RequIn, a tool for fast web traffic inference

Size: px
Start display at page:

Download "RequIn, a tool for fast web traffic inference"

Transcription

1 RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked attacks grow n complexty and more and more Internet users get broadband Internet access, applcaton level traffc analyss n operator networks becomes more dffcult. In ths paper, we descrbe a tool allowng web communcatons to be analyzed n such envronment. Instead of relyng on the extracton of applcaton level parameters and pattern matchng algorthms that are usually consdered bottlenecks for such actvty, we look at smple network and transport level parameters to nfer what happens at the applcaton level. Our approach provdes the ablty to perform a trade-off between analyss speed and precson that n our opnon could be useful for some traffc analyss applcatons lke denal of servce attacks detecton. Keywords-component; Montorng, HTT, performance, DDoS. I. INTRODUCTION Over the last ten years, a part of the securty functons that were prevously mplemented wthn companes has been delegated or outsourced to external organzatons. The appearance of new threats (e.g. worms, DDoS attacks) has led network operators to provde ntruson detecton servces to ther customers. In ths paper we consder one of the challenges mpled by ths new actvty; the ablty to montor user communcatons wthn operator networks. Ths task can be consdered as challengng for several reasons: Operators network nternal devces usually have basc traffc analyss abltes. Most devces are currently lmted to operatons appled to packet headers through capture, aggregaton, flterng, samplng and countng operatons. Operators network nternal lnks usually carry large amounts of traffc. As a result the tme that a montor can devote to each user request s usually very short (a few hundreds of nanoseconds). As a result complex operatons such as the algorthms employed n endhosts montorng systems are usually unusable. For example the snort ntruson detecton tool uses pattern matchng algorthm for whch the best known soluton n term of temporal complexty [2] s n O(n+m) where n s the sze of the strng to be searched n and m the sze of the pattern. Such algorthms would clearly be unable to handle strngs longer than a few words n very hgh speed envronments. Operator networks are usually constraned n term of ntroducng new mechansms or tools by two parameters one beng the relablty of ther network, the other one beng the management cost. As a result new technques should as far as possble take advantage of exstng montorng mechansms n order to lmt the modfcaton to exstng elements. In ths paper we focus on HTT communcatons. Accordng to ISs [3], HTT traffc consttutes between 35 and 50% of the Internet traffc. The goal of ths paper s to present a tool that allows such communcatons to be analyzed n the mddle of a network whle complyng wth the aforementoned lmtatons. We frst ntroduce the measurement nformaton our analyss s based on. Secton IV shows how such nformaton can later be used to deduce users requests. Secton V presents RequIn, an mplementaton of our technques as an extenson to Iflter on FreeBSD. We then test our analyss technque and mplementaton by consderng models and traffcs orgnatng from our web ste. II. MEASUREMENT INFORMATION Our goal s to permt the montorng of web communcatons when applcaton level nformaton cannot be used. In order to do so our plan s to use network and transport level nformaton n order to nfer applcaton level behavors. In ths secton we frst ntroduce network and transport level measurement capabltes. A. The HTT rotocol HTT exchanges can be vewed at several levels. At the lowest level, the HTT protocol s based on a request-response protocol where each request attempts to perform an HTT operaton on an obect at the server. We later call ths level mcro-sesson level. Informaton n HTT. messages [4] s organzed nto nformaton elements called headers. Although HTT. defnes more than 40 dfferent headers, requests and responses usually only use a few them. Requests usually nclude some of the followng headers: The verson of the protocol, a method ndcatng the acton to be performed, a URI ndcatng the obect the acton s to be performed on, a destnaton dentfyng the targeted web server, the date at whch the request was performed... Ths work s funded through European Commsson IST F6 DIADEM FIREWALL and GET DDOS proects.

