Game Theory at the Universities of Milano (III) May Politecnico di Milano, Italy

Size: px
Start display at page:

Download "Game Theory at the Universities of Milano (III) May 23-24 2013 Politecnico di Milano, Italy"

Transcription

1 Game Theory at the Universities of Milano (III) May Politecnico di Milano, Italy

2 Game Theory at the Universities of Milano (III) follows the first two meetings held at Politecnico di Milano, the first one in 2009 and the second one in Each past edition hosted a group of wellknown international scholars, presenting their research activities. The meeting represents also the conclusion of a cross-sectorial course of the Ph.D. School of Politecnico, entitled Game Theoretical Models in Engineering. Thus, even if the purpose of the meeting is to present results at the frontier of the research in this area, the main speakers will be invited to provide a broad overview of the subject of their talk. Shorter communications of young researches will be also scheduled. Registration, program, and schedule are available at Organizers Nicola Gatti Roberto Lucchetti Sponsor PRIN 2009 Variational and Topological methods in the study of Nonlinear Phenomena Dipartimento di Matematica del Politecnico di Milano FARB Politecnico di Milano List of invited speakers Steve Alpern (University of Warwick) Danilo Ardagna (Politecnico di Milano) Konstantin Avratchenkov (INRIA) Nicola Basilico (Politecnico di Milano) Pierpaolo Battigalli (Università Bocconi) Giuditta Caffarra (Politecnico di Milano) Emiliano Catonini (Università Bocconi) Michela Chessa (Università degli Studi di Milano) Laura Cottatellucci (Eurecom) Francisco Facchinei (Università La Sapienza) Josep Freixas (Universitat Politècnica de Catalunya) Astrid Gamba (Università degli Studi di Milano-Bicocca) Mario Gilli (Università degli Studi di Milano-Bicocca) Fabio Maccheroni (Università Bocconi) Elena Manzoni (Università degli Studi di Milano-Bicocca) Stefano Moretti (Université Paris-Dauphine) Marco Rocco (Politecnico di Milano)

3 SCHEDULE Thursday May 23 9:45- Registration and opening Francisco Facchinei (Università di Roma 1) Complex variational inequalities, generalized Nash equilibrium problems and applications 11:00-11:30 Coffee break Steve Alpern (University of Warwick) Patrolling games Nicola Basilico (Politecnico di Milano) Computing patrolling strategies in leader-follower adversarial settings 13:00-15:00 Lunch 15: Stefano Moretti (Paris Dauphine) On the problem of coordinating self-interested agents placed on a network to realize a socially optimal system Michela Chessa (Università degli Studi di Milano) A generating functions approach for computing the Public Good index efficiently 16:15-16:45 Coffee break Emiliano Catonini (Università Bocconi) Non-binding agreements and forward induction reasoning Giuditta Caffarra (Politecnico di Milano) From orders on a set to orders on its power set using semivalues 18:00-18:30 Danilo Ardagna (Politecnico di Milano) Service provisioning problem in cloud and multi-cloud systems: a Generalized Nash equilibrium model Friday May 24 9:45-10:30 Konstantin Avratchenkov (INRIA-Sophia Antipolis) Non-cooperative stochastic games and applications Laura Cottatellucci (EURECOM) Cooperative stochastic games and applications 11:15-11:30 Coffee break Astrid Gamba (Università degli Studi di Milano-Bicocca) Preference-dependent learning in the Centipede Game: a theoretical and experimental study Elena Manzoni (Università degli Studi di Milano-Bicocca) Incomplete information models of guilt aversion in the trust game 12:30-13:00 Marco Rocco (Politecnico di Milano) Which mechanism in sponsored search auctions with externalities? 13:00-14:30 Lunch 14: Pierpaolo Battigalli (Università Bocconi) Selfconfirming long run biases Josep Freixas (Universitat Politècnica de Catalunya) On the qualitative inverse problem for voting rules with abstention 16:00-16:30 Coffee break Mario Gilli (Università degli Studi di Milano-Bicocca) Accountability in autocracies: the role of revolution threat Fabio Maccheroni (Università Bocconi) Mixed extensions of decision problems under uncertainty

