On secure and reliable communications in wireless sensor networks: Towards k-connectivity under a random pairwise key predistribution scheme
|
|
- Alicia Underwood
- 8 years ago
- Views:
Transcription
1 O secure ad reliable commuicatios i wireless sesor etworks: Towards k-coectivity uder a radom pairwise key predistributio scheme Faruk Yavuz Dept. of ECE ad CyLab Caregie Mello Uiversity Moffett Field, CA fyavuz@adrew.cmu.edu Ju Zhao Dept. of ECE ad CyLab Caregie Mello Uiversity Pittsburgh, PA juzhao@cmu.edu Osma Yağa Dept. of ECE ad CyLab Caregie Mello Uiversity Moffett Field, CA oyaga@ece.cmu.edu Virgil Gligor Dept. of ECE ad CyLab Caregie Mello Uiversity Pittsburgh, PA gligor@cmu.edu Abstract To be cosidered for a IEEE Jack eil Wolf ISIT Studet Paper Award. We study the secure ad reliable coectivity of wireless sesor etworks. Security is assumed to be esured by the radom pairwise key predistributio scheme of Cha, Perrig, ad Sog, ad ureliable wireless liks are represeted by idepedet o/off chaels. Modelig the etwork by a itersectio of a radom -out graph ad a Erdős-Réyi graph, we preset scalig coditios o the umber of odes, the scheme parameter, ad the probability of a wireless chael beig o such that the resultig graph cotais o odes with degree less tha k with high probability, whe the umber of odes gets large. Results are give i the form of zero-oe laws ad are show to improve the previous results by Yağa ad Makowski o the absece of isolated odes i.e., absece of odes with degree zero. Via simulatios, the established zero-oe laws are show to hold also for the property of k-coectivity; i.e., the property that graph remais coected despite the deletio of ay k 1 odes or edges. eywords: Radom graphs, Coectivity, Zero-oe laws, Wireless sesor etworks. I. INTRODUCTION Wireless sesor etworks WSNs are distributed collectio of small sesor odes that gather security-sesitive data ad cotrol security-critical operatios i a wide rage of idustrial, home ad busiess applicatios [1]. May applicatios require deployig sesor odes i hostile eviromets where a adversary ca eavesdrop sesor commuicatios, ad ca eve capture a umber of sesors ad surreptitiously use them to compromise the etwork. Therefore, cryptographic protectio is required to secure the sesor commuicatio as well as to detect sesor capture ad to revoke the compromised keys. Give the limited commuicatio ad computatioal resources available at each sesor, security is expected to be a key challege i WSNs [2], [3], [4]. Radom key predistributio is oe of the approaches proposed i the literature for addressig security challeges i resource costraied WSNs. The idea of radomly assigig secure keys to the sesor odes prior to etwork deploymet was first itroduced by Escheauer ad Gligor [2]. Followig their origial work, a large umber of key predistributio schemes have bee proposed; see the survey articles [4], [5] ad refereces therei. Here we cosider the radom pairwise key predistributio scheme proposed by Cha et al. i [3]: Before deploymet, each of the sesor odes is paired offlie with distict odes which are radomly selected from amogst all other odes. For each sesor ad ay sesor paired to it, a uique pairwise key is geerated ad stored i their memory modules alog with their ids. Two odes ca the secure a existig wireless commuicatio lik if at least oe of them is paired to the other so that the two odes have at least oe pairwise key i commo. Precise implemetatio details are give i Sectio II. Let H; deote the udirected radom graph o the vertex set {1,..., } where distict odes i ad j are adjacet if they have a pairwise key i commo as described earlier; this radom graph models the radom pairwise predistributio scheme uder full visibility whereby all odes have a wireless lik i betwee. The radom graph H; is kow i the literature o radom graphs as the radom -out graph [6], [7], [8]; several properties of this graph have bee recetly aalyzed by Yağa ad Makowski [9], [10], [11], [12]. Recetly, there has bee a sigificat iterest [13], [14], [15], [16], [17] to drop the full visibility assumptio ad to model ad aalyze radom key predistributio schemes uder more realistic situatios that accout for the possibility that commuicatio liks betwee odes may ot be available This could occur due to the presece of physical barriers betwee odes or because of harsh evirometal coditios severely impairig trasmissio. With this i mid, several authors [14], [15], [16], [17] have started with a simple commuicatio model where wireless liks are represeted by idepedet chaels that are either o with probability p or off with probability 1 p. This suggests a overall modelig framework that is costructed by itersectig the radom - out graph H;, with a Erdős-Réyi ER graph model G; p [6].