2 Smlarly, a response usually ncludes smlar headers (verson, encodng, date, server) and some specfc headers lke a status ndcatng the result of the request, the content length or nformaton targetng caches (expraton date, cache drectves). B. Measurement Informaton Selecton As mentoned earler, measurement operatons am at understandng applcaton level operatons through the analyss of network and transport level nformaton. Although the applcaton level protocol has an mpact on ths nformaton, ths mpact also depends on ntermedate protocols. Addtonally some applcaton level parameters mght be more dffcult to nfer than others. As a result a frst step s to try and map applcaton level parameters to transport and network level parameters. The strength of ths mappng s later examned n the followng sectons. arameter Method URI Source Destnaton Tme/Date Compress. Cachng Status TABLE I. ARAMETERS MAING. Network/Transport level parameter Request data sze, Response data sze Response data sze Source I address, ort Destnaton I address, ort External: Tme/Date External: Server confguraton Response data sze. Response data sze. As ndcated n table I, szes are expected to be a sgnfcant source nformaton n order to nfer several applcaton level parameters. More specfcally our assumpton s that obect sze and obect dentfers are closely connected and that obect szes and transport/network level measured szes are also connected. Whle ths last relaton s obvously true wth HTT.0 where a connecton s used for each obect, HTT. uses several mprovements that can render ths relaton weaker. C. HTT/TC Relatonshp HTT. [4] provdes the ablty for web clents and servers to multplex several HTT request-responses exchanges over a sngle TC connecton. Among persstent connectons we can also dstngush connectons usng ppelned requests from regular connectons. pelned connectons are used by the clent to perform several requests wthout watng for an answer from the server. Ths ablty s however usually lmted by the structure of html obects where mported obects can only be requested after the html document lnkng to them s receved by the clent. Therefore n connectons, request-response sessons can be dstngushed at the network level by ether lookng at: Connectons set-up and endng n the case of non persstent connectons (whether ppelned or not). Request-Response sesson patterns [6] n the case of non-ppelned persstent connectons. These patterns can be found at the network level by consderng TC sequence numbers evolutons. As the sequence number from the clent only ncreases when a new requests s sent to the server, we can set the begnnng of each new sesson when a clent sequence number ncrease occurs. Snce several requests cannot be served smultaneously over the same connecton ths also represents the end of the prevous sesson. Request-Response sesson patterns n the case of persstent ppelned connectons. In the case of ppelned requests, only the frst request-response sesson can be dstngushed from other exchanges. The next sesson may nclude one or several requestresponse sessons. As a result ppelned, persstent connectons can make the relaton between Network/Transport level nformaton and applcaton level nformaton so weak that t can hardly be used. As a result an nterestng queston s whether ppelned connectons are supported n the real lfe. Reference [5] shows that most browsers (MS IE) are not able to use ppelned connectons. Moreover browsers (Frefox, Netscape) that do support ppelnng are usually confgured to avod usng t. Beng able to dstngush mcro-sessons allows us to measure the amount of data transported by TC for a request or a response by lookng at TC sequence number evoluton durng a mcro-sesson. III. METHOD AND OBJECTS SIZE INFERENCE A mentoned earler, our assumpton s that obects szes can be nferred from network or transport level measurements. As a result beng able to perform that operaton as correctly as possble s crtcal to our scheme. Several factors lke HTT headers can play a role n makng ths process more dffcult. Our assumpton s that the sze of HTT headers can take a lmted number of values. For a gven server these values depend on the server confguraton. A. Response type and method nference Fg. provdes the relaton between header szes, types of response and total szes n the case of our web server. These values where obtaned by capturng responses packets from the server over 24 hours. Sx types of responses (dentfed by code numbers) were captured. Fg. shows that 200 ( Ok ) responses can be dstngushed from other responses by lookng at the total sze (total sze > 570 bytes). As show n fg., some 200 responses have a sze that colldes wth other types of responses. However obects carred by these requests consttute less than % of exstng obects. 304 ("Not modfed") responses can also be dstngushed from other responses by lookng at the total sze (total sze <250). Other responses cannot be dstngushed as they carry obects whose sze can vary wdely. Addtonally, our tests showed that two types of HTT headers (and thus two headers szes) were found n transactons wth our server headers for non persstent connectons as well as headers for persstent connectons whch ncluded addtonal headers wth a fxed sze.