4 Book of Abstracts Patrolling games Steve Alpern, University of Warwick Joint work with: Alec Morton and Katarina Papadaki A key operational problem for those charged with the security of vulnerable facilities (such as airports or art galleries) is the scheduling and deployment of patrols. Motivated by the problem of optimizing randomized, and thus unpredictable, patrols, we present a class of patrolling games. The facility to be patrolled can be thought of as a network or graph Q of interconnected nodes (e.g., rooms, terminals), and the Attacker can choose to attack any node of Q within a given time T. He requires m consecutive periods there, uninterrupted by the Patroller, to commit his nefarious act (and win). The Patroller can follow any path on the graph. Thus, the patrolling game is a winlose game, where the Value is the probability that the Patroller successfully intercepts an attack, given best play on both sides. We determine analytically either the Value of the game, or bounds on the Value, for various classes of graphs, and we discuss possible extensions and generalizations. Service provisioning problem in cloud and multi-cloud systems: a Generalized Nash uquilibrium model Danilo Ardagna, Politecnico di Milano In recent years the evolution and the widespread adoption of virtualization, service-oriented architectures, autonomic and utility computing have converged letting a new paradigm to emerge: The Cloud Computing. Cloud Computing aims at streamlining the on-demand provisioning of software, hardware, and data as services, providing end-user with flexible and scalable services accessible through the Internet. Since the Cloud offer is currently becoming wider and more attractive to business owners, the development of efficient resource provisioning policies for Cloud-based services becomes increasingly challenging. Indeed, modern Cloud services operate in an open and dynamic world characterized by continuous changes where strategic interaction among different economic agents takes place. This seminar aims to discuss the hourly basis service provisioning and capacity allocation problem through the formulation of a mathematical model based on noncooperative-game-theoretic approach. We take the perspective of Software as a Service (SaaS) providers which want to minimize the costs associated with the virtual machine instances allocated in a multi-iaass (Infrastructure as a Service) scenario, while avoiding incurring in penalties for requests execution failures and providing quality of service guarantees. SaaS providers compete and bid for the use of infrastructural resources, while the IaaSs want to maximize their revenues obtained providing virtualized resources. The problem has been modeled as a Generalized Nash Equilibrium Problem (GNEP). Thanks to a deep analysis of the game under study, we demonstrate the social equilibria existence for the corresponding generalized potential game. The best-reply solution is pursued heuristically with the implementation of two different algorithms suitable for a distributed implementation. We demonstrate the effectiveness of our approach by performing numerical analyses, considering multiple workloads and system configurations. Results show that our algorithms are scalable. Equilibria efficiency is quantitatively analysed in terms of Price of Anarchy (PoA). Furthermore, a multiple IaaS analysis points out the SaaS benefits in exploiting multiple IaaS deployment. Non-cooperative stochastic games and applications Konstantin Avratchenkov, INRIA-Sophia Antipolis

5 We define stochastic games with discounted, average and Blackwell type criteria. We discuss existence and uniqueness results. Then, we describe special classes of stochastic games for which efficient numerical procedures exist. For most described special classes of stochastic games we provide illustrations by telecommunication applications. Computing patrolling strategies in leader-follower adversarial settings Nicola Basilico, Politecnico di Milano Protecting environments from intentional threats is a task that characterizes many security applications and that nowadays constitutes a topic of crucial practical relevance. One of the main problems in this domain is given by the limited resources (such as robots, cameras, check points) that can be employed to monitor an environment in order to prevent attacks or intrusions. This limitation poses the problem of finding effective resource allocation strategies that could deal with such limits providing a good protection level. In the very last years, this problem has been addressed in a game theoretical fashion leading to the definition of a new class of Security Games. In this approach, the presence of an rational attacker is explicitly considered in formulating the problem of finding an effective strategy. In this talk, I will present a general introduction on Security Games and I will focus on a particular kind of games that embrace robotic patrolling as application of reference: Patrolling Security Games (PSGs). The general idea behind a PSG is that of modeling a patrolling situation as a leader-follower competitive game, played by a defender and an attacker, and of studying the equilibria of this game to derive effective patrolling strategies. In this talk, I will present an overview of our recent works on PSGs, with a particular attention to algorithms for computing equilibrium strategies and to the definition of different techniques to enable the employment of these models in realistic settings. Selfconfirming long run biases Pierpaolo Battigalli, Università Bocconi We consider an uncertainty averse and myopic decision maker facing a recurrent decision problem. We study selfconfirming strategies. We show that a long run bias emerges that favors "tested" actions, that is, actions on which information has been collected over time. In so doing we provide, inter alia, a learning foundation for the selfconfirming equilibrium with model uncertainty of Battigalli et al. (2011, IGIER w.p. 428). From orders on a set to orders on its power set using semivalues Giuditta Caffarra, Politecnico di Milano The problem of extending a preference relation over a set of objects to its power set has been carried out in literature with the purpose of characterizing rankings over subsets with a system of axioms formulated according to the context. This approach prevents any kind of interaction among the objects and cooperative games have been used to handle this issue. A cooperative game can be naturally interpreted as the numerical representation of the preferences over the power set elements, in particular, we consider those extensions such that the ranking induced by a semivalue over the set of objects preserves the original preferences. We will compare the axiomatic approach with the properties which characterize the semivalue extensions and we will study how certain semivalues characteristics impact on the extension problem. Non-binding agreements and forward induction reasoning Emiliano Catonini, Università Bocconi