2 I this paper, we iitiate a aalysis towards the k-coectivity for the resultig itersectio graph H G;, p. A etwork or graph is said to be k- coected if its coectivity is preserved despite the failure of ay k 1 odes or liks [18]. Therefore, the property of k-coectivity provides a guaratee of etwork reliability agaist the possible failures of sesors or liks due to adversarial attacks or battery depletio; a much eeded property give the key applicatio areas of sesor etworks such as health moitorig, battlefield surveillace, ad evirometal moitorig. Fially, k-coectivity has importat beefits i mobile wireless sesor etworks. For istace, if a etwork is kow to be k-coected, the ay k 1 odes i the etwork are free to move aywhere i the etwork while the rest of the etwork remais at least 1-coected. Our mai result is a zero-oe law for the property that the miimum ode degree of H G;, p is at least k. Namely, we preset scalig coditios o the parameters p ad with respect to, such that the resultig graph cotais o odes with degree less tha k with probability approachig to zero, or oe, respectively, as the umber of odes gets large. The established results already imply the zero-law for the k-coectivity, sice a graph ca ot be k-coected uless all odes have degree at least k. Further, i most if ot all radom graph models i the literature, icludig ER graphs, radom geometric graphs [18], ad radom key graphs [17], the coditios that esure k-coectivity coicide with those esurig miimum ode degree to be at least k. This is ofte established by showig the improbability of a graph beig ot k-coected whe all odes have at least k eighbors. Here, we demostrate this pheomeo via simulatios which idicate that our zero-oe laws hold also for the property of k- coectivity. Fially, our results costitute a improvemet of the previous results by Yağa ad Makowski [19], [14] o the absece of isolated odes i.e., absece of odes with degree zero i H G;, p. A word o the otatio: All statemets ivolvig limits are uderstood with goig to ifiity. I comparig the asymptotic behaviors of the sequeces {a }, {b }, we use a ob, a Ob, a Ωb, ad a Θb, with their meaig i the stadard Ladau otatio. II. MODEL A. The radom pairwise key predistributio scheme We parametrize the pairwise key distributio scheme by two positive itegers ad such that <. There are odes, labelled i 1,...,, with uique ids Id 1,..., Id. Write N {1,... } ad set N i N {i} for each i 1,...,. With ode i we associate a subset Γ,i of odes selected at radom from N i We say that each of the odes i Γ,i is paired to ode i. Thus, for ay subset A N i, we require P [Γ,i A] 1 1 if A 0 otherwise. The selectio of Γ,i is doe uiformly amogst all subsets of N i which are of size ad the rvs Γ,1,..., Γ, are assumed to be mutually idepedet. Oce this offlie radom pairig has bee created, we costruct the key rigs Σ,1,..., Σ,, oe for each ode, as i [12], [10], [14]. I a utshell, key rigs are costructed such that two odes i ad j share a pairwise key that is assiged exclusively to the pair of odes i ad j if at least oe of the evets i Γ,j or j Γ,i take place. I this case ode i ad j ca secure a existig wireless commuicatio lik available to them. B. Radom -out graphs The pairwise key predistributio scheme aturally gives rise to the followig class of radom graphs: With 2, 3,... ad positive iteger <, we say that the distict odes i ad j are -adjacet, writte i j, if ad oly if they have at least oe key i commo i their key rigs, amely i j iff Σ,i Σ,j. 1 Let H; deote the udirected radom graph o the vertex set {1,..., } iduced by the adjacecy otio 1; this correspods to modelig the pairwise distributio scheme uder full visibility. We have P [i j] λ where λ is the lik assigmet probability i H; give by see [10], [12] λ The radom graph