3 Sze (bytes) Header Sze Response Type Total Sze Fgure. Response Type/Sze Relatonshp. As a result knowng whether a connecton s persstent s suffcent to deduce the nfluence of the persstence on the HTT header sze. Ths knowledge can be obtaned usng the sesson delmtaton scheme descrbed n secton II. Non persstent connectons are dstngushed by lookng for multple connectons establshment-teardown over short perods of tme. table II provdes the relaton between response sze and response codes for persstent connectons. TABLE II. RESONSE CLASSIFICATION USING RESONSE SIZE (RS). Result Response Sze 200 RS > >RS> <RS <250 30, 400, 403, <RS<570 Usng a smlar methodology, we defne a set of classfcaton crteron n order to nfer the method used n HTT requests. However, we found that determnng the methods type usng solely the response sze could not be performed effcently. In order to do so, we use the combnaton of request and response szes. B. Obect Sze Inference Fg. shows that 200 responses can carry HTT headers whose szes are not fxed. As a result usng an average HTT header sze value to estmate obects sze n the case of GET requests can lead us to some errors. By lookng more closely at headers felds we can classfy them accordng to ther behavor: Some headers never change (e.g. response code, server dentfer; accept range, ). Some header values change but have a fxed sze (e.g. last modfed, date and Etag). Some header values change dependng on the assocated obect (e.g. content type and length). As a result for a gven obect, the response sze should reman constant. Ths means that by keepng the relaton between response szes and obect szes, we can get an exact estmate of obects szes. opular HTT servers support obects compresson pror to sendng them to the clent. Ths can cause a dfference between the number of bytes measured n the network and the sze of the obect. The compresson opton s used when an approprate confguraton s performed on the server sde and when the clent supports compresson. However as most clents support compresson, knowng f compresson s used s only a matter of knowng f the server s confgured to use t. In ths case HTT servers provde the ablty to log both compressed and orgnal szes for each requested obect. The nference process n the case of compressed obect therefore remans the same. IV. URI INFERENCE Our assumpton for URI nference s that network and transport level measurement parameters can be used to nfer obects dentfers for GET requests: Each gven obect has a sngle sze. As a result knowng an URI can help us explanng obects szes and recprocally. Users orgnatng from dfferent locatons have dfferent nterests. For example local students are usually more nterested n schedules and courses related nformaton whle users connectng from remote research nsttutons are more nterested n research related obects. For the same reasons people resdng n dfferent tmezones use dfferent parts of the server. In order to understand the relatons between measurement parameters, we use access logs avalable on web servers. These logs are usually made of a set of entres, each of them descrbng an acton performed on the server. Because each entry lnks I addresses, tme and date nformaton, obect szes and obect dentfers, we can use log entres n order to buld a model that wll later be used to nfer obects dentfers when provded other parameter values. A. Inference Model The model we selected to perform nference operatons s a Bayesan network. Bayesan networks are graphcal models that can be used to represent causal relatonshps between varables. A Bayesan network s usually defned as: An acyclc drected graph G, G ( V, E) =, where V s a set of nodes and E a set of vertexes. A fnte probablty set ( Ω Ζ, Ρ),. A set of varables defned on ( Ω Ζ, Ρ), such as: n ( V, V 2,, V n ) = ( V C ( V )) = Where C ( V ), s the set of causes for V n the graph. The nference n a causal network conssts n propagatng one or more unquestonable nformaton wthn the network, n order to deduce how belefs concernng the other nodes are modfed.