6 The paper studies the credibility of pre-play, non-binding, possibly incomplete agreements among players in dynamic non-cooperative games. In dynamic games, players may observe a deviation from the agreement before the game is over. The attempt to rationalize the deviation may lead players to revise their beliefs about co-players' behavior in the continuation of the game. This instance of forward induction reasoning is based not just on beliefs about rationality, but also on interactive beliefs about the compliance with the agreement itself. Here I study the effects of such rationalization on the self-enforceability of an agreement, that is on the possibility that the agreement is commonly believed and that players comply with it. A generating functions approach for computing the Public Good index efficiently Michela Chessa, Università degli Studi di Milano In the past years, a combinatorial method based on generating functions was introduced to compute Shapley-Shubik, Banzhaf and other indices for weighted majority games exactly and efficiently. In this work, taking inspiration from what it has already been done, in view of the efficiency of the generating functions method, we define a generating function for computing the Public Good index, maintaining the property of exactness of the resulting algorithm. The main difference with the existing algorithms derives from the fact that the Public Good index takes into account only minimal winning coalitions and counts how many swings of a player involve them. Moreover, we study the computational complexity of the algorithm. Cooperative stochastic games and applications Laura Cottatellucci, EURECOM In this tutorial we extend key concepts of cooperative games such as Core and Shapley values to dynamic systems described by Markov Decision Chains (MDC) where the payoffs are distributed among players at each stage of the game. Fundamental properties for dynamic systems such as time consistency, greedy player satisfaction, and coalition maintenance are illustrated. For cooperative stochastic games (CST) with transferable utilities, we propose a stationary payoff procedure satisfying the above mentioned properties. For the case of CST with non-transferable utilities, we focus on an endogenous Markov process, i.e. players strategies do not influence the transition probabilities, with the feasible points of each stage belonging to a polymatroid. This case models a system of primary relevance in information and communication theory: the achievable rate region of multiple access channels. For this system, we discuss the payoff distribution according to CSG and optimal fairness criteria. Complex variational inequalities, generalized Nash equilibrium problems and applications Francisco Facchinei, Università di Roma 1 We introduce and study variational inequalities in the complex domain, along with some technical tools useful in their study. We then extend to the complex domain some recent developments in the field of the distributed solution of (generalized) Nash equilibrium problems. In order to illustrate our techniques we consider some new MIMO games over vector Gaussian Interference Channels, modeling some distributed resource allocation problems in MIMO cognitive radio systems and femtocells. These games are examples of Nash equilibrium problems that can not be handled by current methodologies.