H; is kow i the literature o radom graphs as the radom -out graph [6], [7], [8]: To each of the vertices assig exactly arcs to distict vertices that are selected uiformly at radom, ad the igore the orietatio of the arcs. C. Itersectio of radom graphs As metioed earlier, we assume a simple wireless commuicatio model that cosists of idepedet chaels, each of which ca be either o or off. Thus, with p i 0, 1, let {B ij p, 1 i < j } deote i.i.d. {0, 1}-valued rvs with success probability p. The chael betwee odes i ad j is available resp. up with probability p ad uavailable resp. dow with the complemetary probability 1 p. Distict odes i ad j are said to be B-adjacet, writte i B j, if B ij p 1. B-adjacecy defies the stadard Erdős-Réyi ER graph G; p o the vertex set {1,..., } [6]. Obviously, P [i B j] p. The radom graph model studied here is obtaied by itersectig the radom graphs iduced by the pairwise key predistributio scheme, ad by the o-off commuicatio model, respectively. Namely, we cosider the itersectio of H; with the ER graph G; p. I this case, distict odes i ad j are said to be adjacet, writte i j, if ad oly they are both -adjacet ad B-adjacet, amely i j iff Σ,i Σ,j ad B ij p 1. 3
3 The resultig udirected radom graph defied o the vertex set {1,..., } through this otio of adjacecy is deoted H G;, p. The relevace of H G;, p i the cotext of secure WSNs is ow clear. Two odes that are coected by a edge i H G;, p share at least oe cryptographic key ad have a wireless lik available to them, so that they ca establish a secure commuicatio lik. Throughout we assume the collectios of rvs {Γ,1,..., Γ, } ad {B ij p, 1 i < j } to be idepedet, i which case the edge occurrece probability i H G;, p is give by P [i j] P [i j] P [i B j] pλ. 4 III. MAIN RESULT Our mai techical result is give ext. To fix the termiology, we refer to ay mappig : N 0 N 0 as a scalig for radom -out graphs provided it satisfies the atural coditios < for each 1, 2,.... Similarly, we let ay mappig p : N 0 [0, 1] defie a scalig for Erdős-Réyi graphs. To lighte the otatio we ofte group the parameters ad p ito the ordered pair θ, p. Theorem 3.1: Cosider scaligs : N 0 N 0 ad p : N 0 [0, 1] such that lim 2 ad lim sup p < 1. With the sequece γ : N 0 R defied through we have p 1 log1 p p log + k 1 log log + γ, [ ] lim P Mi ode degree of H G; θ is o less tha k 0 if lim γ 1 if lim γ +. The proof of Theorem 3.1 passes through the method of first ad secod momets [8], applied to the radom variable coutig the umber of odes with degree l, with l 0, 1,..., k 1. Although this techique is stadard i the literature, its applicatio to the itersectio graph H G; θ is far from beig straightforward due to itricate depedecies amogst the degrees of odes. Due to space limitatios, we refer the reader to [20] for a proof of Theorem 3.1. The extra coditios eforced by Theorem 3.1 are required for techical reasos; i.e., for the method of momets to be applied successfully to the aforemetioed cout variables. However, we remark that these coditios are mild ad do o preclude their applicatio i realistic WSN scearios. First, the coditio lim sup p < 1 eforces that wireless commuicatio chaels betwee odes do ot become available with probability oe as gets large. The situatio lim sup p 1 is remiiscet of the full visibility case cosidered i [12], ad is ot likely to hold i practice. I fact, as the umber of odes gets large, it may be expected that p goes to zero due to iterferece associated with a large umber of odes commuicatig simultaeously. Secod, the coditio lim 2 will already follow if 2 c for some c < 1. Give that 2 is equal to the mea umber of keys stored per sesor i the pairwise scheme [11], this coditio eeds to hold i ay practical WSN sceario due to limited memory