4 wrte: If node If node s located downstream from node = s a drect descendant of s over. In the other case we can break up reach a drect descendant of., we can, the computaton untl we If node s located upstream from node t s necessary to propagate the nformaton startng from the begnnng of the chan, to know the uncondtonal probablty for each node ( k ), ( k ). In order to do so, we can use the property of nverson of the condtonal probablty: + = + ( ) ( ) As wth the downward propagaton, f s a drect ascendant for the computaton stops here. In the other case + we can perform the same operaton on ascendants. + B. Varables Selecton In order to obtan an effcent model, we frst performed some aggregaton on varables. I addresses were aggregated nto country codes. Seconds, mnutes and hours nformaton was aggregated nto a sngle hour varable. Day of the week, month, year nformaton was aggregated nto a sngle day of the week varable. As the cost of nference n a Bayesan network ncreases exponentally wth the number of varables n the network, t s essental to lmt that number. In order to do so, we evaluate the ablty for each parameter (sze, country, tme and date) to explan obect dentfers. For each couple of varables (URI,), we do so by computng (URI ) and comparng t wth (URI).() by computng: V. IMLEMENTATION AND TESTS A traffc analyzer was mplemented as an extenson to IFlter [7]. The HTT sesson handlng functon s mplemented as a part of the TC state mantenance functon. Ths functon extends the TC connectons data structures by allowng multple HTT sessons to coexst wthn a TC connecton. Sessons are delmted as specfed n secton II and specfed usng the IFlter flterng polcy. When a sesson ends, the correspondng nformaton (Source I address and port, Destnaton I address and port, tmestamps, number of TC bytes transported n both drectons, Number of packets and bytes transported, type of connecton) s handed to the kernel syslog part. Ths nformaton s later exported to the user space and retreved by RequIn. RequIn s frst used to transform tmestamps nto tme and date values as well as I addresses nto country codes. To do so we use a statc I address database for performance reasons. When started, RequIn frst uses logs from the server to montor n order to buld the correspondng Bayesan network and method-response codes classes. When such models are bult, classfcaton and nference models can be used to nfer users' actons. A. Valdaton Tests Our valdaton tests were performed usng our departmental web server. Ths server runs wth Apache.3 and ncludes roughly 5k obects, most of them beng statc pages and receves 7k requests a day. In order to perform consstent tests over a long perod of tme, a copy of ths server was made on a smlar computer. Ths copy was later used for the tests. In order to check that our server dd not have a structure that would have tanted our tests, we performed a comparson between requests szes to our server and the ones usually found on the nternet [6]. Fg. 3 shows both cumulatve dstrbuton functons. Szes smaller than 500 bytes have been gnored snce header szes dstrbuton s unknown n [6]. Overall there s lttle dfference between the two dstrbutons except n the [0 5 ;0 6 ] range where the dfference should not have a large mpact on our scheme. I ( URI, ) N ([ ( URI ) ( URI ) ( )]) = = The rankng between I(URI,) values lead us to the smple Bayesan network presented n fg. 2. N Identfer Obect Sze Country Code Fgure 2. Resultng Bayesan Network. Fgure 3. Responses szes cumulatve dstrbuton. Usng the model defned n secton IV, we bult a Bayesan network for ths web server usng a 309k entres log fle gathered over 43 days from the orgnal server. In order to test