7 On the qualitative inverse problem for voting rules with abstention Josep Freixas, Universitat Politècnica de Catalunya The first part of the presentation introduces voting games with abstention and more generally voting games with several levels of approval in input and output. Weighted notions and desirability relations are introduced to this context and the precise relationships between weightedness and completeness are established. Several notions of power for these games are discussed and a final study on allowable hierarchies for these games is provided. We conclude by listing which rankings of power are achievable for games of this type. Thus, we ascertain which voting systems of this type can de designed with a given ranking of power. Preference-dependent learning in the Centipede Game: a theoretical and experimental study Astrid Gamba, Università degli studi di Milano-Bicocca We study the interaction of individuals with heterogeneous preference types in the strategic context of a six-stage Centipede game. We adopt a version of Self-confirming equilibrium, whereby individuals maximize their subjective expected utilities, given their preference types (e.g., selfish or altruistic) and their type-specific and possibly wrong conjectures on the opponent's strategies. Such equilibrium with off-path prediction errors has a plausible learning interpretation (i.e., fictitious play) under the assumption that individuals learn their opponent's strategies via their own observations of past interactions. We test our learning interpretation in an experiment, where we study the learning dynamics of a heterogeneous population of individuals, who are classified according to their social preferences and interact anonymously along 40 repetitions of the six-stage Centipede game. We study how the long-run type-specific conjectures and behavior change under different ex post information structures. We find that if individuals rely only on their own observations of co-players' past moves, in the long run heterogeneous behavior resembles a Self-confirming equilibrium. Off-path prediction errors turn out to be type-specific: selfish types have coarser conjectures about the opponent's behavior with respect to more altruistic types. When feedbacks on past play are more informative (aggregate frequencies of moves actually taken by individuals in the co-player s role or aggregate frequencies of plans of actions adopted by individuals in the co-player s role) the long run play is closer to a Bayesian Nash equilibrium with a common and correct belief about the play. Accountability in autocracies: the role of revolution threat Mario Gilli, Università degli studi di Milano-Bicocca The purpose of this paper is to explore the joint work of two mechanisms that might constrain autocratic rulers: the threat of a coup d état by the political elite and of a revolution by the citizens. Our results will help explain a well established and crucial fact, i.e. that autocracies are far more likely than democracies to be either the best or the worst performers in terms of growth and that they are far more heterogenous than democracies in public goods policies. To this aim, we focus on accountability within dictatorships where by accountability we mean a mechanism that involves an agency relationship between politicians and citizens aimed at screening the rulers different types and providing an effective incentivazion system. We use a common agency model where the political elite and the citizens are the principals and the autocrat is the agent; the tools the principals can use are the leader s removal through a coup and a revolt, respectively. Our results highlight that the role of checks and balances in disciplining autocrats turns out to be subtle: congruent policies in autocracies require either an intermediate strength of the state, so that the revolution threat by the citizens is credible only when there are poor outcomes, or a

8 strong enough political elite, so that a coup threat is credible only when economic policies are non-congruent. Otherwise, we will have inefficient economic policies. Hence, both excessively strong and excessively weak rulers lead to poor economic performances: in autocracies there need to be a balanced distribution of de facto political power to incentivize the ruler to choose congruent economic policies. This requirement explains the huge variability in economic performances in autocracies: they depend on the above details of political institutions and how they evolve over time and across countries. Mixed extensions of decision problems under uncertainty Fabio Maccheroni, Università Bocconi Incomplete information models of guilt aversion in the trust game Elena Manzoni, Università degli Studi di Milano-Bicocca Joint work with: Giuseppe Attanasi and Pierpaolo Battigalli In the theory of psychological games it is assumed that players preferences on material consequences depend on endogenous beliefs. Most of the applications of this theoretical framework assume that the psychological utility functions representing such preferences are common knowledge. But this is often unrealistic. In particular, it cannot be true in experimental games where players are subjects drawn at random from a population. Therefore an incompleteinformation methodology is called for. We take a first step in this direction, focusing on models of guilt aversion in the Trust Game. We consider two alternative modeling assumptions: (i) guilt aversion depends on the role played in the game, because only the trustee can feel guilt for letting the co-player down, (ii) guilt aversion is independent of the role played in the game. We show how the set of Bayesian equilibria changes as the upper bound on guilt sensitivity varies, and we compare with complete-information equilibria. Our analysis illustrates the incompleteinformation approach to psychological games and can help organize experimental results in the Trust Game. On the problem of coordinating self-interested agents placed on a network to realize a socially optimal system Stefano Moretti, Paris Dauphine In this talk, we introduce some strategic games based on connection situations with the objective to coordinate self-interested agents placed on the nodes of a graph to realize a more efficient communication network. We address the problem of the design of cost allocation protocols that may guarantee the convergence of the best response dynamic and we analyze the effects of cost monotonicity and other state-dependent properties on the optimality of a protocol. Which mechanism is sponsored search auctions with externalities? Marco Rocco, Politecnico di Milano Sponsored search is one of the most successful applications of economic mechanisms in real life. A crucial issue is the modeling of the user behavior to provide the best targeting of ads to each user. Experimental studies show that the click through rate of an ad is dramatically affected by both its position and the other displayed ads. However, these externalities rise severe currently open computational issues in the determination of the best allocation and of the payments, preventing their adoption in practice so far. In the present paper, we provide a number of results when the most famous externality model, the cascade model, is adopted: we design the first exact algorithm

9 for computing the efficient allocation, we show that the previously presented constantapproximation algorithm does not lead to any incentive compatible mechanism, we design a monotonic constant-approximation algorithm for finding the allocation and two different polynomial-time algorithms for the payments, each with different properties, leading to incentive compatible mechanisms. Finally, we provide a thorough experimental evaluation of the presented algorithms with Yahoo! Webscope A3 dataset to identify which mechanism should be adopted in concrete applications.