ad computatioal capability of the sesors. I fact, Di Pietro et al. [21] oted that key rig sizes o the order of log are feasible for WSNs. IV. COMMENTS AND DISCUSSION A. Compariso with Erdős-Réyi Graphs For each p i [0, 1] ad 2, 3,..., let G; p deote the Erdős-Réyi graph o the vertex set {1,..., } with edge probability p. It is kow that edge assigmets are mutually idepedet i G; p, whereas they are strogly correlated i H; i that they are egatively associated i the sese of Joag-Dev ad Proscha [22]; see [14] for details. Thus, H; caot be equated with G; p eve whe the parameters p ad are selected so that the edge assigmet probabilities i these two graphs coicide, say λ; p. Therefore, H G; θ caot be equated with a ER graph either, ad the results obtaied here are ot mere cosequeces of classical results for ER graphs. However, some similarities do exist betwee H G; θ ad ER graphs. We start by presetig the followig wellkow zero-oe law for k-coectivity i ER graphs [23]: For ay scalig p : N 0 [0, 1] satisfyig p log + k 1 log log + γ for some γ : N 0 R, it holds that 0 if γ lim P [ G; p is k-coected ] 1 if γ +. The same result also holds for the property that miimum ode degree is at least k. O the other had, the coditio 5 ca be rephrased as p 1 log1 p p log + k 1 log log + γ, with the result 7 uchaged. Sice log1 p p, we get from 2 that p 1 log1 p p p λ Hece, i ER graphs the threshold of k-coectivity, ad of miimum ode degree beig at least k, appears whe the lik probability is compared agaist log + k 1 log log /. I H G; θ, our result shows that the threshold appears whe a quatity that is always larger tha the lik probability p λ is compared agaist log + k 1 log log /. This idicates that H G; θ teds to exhibit the property that all odes have at least k eighbors easier tha ER graphs; 8
4 i.e., this property ca be esured by a smaller lik probability betwee odes which leads to smaller average ode degree. The situatio is more itricate if it holds that lim p 0, whece we have This leads p log1 p p p2 1 + o log1 p p p λ 1 + o1 9 The o1 term i this last expressio ca be writte more precisely as Θp. Thus, i the practically relevat case whe the wireless chaels become weaker as gets large, the threshold for miimum ode degree of H G; θ to be at least k appears whe a quatity that is asymptotically equivalet to lik probability is compared agaist log + k 1 log log /; a situatio that is remiiscet of the ER graphs. A similar observatio was made i [14] for the threshold of 1-coectivity ad absece of isolated odes. Nevertheless, it is worth metioig that eve uder lim p 0, the zero-oe laws for the miimum ode degree beig at least k i ER graphs ad H G; θ are ot exactly aalogous. This is because, the term o1 i 9 may chage the behavior of the sequece γ appearig i 8 sice γ will be give by γ p λ 1 + o1 log k 1 log log. Replacig o1 with the more precise term Θp, ad otig that that λ Θ /, we coclude that the two results will be exactly aalogous if ad oly if p 2 is bouded; i.e., it does ot approach to ifiity as gets large. B. Compariso with results by Yağa ad Makowski for k 1 We ow compare our results with those by Yağa ad Makowski [14] who established zero-oe laws for 1- coectivity, ad for the absece of isolated odes i.e., odes with degree zero i H G; θ. Here, we preset their result i a slightly differet form: Cosider scaligs : N 0 N 0 ad p : N 0 0, 1 such that p 2 1 log1 p p 2 c log, 10 for some c > 0. Assume also that lim p p exists. The, we have lim P [H G; θ cotais o isolated odes] lim P [H G; θ is coected] 0 if c < if c > 1. To better compare this result with ours, we set k 1 ad rewrite our scalig coditio 5 as p 2 1 log1 p p 1 log + γ uder which Theorem 3.1 gives [ ] lim P H G; θ 0 if γ has o isolated odes 1 if γ +. We ow argue