, Noopur Shrotrya 1, Indranath Sengupta 1 SAG, etcalfe ouse, Delh-11 54, INDIA. {dhananoydey, noopurshrotrya}@sag.drdo.n Department
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationCapacity Planning for Virtualized Servers
Capacty Plannng for Vrtualzed Servers Martn Bchler, Thoas Setzer, Benjan Spetkap Departent of Inforatcs, TU München 85748 Garchng/Munch, Gerany (bchler setzer benjan.spetkap)@n.tu.de Abstract Today's data
More informationMaximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI aparna@cs.brown.edu Clare Matheu Brown Unversty rovdence, RI clare@cs.brown.edu Danel Rcketts Brown Unversty rovdence, RI danel.bore.rcketts@gal.co
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationMyINS: A CBR e-commerce Application for Insurance Policies
Proceedngs of the 5th WSEAS Internatonal Conference on E-ACTIVITIES, Vence, Italy, November 20-22, 2006 373 MyINS: A CBR e-commerce Applcaton for Insurance Polces SITI SORAYA ABDUL RAHMAN, AZAH ANIR NORMAN
More informationSingle and multiple stage classifiers implementing logistic discrimination
Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,
More informationA Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationA role based access in a hierarchical sensor network architecture to provide multilevel security
1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationTourism Demand Forecasting by Improved SVR Model
Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna
More informationNaglaa Raga Said Assistant Professor of Operations. Egypt.
Volue, Issue, Deceer ISSN: 77 8X Internatonal Journal of Adanced Research n Coputer Scence and Software Engneerng Research Paper Aalale onlne at: www.jarcsse.co Optal Control Theory Approach to Sole Constraned
More informationA P2P Approach for Business Process Modeling and Reuse
A P2P Approach for Busness Process Modelng and Reuse José A. Rodrgues Nt., Jano Morera de Souza, Geraldo Zbrão, Geraldo Xexéo, Eduardo Neves, Wallace A. Pnhero COPPE Unversdade Federal do Ro de Janero
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationA Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost
Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton
More informationInternational Journal of Information Management
Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt
More informationGroup Solvency Optimization Model for Insurance Companies Using Copula Functions
Internatonal Conference on Econocs, Busness and Marketng Manageent IPEDR vol.9 () () IACSIT Press, Sngapore Group Solvency Optzaton Model for Insurance Copanes Usng Copula Functons Masayasu Kanno + Faculty
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationSection 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
More informationScan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
More informationResponse Coordination of Distributed Generation and Tap Changers for Voltage Support
Response Coordnaton of Dstrbuted Generaton and Tap Changers for Voltage Support An D.T. Le, Student Member, IEEE, K.M. Muttaq, Senor Member, IEEE, M. Negnevtsky, Member, IEEE,and G. Ledwch, Senor Member,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationFuzzy Keyword Search over Encrypted Data in Cloud Computing
Fuzzy Keyword Search over Encrypted Data n Cloud Computng Jn L,QanWang, Cong Wang,NngCao,KuRen, and Wenjng Lou Department of ECE, Illnos Insttute of Technology Department of ECE, Worcester Polytechnc Insttute
More informationCompact CCA2-secure Hierarchical Identity-Based Broadcast Encryption for Fuzzy-entity Data Sharing
Compact CCA2-secure Herarchcal Identty-Based Broadcast Encrypton for Fuzzy-entty Data Sharng Weran Lu 1, Janwe Lu 1, Qanhong Wu 1, Bo Qn 2, Davd Naccache 3, and Houda Ferrad 4 1 School of Electronc and
More informationLAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary
chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationProblem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative.
Queston roblem Set 3 a) We are asked how people wll react, f the nterest rate on bonds s negatve. When
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationA Similar Duplicate Data Detection Method Based on Fuzzy Clustering for Topology Formation
Lejang GUO 1, We WANG 2, Fangxn CHEN 1, Xao TANG 1,2, Weang WANG 1 Ar Force Radar Acadey (1), Wuhan Unversty (2) A Slar Duplcate Data Detecton Method Based on Fuzzy Clusterng for Topology Foraton Abstract.
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationThe Load Balancing of Database Allocation in the Cloud
, March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton
More informationSoftware project management with GAs
Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationLaddered Multilevel DC/AC Inverters used in Solar Panel Energy Systems
Proceedngs of the nd Internatonal Conference on Computer Scence and Electroncs Engneerng (ICCSEE 03) Laddered Multlevel DC/AC Inverters used n Solar Panel Energy Systems Fang Ln Luo, Senor Member IEEE
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationAn Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System
201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationPricing Model of Cloud Computing Service with Partial Multihoming
Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More information