A Game Theoretic Formulation of the Service Provisioning Problem in Cloud Systems

A Game Theoretic Formulation of the Service Provisioning Problem in Cloud Systems A Game Theoretic Formulation of the Service Provisioning Problem in Cloud Systems Danilo Ardagna 1, Barbara Panicucci 1, Mauro Passacantando 2 1 Politecnico di Milano,, Italy 2 Università di Pisa, Dipartimento

More information

Generalized Nash Equilibria for the Service Provisioning Problem in Cloud Systems

Generalized Nash Equilibria for the Service Provisioning Problem in Cloud Systems Generalized Nash Equilibria for the Service Provisioning Problem in Cloud Systems Danilo Ardagna, Barbara Panicucci Mauro Passacantando Report n. 2011.27 1 Generalized Nash Equilibria for the Service Provisioning

More information

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction

6.254 : Game Theory with Engineering Applications Lecture 1: Introduction 6.254 : Game Theory with Engineering Applications Lecture 1: Introduction Asu Ozdaglar MIT February 2, 2010 1 Introduction Optimization Theory: Optimize a single objective over a decision variable x R

More information

Network Security Validation Using Game Theory

Network Security Validation Using Game Theory Network Security Validation Using Game Theory Vicky Papadopoulou and Andreas Gregoriades Computer Science and Engineering Dep., European University Cyprus, Cyprus {v.papadopoulou,a.gregoriades}@euc.ac.cy

More information

Optimal Pricing and Service Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach

Optimal Pricing and Service Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach Optimal Pricing and Service Provisioning Strategies in Cloud Systems: A Stackelberg Game Approach Valerio Di Valerio Valeria Cardellini Francesco Lo Presti Dipartimento di Ingegneria Civile e Ingegneria

More information

Copyright. Network and Protocol Simulation. What is simulation? What is simulation? What is simulation? What is simulation?

Copyright. Network and Protocol Simulation. What is simulation? What is simulation? What is simulation? What is simulation? Copyright Network and Protocol Simulation Michela Meo Maurizio M. Munafò Michela.Meo@polito.it Maurizio.Munafo@polito.it Quest opera è protetta dalla licenza Creative Commons NoDerivs-NonCommercial. Per

More information

Chapter 7. Sealed-bid Auctions

Chapter 7. Sealed-bid Auctions Chapter 7 Sealed-bid Auctions An auction is a procedure used for selling and buying items by offering them up for bid. Auctions are often used to sell objects that have a variable price (for example oil)

More information

Simple Channel-Change Games for Spectrum- Agile Wireless Networks

Simple Channel-Change Games for Spectrum- Agile Wireless Networks Simple Channel-Change Games for Spectrum- Agile Wireless Networks Roli G. Wendorf and Howard Blum Seidenberg School of Computer Science and Information Systems Pace University White Plains, New York, USA

More information

Equilibrium computation: Part 1

Equilibrium computation: Part 1 Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium

More information

Working Paper Series

Working Paper Series RGEA Universidade de Vigo http://webs.uvigo.es/rgea Working Paper Series A Market Game Approach to Differential Information Economies Guadalupe Fugarolas, Carlos Hervés-Beloso, Emma Moreno- García and

More information

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania

Moral Hazard. Itay Goldstein. Wharton School, University of Pennsylvania Moral Hazard Itay Goldstein Wharton School, University of Pennsylvania 1 Principal-Agent Problem Basic problem in corporate finance: separation of ownership and control: o The owners of the firm are typically

More information

Sofia Ceppi. Personal Information 2. Association Memberships 2. Education 2. Academic Positions and Affiliations 3

Sofia Ceppi. Personal Information 2. Association Memberships 2. Education 2. Academic Positions and Affiliations 3 CURRICULUM VITAE ET STUDIORUM Sofia Ceppi INDICE Personal Information 2 Association Memberships 2 Education 2 Academic Positions and Affiliations 3 Teaching Activities 3 Teaching Assistantships.........................................