how our result o absece of isolated odes costitutes a improvemet o the result of [14]. The assumptio that limit lim p p exists was the key i establishig 11 uder 10 ad our results i this paper explais why. First, it is clear that if p 0, the 1 log1 p p lim 1 log1 p p 1 lim so that the left had sides of 12 ad 10 are asymptotically equivalet. Next, if p > 0, the it follows that Olog see [14] uder 10. This agai yields the asymptotical equivalece of the left had sides of 12 ad 10. Therefore, uder the assumptio that p has a limit, a scalig coditio that is equivalet to 10 is give by p 2 1 log1 p p c log, 13 with the results 11 uchaged. Comparig 12 with 13, we see that our absece of isolated odes result is more fie-graied tha the oe give i [14]. I a utshell, the scalig coditio 13 eforced i [14] requires a deviatio of γ ±Ωlog from the threshold log to get the zero-oe law, whereas i our formulatio 12, it suffices to have a ubouded deviatio; e.g., eve γ ± log log log will do. Put differetly, we cover the case of c 1 i 11 uder 13 ad show that H G; θ could be almost surely free of or ot free of isolated odes, depedig o the limit of γ ; i fact, if 13 holds with c > 1, we see from Theorem 3.1 that H G; θ is ot oly free of isolated odes but also all of its odes will have degree larger tha k for all k 1, 2,.... C. Numerical results ad a cojecture We ow preset some umerical results to check the validity of Theorem 3.1, particularly i the o-asymptotic regime, i.e., whe parameter values are set i accordace with realworld wireless sesor etwork scearios. I all experimets, we fix the umber of odes at The for a give parameter pair, p, we geerate 200 idepedet samples of the graph H G;, p ad cout the umber of times out of a possible 200 that the obtaied graphs have miimum ode degree o less tha k ad ii are k-coected, for k 1, 2,.... Dividig the couts by 200, we obtai the empirical probabilities for the evets of iterest. Due to space limitatios, we oly provide a small subset of the umerical results we have obtaied; see [20] for a complete discussio. I Figure 1, we depict the resultig empirical probability that each ode i H G;, p has degree at least 2 as a fuctio of for various p values. For each p value, we also show the critical threshold of havig miimum degree at least 2 asserted by Theorem 3.1 viz. 5 by a
5 Pr{H G;θ has mi. degree 2} p 0.3 p 0.5 p 0.7 p Fig. 1. Probability that all odes i H G;, p have degree at least 2 as a fuctio of for p 0.3, p 0.5, p 0.7, ad p 0.9 with Pr{H G;θ is 2-coected} p 0.3 p 0.5 p 0.7 p Fig. 2. Probability that all odes i H G;, p is 2-coected as a fuctio of for p 0.3, p 0.5, p 0.7, ad p 0.9 with Its resemblace with Figure 2 suggests that a aalog of Theorem 3.1 holds also for the property of k-coectivity. vertical dashed lie. Namely, the vertical dashed lies stad for the miimum iteger value of that satisfies log1 p p 1 > log + log log 14 p Eve with 2000, we ca observe the threshold behavior suggested by Theorem 3.1; i.e., the probability that H G;, p has miimum ode degree at least k trasitios from zero to oe as varies very slightly from a certai value. For larger, we would expect the curves to look more like a shifted uit step fuctio with a jump discotiuity i.e., a threshold at aroud the value that gives P [mi ode degree is at least k] 1 2 i the curret plots. Those values match well the vertical dashed lies suggested by Theorem 3.1, leadig to the coclusio that umerical experimets are i good agreemet with our theoretical results. Figure 2 is obtaied i the same way with Figure 1, this time for the probability that H G;, p is 2-coected. It is clear that two figures show a strog similarity with curves correspodig to each p value beig almost idistiguishable. I fact, we ra umerous experimets