5 the ablty of the model to predct future requests, we frst nvestgated the nfluence of tme on the estmaton accuracy. Fg. 4 provdes the evoluton of the correct estmate rate over three weeks when usng a three weeks log to buld the model. As shown n fg. 4, the percentage of correct estmates remans around 75% durng roughly 0 days (records to 70k). It then slowly falls to 7% over the next 2 days as new obects are stored n the server. redcton accuracy 0,76 0,75 0,74 0,73 0,72 0,7 0,7 0, Entry# (n thousands) Fgure 4. % of correct estmates over tme. The valdaton of the method and response code nference methods were performed usng a smlar process. Estmaton results are provded n table III. TABLE III. Estmated parameter Method 95 Operaton result 96 RESULT AND METHOD INFERENCE. % correct estmaton Ths frst estmaton does not take nto account the perturbaton that mght be ntroduced by the measurement part of RequIn. In order to valdate the whole software we generated sequental requests for each obect dentfer found n the full log fle. Requests were analyzed by RequIn whch produced the nferred user actons. These actons were later compared to orgnal requests. Results are provded n table IV. Ths test s however based by two parameters: The nference part s unable to take advantage of the country code nformaton. Ths should decrease the accuracy of the nference. The nference process s not affected by agng as the server confguraton s statc. Ths should ncrease the accuracy of the nference. Gven the varaton of accuracy over tme (fg. 4) we however beleve that ths last parameter should have a small effect over the frst ten days. Consequently we expect to get slghtly better results wth real lfe traffc. TABLE IV. Scenaro URI 74 Method 90 Operaton result 94 VALIDATION OF WHOLE SOFTWARE. % correct estmaton B. erformance Tests RequIn was tested on FreeBSD 5.2 on a 2.4Ghz entum eon processor wth a 52KBytes cache. Durng our tests we benchmarked several aspects of the nference process ncludng the tme requred to buld the models, the sze of the models and the tme requred to nfer a request once models are bult. For the test we used an access log fle ncludng 77k entres to buld the nference model. We then used (I address, obect sze) couples from a 232k entres log fle to perform the performance test. We performed 50 seres of tests and averaged the results. TABLE V. arameter Tme to buld the models Sze of the model Tme per request ERFORMANCE RESULTS. 4s.5 Mbytes 0.9us Value These results (table V) show that our nference process, when used ndependently from the request-response measurement mechansm should be able to analyze roughly.m requests per second. Assumng an average Internet HTT traffc ths would allow us to treat a 20Gb/s full duplex lnk. VI. CONCLUSION In ths paper, we ntroduce a new technque to analyze traffc between clents and web-servers. Unlke exstng analyss technques, ths proposal provdes the ablty to trade some accuracy (n term of what nformaton can be retreved and the precson of such nformaton) aganst an ncreased analyss speed. We thnk that such analyss speed mght be useful aganst some threats lke denal of servce attacks where speed s the maor concern. Ths would allow the usage of applcaton level resources to be controlled at the network level. Although our technque s not applcable to every web server (HTT servers that are large or contan mostly dynamc content) our feelng s that t would work for a large proporton of exstng servers makng t useful n practce. We beleve our technque could be further mproved by lookng at HTT communcatons at levels other than the mcro-sesson level. We are currently workng DDoS detecton methods based on the nformaton nferred by RequIn. REFERENCES [] H. Nelsen et al.. Network erformance Effects of HTT/. CSS, and NG. In roceedngs of SIGCOMM 997, August-September 997. [2] G. Navarro and M. Raffnot. Flexble attern Matchng n Strngs. Cambrdge Unv. ress, [3] Sprnt I Montorng proect, avalable at: pmon.sprnt.com/, [4] R. Feldng and al. HTT., RFC 266. Internet Engneerng Task Force, June 999. [5] Balachander Krshnamurthy, Martn Arltt, RO-COW: rotocol Complance on the Web, A Longtudnal Study, USITS '0, March [6] F. Donelson Smth, F. Hernandez, K. Jeffay, and D. Ott, What TC/I protocol headers can Tell Us About the Web, In proceedngs of ACM SIGMETRICS 200, June 200. [7] Darren Reed, IFlter, avalable at coombs.anu.edu.au/~avalon/, 2004.

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event.

For example, you might want to capture security group membership changes. A quick web search may lead you to the 632 event. Audtng Wndows & Actve Drectory Changes va Wndows Event Logs Ths document takes a lghtweght look at the steps and consderatons nvolved n settng up Wndows and/or Actve Drectory event log audtng. Settng up

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation

Exhaustive Regression. An Exploration of Regression-Based Data Mining Techniques Using Super Computation Exhaustve Regresson An Exploraton of Regresson-Based Data Mnng Technques Usng Super Computaton Antony Daves, Ph.D. Assocate Professor of Economcs Duquesne Unversty Pttsburgh, PA 58 Research Fellow The