More information

Decentralized Utility-based Sensor Network Design

Decentralized Utility-based Sensor Network Design Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA narayans@cs.usc.edu, bkrishna@usc.edu

More information

Flexible Distributed Capacity Allocation and Load Redirect Algorithms for Cloud Systems

Flexible Distributed Capacity Allocation and Load Redirect Algorithms for Cloud Systems Flexible Distributed Capacity Allocation and Load Redirect Algorithms for Cloud Systems Danilo Ardagna 1, Sara Casolari 2, Barbara Panicucci 1 1 Politecnico di Milano,, Italy 2 Universita` di Modena e

More information

Computing the Electricity Market Equilibrium: Uses of market equilibrium models

Computing the Electricity Market Equilibrium: Uses of market equilibrium models Computing the Electricity Market Equilibrium: Uses of market equilibrium models Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin April 2007 Abstract We discuss

More information

How To Find Influence Between Two Concepts In A Network

How To Find Influence Between Two Concepts In A Network 2014 UKSim-AMSS 16th International Conference on Computer Modelling and Simulation Influence Discovery in Semantic Networks: An Initial Approach Marcello Trovati and Ovidiu Bagdasar School of Computing

More information

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview

U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture

More information

ECONOMIC MECHANISMS FOR ONLINE PAY PER CLICK ADVERTISING: COMPLEXITY, ALGORITHMS AND LEARNING

ECONOMIC MECHANISMS FOR ONLINE PAY PER CLICK ADVERTISING: COMPLEXITY, ALGORITHMS AND LEARNING POLITECNICO DI MILANO DIPARTIMENTO DI ELETTRONICA, INFORMAZIONE E BIOINFORMATICA DOCTORAL PROGRAMME IN INFORMATION TECHNOLOGY ECONOMIC MECHANISMS FOR ONLINE PAY PER CLICK ADVERTISING: COMPLEXITY, ALGORITHMS

More information

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process

Techniques for Supporting Prediction of Security Breaches in. Critical Cloud Infrastructures Using Bayesian Network and. Markov Decision Process Techniques for Supporting Prediction of Security Breaches in Critical Cloud Infrastructures Using Bayesian Network and Markov Decision Process by Vinjith Nagaraja A Thesis Presentation in Partial Fulfillment

More information

Game Theory 1. Introduction

Game Theory 1. Introduction Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each

More information

A Game Theoretical Framework for Adversarial Learning

A Game Theoretical Framework for Adversarial Learning A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,

More information

Concept and Project Objectives

Concept and Project Objectives 3.1 Publishable summary Concept and Project Objectives Proactive and dynamic QoS management, network intrusion detection and early detection of network congestion problems among other applications in the

More information

Invited Applications Paper

Invited Applications Paper Invited Applications Paper - - Thore Graepel Joaquin Quiñonero Candela Thomas Borchert Ralf Herbrich Microsoft Research Ltd., 7 J J Thomson Avenue, Cambridge CB3 0FB, UK THOREG@MICROSOFT.COM JOAQUINC@MICROSOFT.COM

More information

Internet Advertising and the Generalized Second Price Auction:

Internet Advertising and the Generalized Second Price Auction: Internet Advertising and the Generalized Second Price Auction: Selling Billions of Dollars Worth of Keywords Ben Edelman, Harvard Michael Ostrovsky, Stanford GSB Michael Schwarz, Yahoo! Research A Few

More information

The Economics of the Cloud: Price Competition and Congestion

The Economics of the Cloud: Price Competition and Congestion The Economics of the Cloud: Price Competition Congestion JONATHA ANSELMI Basque Center for Applied Mathematics BCAM DANILO ARDAGNA Dip. di Elettronica e Informazione, Politecnico di Milano JOHN C.S. LUI

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren January, 2014 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

PROJECT MANAGEMENT USING DYNAMIC SCHEDULING: BASELINE SCHEDULING, RISK ANALYSIS & PROJECT CONTROL By Mario Vanhoucke

PROJECT MANAGEMENT USING DYNAMIC SCHEDULING: BASELINE SCHEDULING, RISK ANALYSIS & PROJECT CONTROL By Mario Vanhoucke THE MEASURABLE NEWS 2013.02 PROJECT MANAGEMENT USING DYNAMIC SCHEDULING: BASELINE SCHEDULING, RISK ANALYSIS & PROJECT CONTROL By Mario Vanhoucke ABSTRACT The purpose of this article is to give the reader