with differet parameter pairs, ad each time observed that the empirical probabilities of H G;, p beig k-coected ad havig miimum ode degree at least k are almost equal. This suggests that i H G;, p as well, the properties of k-coectivity ad the miimum ode degree beig at least k are asymptotically equivalet, leadig us to cast the followig cojecture. Cojecture 4.1: Cosider scaligs : N 0 N 0 ad p : N 0 [0, 1] such that lim 2 ad lim sup p < 1, ad a sequece γ : N 0 R defied through 5. The, lim P [H G; θ is k-coected] REFERENCES 0 if γ 1 if γ +. [1] I. F. Akyildiz, W. Su, Y. Sakarasubramaiam, ad E. Cayirci, Wireless sesor etworks: a survey, Computer etworks, vol. 38, [2] L. Escheauer ad V. Gligor, A key-maagemet scheme for distributed sesor etworks, i Proc. of ACM CCS, [3] H. Cha, A. Perrig, ad D. Sog, Radom key predistributio schemes for sesor etworks, i Proc. of IEEE S&P, [4] Y. Wag, G. Attebury, ad B. Ramamurthy, A survey of security issues i wireless sesor etworks, Commuicatios Surveys Tutorials, IEEE, vol. 8, o. 2, pp. 2 23, [5] Y. Xiao ad V.. Rayi ad B. Su ad X. Du ad F. Hu ad M. Galloway, A survey of key maagemet schemes i wireless sesor etworks, Computer Commuicatios, vol. 30, pp , [6] B. Bollobás, Radom graphs. Cambridge uiversity press, [7] T. I. Feer ad A. M. Frieze, O the coectivity of radom m- orietable graphs ad digraphs, Combiatorica, vol. 2, o. 4, [8] S. Jaso, T. Łuczak, ad A. Ruciński, Radom graphs. 2000, Wiley Itersci. Ser. Discrete Math. Optim, [9] O. Yağa ad A. M. Makowski, O the gradual deploymet of radom pairwise key distributio schemes, i Proc. of WiOpt, [10], Coectivity results for sesor etworks uder a radom pairwise key predistributio scheme, i Iformatio Theory Proceedigs ISIT, 2012 IEEE Iteratioal Symposium o, 2012, pp [11], O the scalability of the radom pairwise key predistributio scheme: Gradual deploymet ad key rig sizes, Performace Evaluatio, vol. 70, o. 78, pp , [12], O the coectivity of sesor etworks uder radom pairwise key predistributio, IEEE Trasactios o Iformatio Theory, vol. 59, o. 9, pp , [13] B. risha, A. Gaesh, ad D. Majuath, O coectivity thresholds i superpositio of radom key graphs o radom geometric graphs, i Proc. of IEEE ISIT, 2013, pp [14] O. Yağa ad A. M. Makowski, Modelig the pairwise key predistributio scheme i the presece of ureliable liks, IEEE Trasactios o Iformatio Theory, vol. 59, o. 3, pp , [15] O. Yağa, Performace of the Escheauer-Gligor key distributio scheme uder a o/off chael, IEEE Trasactios o Iformatio Theory, vol. 58, o. 6, pp , Jue [16] J. Zhao, O. Yağa, ad V. Gligor, Secure k-coectivity i wireless sesor etworks uder a o/off chael model, i Proc. of IEEE Itl. Symp. Ifo. Theory ISIT, 2013, pp [17], k-coectivity i secure wireless sesor etworks with physical lik costraits - the o/off chael model, Arxiv, Jue 2012, submitted to IEEE Trasactios o Iformatio Theory. Available olie at arxiv: [cs.it]. [18] M. D. Perose, Radom Geometric Graphs. Oxford Uiversity Press, Jul [19] O. Yağa ad A. M. Makowski, Desigig securely coected wireless sesor etworks i the presece of ureliable liks, i Commuicatios ICC, 2011 IEEE Iteratioal Coferece o, 2011, pp [20] F. Yavuz, J. Zhao, O. Yağa, ad V. Gligor, O the k-coectivity of the radom graph iduced by a pairwise key predistributio scheme with ureliable liks, to be submitted. [Olie]. Available: oyaga/jourals/k co PER.pdf [21] R. Di Pietro, L. V. Macii, A. Mei, A. Pacoesi, ad J. Radhakrisha, Redoubtable sesor etworks, ACM Tras. If. Syst. Secur., vol. 11, o. 3, pp. 13:1 13:22, March [22]. Joag-Dev ad F. Proscha, Negative associatio of radom variables with applicatios, The Aals of Statistics, o. 1, pp , [23] P. Erdős ad A. Réyi, O the stregth of coectedess of radom graphs, Acta Math. Acad. Sci. Hugar, pp , 1961.