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

The Current Employment Statistics (CES) survey,

The Current Employment Statistics (CES) survey, Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,

More information

Daily Mood Assessment based on Mobile Phone Sensing

Daily Mood Assessment based on Mobile Phone Sensing 2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Adaptive Sampling for Energy Conservation in Wireless Sensor Networks for Snow Monitoring Applications

Adaptive Sampling for Energy Conservation in Wireless Sensor Networks for Snow Monitoring Applications Adaptve Samplng for Energy Conservaton n Wreless Sensor Networks for Snow Montorng Applcatons Cesare Alpp *, Guseppe Anastas, Crstan Galpert *, Francesca Mancn, Manuel Rover * * Dp. d Elettronca e Informazone

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Ensuring Data Storage Security in Cloud Computing

Ensuring Data Storage Security in Cloud Computing 1 Ensurng Data Storage Securty n Cloud Computng Cong Wang,Qan Wang, Ku Ren, and Wenjng Lou Dept of ECE, Illnos Insttute of Technology, Emal: {cwang, qwang, kren}@ecetedu Dept of ECE, Worcester Polytechnc

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Ths artcle appeared n a journal publshed by Elsever. The attached copy s furnshed to the author for nternal non-commercal research and educaton use, ncludng for nstructon at the authors nsttuton and sharng

More information

Automating Analysis of Large-Scale Botnet Probing Events

Automating Analysis of Large-Scale Botnet Probing Events Automatng Analyss of Large-Scale Botnet Probng Events Zhchun L, Anup Goyal and Yan Chen Northwestern Unversty 2145 Sherdan Road Evanston, IL, USA {lzc,ago210,ychen}@cs.northwestern.edu Vern Paxson UC Berkeley

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student Member, IEEE, Ku Ren, Member, IEEE, Nng Cao, Student Member, IEEE, and Wenjng Lou, Senor

More information

iavenue iavenue i i i iavenue iavenue iavenue

iavenue iavenue i i i iavenue iavenue iavenue Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

SEVERAL trends are opening up the era of Cloud

SEVERAL trends are opening up the era of Cloud IEEE Transactons on Cloud Computng Date of Publcaton: Aprl-June 2012 Volume: 5, Issue: 2 1 Towards Secure and Dependable Storage Servces n Cloud Computng Cong Wang, Student Member, IEEE, Qan Wang, Student

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001

Proceedings of the Annual Meeting of the American Statistical Association, August 5-9, 2001 Proceedngs of the Annual Meetng of the Amercan Statstcal Assocaton, August 5-9, 2001 LIST-ASSISTED SAMPLING: THE EFFECT OF TELEPHONE SYSTEM CHANGES ON DESIGN 1 Clyde Tucker, Bureau of Labor Statstcs James

More information

sscada: securing SCADA infrastructure communications

sscada: securing SCADA infrastructure communications Int. J. Communcaton Networks and Dstrbuted Systems, Vol. 6, No. 1, 2011 59 sscada: securng SCADA nfrastructure communcatons Yongge Wang Department of SIS, UNC Charlotte, 9201 Unversty Cty Blvd, Charlotte,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement

An Enhanced Super-Resolution System with Improved Image Registration, Automatic Image Selection, and Image Enhancement An Enhanced Super-Resoluton System wth Improved Image Regstraton, Automatc Image Selecton, and Image Enhancement Yu-Chuan Kuo ( ), Chen-Yu Chen ( ), and Chou-Shann Fuh ( ) Department of Computer Scence

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

FINAL REPORT. City of Toronto. Contract 47016555. Project No: B000203-3

FINAL REPORT. City of Toronto. Contract 47016555. Project No: B000203-3 Cty of Toronto SAFETY IMPACTS AD REGULATIOS OF ELECTROIC STATIC ROADSIDE ADVERTISIG SIGS TECHICAL MEMORADUM #2C BEFORE/AFTER COLLISIO AALYSIS AT SIGALIZED ITERSECTIO FIAL REPORT 3027 Harvester Road, Sute

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information