More information

Towards a compliance audit of SLAs for data replication in Cloud storage

Towards a compliance audit of SLAs for data replication in Cloud storage Towards a compliance audit of SLAs for data replication in Cloud storage J. Leneutre B. Djebaili, C. Kiennert, J. Leneutre, L. Chen, Data Integrity and Availability Verification Game in Untrusted Cloud

More information

M.Sc. Health Economics and Health Care Management

M.Sc. Health Economics and Health Care Management List of Courses M.Sc. Health Economics and Health Care Management METHODS... 2 QUANTITATIVE METHODS... 2 ADVANCED ECONOMETRICS... 3 MICROECONOMICS... 4 DECISION THEORY... 5 INTRODUCTION TO CSR: FUNDAMENTALS

More information

Sandro Brusco. Education

Sandro Brusco. Education Sandro Brusco Contact information: e-mail: sandro.brusco@stonybrook.edu Address: Department of Economics Stony Brook University Stony Brook, NY 11794 Education Sep. 1988 - Jan. 1993 Doctoral program in

More information

Monotone multi-armed bandit allocations

Monotone multi-armed bandit allocations JMLR: Workshop and Conference Proceedings 19 (2011) 829 833 24th Annual Conference on Learning Theory Monotone multi-armed bandit allocations Aleksandrs Slivkins Microsoft Research Silicon Valley, Mountain

More information

Modeling Internet Security Investments

Modeling Internet Security Investments Modeling Internet Security Investments 1 The Case of Dealing with Information Uncertainty Ranjan Pal and Pan Hui University of Southern California, Deutsch Telekom Laboratories arxiv:1104.0594v1 [cs.cr]

More information

Modeling Internet Security Investments Tackling Topological Information Uncertainty

Modeling Internet Security Investments Tackling Topological Information Uncertainty Modeling Internet Security Investments Tackling Topological Information Uncertainty Ranjan Pal Department of Computer Science University of Southern California, USA Joint Work with Pan Hui Deutsch Telekom

More information

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders

Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Discrete Strategies in Keyword Auctions and their Inefficiency for Locally Aware Bidders Evangelos Markakis Orestis Telelis Abstract We study formally two simple discrete bidding strategies in the context

More information

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION

APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK AND INFORMATION PROTECTION 18-19 September 2014, BULGARIA 137 Proceedings of the International Conference on Information Technologies (InfoTech-2014) 18-19 September 2014, Bulgaria APPLICATION OF MULTI-AGENT SYSTEMS FOR NETWORK

More information

South Carolina College- and Career-Ready (SCCCR) Probability and Statistics

South Carolina College- and Career-Ready (SCCCR) Probability and Statistics South Carolina College- and Career-Ready (SCCCR) Probability and Statistics South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR)

More information

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective

Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Optimal Gateway Selection in Multi-domain Wireless Networks: A Potential Game Perspective Yang Song, Starsky H.Y. Wong, and Kang-Won Lee Wireless Networking Research Group IBM T. J. Watson Research Center

More information

Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses

Chapter ML:IV. IV. Statistical Learning. Probability Basics Bayes Classification Maximum a-posteriori Hypotheses Chapter ML:IV IV. Statistical Learning Probability Basics Bayes Classification Maximum a-posteriori Hypotheses ML:IV-1 Statistical Learning STEIN 2005-2015 Area Overview Mathematics Statistics...... Stochastics

More information

The Max-Distance Network Creation Game on General Host Graphs

The Max-Distance Network Creation Game on General Host Graphs The Max-Distance Network Creation Game on General Host Graphs 13 Luglio 2012 Introduction Network Creation Games are games that model the formation of large-scale networks governed by autonomous agents.