Connectivity in Secure Wireless Sensor Networks under Transmission Constraints
Coectivity i Secure Wireless Sesor Networks uder Trasmissio Costraits Ju Zhao Osma Yaga ad Virgil Gligor March 3 04 CMU-CyLab-4-003 CyLab Caregie Mello Uiversity Pittsburgh PA 53 Coectivity i Secure Wireless
More informationDepartment of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
More informationAsymptotic Growth of Functions
CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll
More informationIn nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
More informationOn the Capacity of Hybrid Wireless Networks
O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,
More informationDiscrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13
EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may
More informationTaking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
More informationIrreducible polynomials with consecutive zero coefficients
Irreducible polyomials with cosecutive zero coefficiets Theodoulos Garefalakis Departmet of Mathematics, Uiversity of Crete, 71409 Heraklio, Greece Abstract Let q be a prime power. We cosider the problem
More information5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
More informationChapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity
More informationOutput Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
More informationVladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
More informationI. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
More informationWeek 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
More informationUniversal coding for classes of sources
Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric
More informationCapacity of Wireless Networks with Heterogeneous Traffic
Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata
More informationRecovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
More informationModified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
More informationSECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
More informationOn k-connectivity and Minimum Vertex Degree in Random s-intersection Graphs
O k-coectivity ad Miimum Vertex Degree i Radom -Iterectio Graph Ju Zhao Oma Yağa Virgil Gligor CyLab ad Dept. of ECE Caregie Mello Uiverity Email: {juzhao, oyaga, virgil}@adrew.cmu.edu Abtract Radom -iterectio
More informationProperties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
More information1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
More informationLecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
More informationIncremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
More informationChapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
More informationTHE ABRACADABRA PROBLEM
THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected
More informationTradigms of Astundithi and Toyota
Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore
More informationCOMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
More informationCenter, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
More informationLECTURE 13: Cross-validation
LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M
More informationChapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
More informationwhere: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
More informationCONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION
www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha
More informationNormal Distribution.
Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued
More informationLecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)
18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the
More informationTHE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction
THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,
More informationDesigning Incentives for Online Question and Answer Forums
Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied
More informationSequences and Series
CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their
More informationINVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
More informationA probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
More informationAmendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
More informationG r a d e. 2 M a t h e M a t i c s. statistics and Probability
G r a d e 2 M a t h e M a t i c s statistics ad Probability Grade 2: Statistics (Data Aalysis) (2.SP.1, 2.SP.2) edurig uderstadigs: data ca be collected ad orgaized i a variety of ways. data ca be used
More informationThe analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
More informationTHE HEIGHT OF q-binary SEARCH TREES
THE HEIGHT OF q-binary SEARCH TREES MICHAEL DRMOTA AND HELMUT PRODINGER Abstract. q biary search trees are obtaied from words, equipped with the geometric distributio istead of permutatios. The average
More informationProject Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
More informationPSYCHOLOGICAL STATISTICS
UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics
More informationODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
More informationMeasures of Spread and Boxplots Discrete Math, Section 9.4
Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,
More informationHypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
More informationPROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
More informationStatistical inference: example 1. Inferential Statistics
Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either
More information.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
More information3 Basic Definitions of Probability Theory
3 Basic Defiitios of Probability Theory 3defprob.tex: Feb 10, 2003 Classical probability Frequecy probability axiomatic probability Historical developemet: Classical Frequecy Axiomatic The Axiomatic defiitio
More informationSoving Recurrence Relations
Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree
More informationChapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:
Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries
More informationConfidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
More informationData Analysis and Statistical Behaviors of Stock Market Fluctuations
44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:
More informationThe Stable Marriage Problem
The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,
More informationHypergeometric Distributions
7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you
More informationDomain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
More informationCHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
More informationConvexity, Inequalities, and Norms
Covexity, Iequalities, ad Norms Covex Fuctios You are probably familiar with the otio of cocavity of fuctios. Give a twicedifferetiable fuctio ϕ: R R, We say that ϕ is covex (or cocave up) if ϕ (x) 0 for
More informationRamsey-type theorems with forbidden subgraphs
Ramsey-type theorems with forbidde subgraphs Noga Alo Jáos Pach József Solymosi Abstract A graph is called H-free if it cotais o iduced copy of H. We discuss the followig questio raised by Erdős ad Hajal.
More informationHow To Solve The Homewor Problem Beautifully
Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log
More informationReliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
More informationYour organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
More information0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5
Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.
More informationAnalyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
More informationOverview of some probability distributions.
Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability
More informationThe Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks
The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu
More informationA Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length
Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece
More informationRunning Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
More informationMARTINGALES AND A BASIC APPLICATION
MARTINGALES AND A BASIC APPLICATION TURNER SMITH Abstract. This paper will develop the measure-theoretic approach to probability i order to preset the defiitio of martigales. From there we will apply this
More informationWHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER?
WHEN IS THE (CO)SINE OF A RATIONAL ANGLE EQUAL TO A RATIONAL NUMBER? JÖRG JAHNEL 1. My Motivatio Some Sort of a Itroductio Last term I tought Topological Groups at the Göttige Georg August Uiversity. This
More informationA Recursive Formula for Moments of a Binomial Distribution
A Recursive Formula for Momets of a Biomial Distributio Árpád Béyi beyi@mathumassedu, Uiversity of Massachusetts, Amherst, MA 01003 ad Saverio M Maago smmaago@psavymil Naval Postgraduate School, Moterey,
More informationPerfect Packing Theorems and the Average-Case Behavior of Optimal and Online Bin Packing
SIAM REVIEW Vol. 44, No. 1, pp. 95 108 c 2002 Society for Idustrial ad Applied Mathematics Perfect Packig Theorems ad the Average-Case Behavior of Optimal ad Olie Bi Packig E. G. Coffma, Jr. C. Courcoubetis
More informationLesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
More informationLecture 4: Cauchy sequences, Bolzano-Weierstrass, and the Squeeze theorem
Lecture 4: Cauchy sequeces, Bolzao-Weierstrass, ad the Squeeze theorem The purpose of this lecture is more modest tha the previous oes. It is to state certai coditios uder which we are guarateed that limits
More informationExample 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).
BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly
More informationCS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations
CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad
More informationExploratory Data Analysis
1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios
More informationSubject CT5 Contingencies Core Technical Syllabus
Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value
More informationTrackless online algorithms for the server problem
Iformatio Processig Letters 74 (2000) 73 79 Trackless olie algorithms for the server problem Wolfgag W. Bei,LawreceL.Larmore 1 Departmet of Computer Sciece, Uiversity of Nevada, Las Vegas, NV 89154, USA
More informationAnnuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.
Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory
More informationPlug-in martingales for testing exchangeability on-line
Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk
More informationChair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
More informationEntropy of bi-capacities
Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace iva.kojadiovic@uiv-ates.fr Jea-Luc Marichal Applied Mathematics
More informationINVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
More informationNATIONAL SENIOR CERTIFICATE GRADE 12
NATIONAL SENIOR CERTIFICATE GRADE MATHEMATICS P EXEMPLAR 04 MARKS: 50 TIME: 3 hours This questio paper cosists of 8 pages ad iformatio sheet. Please tur over Mathematics/P DBE/04 NSC Grade Eemplar INSTRUCTIONS
More informationPresent Values, Investment Returns and Discount Rates
Preset Values, Ivestmet Returs ad Discout Rates Dimitry Midli, ASA, MAAA, PhD Presidet CDI Advisors LLC dmidli@cdiadvisors.com May 2, 203 Copyright 20, CDI Advisors LLC The cocept of preset value lies
More informationChapter 5: Inner Product Spaces
Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples
More information*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
More information1. C. The formula for the confidence interval for a population mean is: x t, which was
s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value
More informationLesson 15 ANOVA (analysis of variance)
Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi
More informationDomain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
More informationMaximum Likelihood Estimators.
Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio
More informationMatrix Model of Trust Management in P2P Networks
Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet
More informationAn Efficient Polynomial Approximation of the Normal Distribution Function & Its Inverse Function
A Efficiet Polyomial Approximatio of the Normal Distributio Fuctio & Its Iverse Fuctio Wisto A. Richards, 1 Robi Atoie, * 1 Asho Sahai, ad 3 M. Raghuadh Acharya 1 Departmet of Mathematics & Computer Sciece;
More informationCS103X: Discrete Structures Homework 4 Solutions
CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least
More informationThe following example will help us understand The Sampling Distribution of the Mean. C1 C2 C3 C4 C5 50 miles 84 miles 38 miles 120 miles 48 miles
The followig eample will help us uderstad The Samplig Distributio of the Mea Review: The populatio is the etire collectio of all idividuals or objects of iterest The sample is the portio of the populatio
More information