More information

Business Intelligence meets Big Data: An Overview on Security and Privacy

Business Intelligence meets Big Data: An Overview on Security and Privacy Business Intelligence meets Big Data: An Overview on Security and Privacy Claudio A. Ardagna Ernesto Damiani Dipartimento di Informatica - Università degli Studi di Milano NSF Workshop on Big Data Security

More information

Extending the Internet of Things to IPv6 with Software Defined Networking

Extending the Internet of Things to IPv6 with Software Defined Networking Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability

More information

Sofia Ceppi CURRICULUM VITAE ET STUDIORUM PERSONAL INFORMATION

Sofia Ceppi CURRICULUM VITAE ET STUDIORUM PERSONAL INFORMATION CURRICULUM VITAE ET STUDIORUM Sofia Ceppi PERSONAL INFORMATION Name: Sofia Surname: Ceppi Birthdate: March 22, 1983 Birthplace: Mariano Comense (CO), Italy Citizenship: Italian Email soceppi@microsoft.com

More information

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania

Financial Markets. Itay Goldstein. Wharton School, University of Pennsylvania Financial Markets Itay Goldstein Wharton School, University of Pennsylvania 1 Trading and Price Formation This line of the literature analyzes the formation of prices in financial markets in a setting

More information

Prescriptive Analytics. A business guide

Prescriptive Analytics. A business guide Prescriptive Analytics A business guide May 2014 Contents 3 The Business Value of Prescriptive Analytics 4 What is Prescriptive Analytics? 6 Prescriptive Analytics Methods 7 Integration 8 Business Applications

More information

University of Calgary Schulich School of Engineering Department of Electrical and Computer Engineering

University of Calgary Schulich School of Engineering Department of Electrical and Computer Engineering University of Calgary Schulich School of Engineering Department of Electrical and Computer Engineering Research Area: Software Engineering Thesis Topics proposed by Dr. Dietmar Pfahl, Assistant Professor

More information

Game Theory Based Iaas Services Composition in Cloud Computing

Game Theory Based Iaas Services Composition in Cloud Computing Game Theory Based Iaas Services Composition in Cloud Computing Environment 1 Yang Yang, *2 Zhenqiang Mi, 3 Jiajia Sun 1, First Author School of Computer and Communication Engineering, University of Science

More information

Thesis work and research project

Thesis work and research project Thesis work and research project Hélia Pouyllau, INRIA of Rennes, Campus Beaulieu 35042 Rennes, helia.pouyllau@irisa.fr July 16, 2007 1 Thesis work on Distributed algorithms for endto-end QoS contract

More information

Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency

Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Summary of Doctoral Dissertation: Voluntary Participation Games in Public Good Mechanisms: Coalitional Deviations and Efficiency Ryusuke Shinohara 1. Motivation The purpose of this dissertation is to examine

More information

Mechanisms for Fair Attribution

Mechanisms for Fair Attribution Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is

More information

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2

Computational Learning Theory Spring Semester, 2003/4. Lecture 1: March 2 Computational Learning Theory Spring Semester, 2003/4 Lecture 1: March 2 Lecturer: Yishay Mansour Scribe: Gur Yaari, Idan Szpektor 1.1 Introduction Several fields in computer science and economics are

More information

Game Theoretic Methods for the Smart Grid

Game Theoretic Methods for the Smart Grid Game Theoretic Methods for the Smart Grid Walid Saad 1, Zhu Han 2, H. Vincent Poor 3, and Tamer Başar 4 1 Electrical and Computer Engineering Department, University of Miami, Coral Gables, FL, USA, email:

More information

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido

From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks. Loreto Pescosolido From reconfigurable transceivers to reconfigurable networks, part II: Cognitive radio networks Loreto Pescosolido Spectrum occupancy with current technologies Current wireless networks, operating in either

More information

List of Ph.D. Courses

List of Ph.D. Courses Research Methods Courses (5 courses/15 hours) List of Ph.D. Courses The research methods set consists of five courses (15 hours) that discuss the process of research and key methodological issues encountered

More information

Measuring the Performance of an Agent

Measuring the Performance of an Agent 25 Measuring the Performance of an Agent The rational agent that we are aiming at should be successful in the task it is performing To assess the success we need to have a performance measure What is rational

More information

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group

Cloud Computing. and Scheduling. Data-Intensive Computing. Frederic Magoules, Jie Pan, and Fei Teng SILKQH. CRC Press. Taylor & Francis Group Cloud Computing Data-Intensive Computing and Scheduling Frederic Magoules, Jie Pan, and Fei Teng SILKQH CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an imprint of the Taylor

More information

Forecasting and Hedging in the Foreign Exchange Markets

Forecasting and Hedging in the Foreign Exchange Markets Christian Ullrich Forecasting and Hedging in the Foreign Exchange Markets 4u Springer Contents Part I Introduction 1 Motivation 3 2 Analytical Outlook 7 2.1 Foreign Exchange Market Predictability 7 2.2

More information

Anchoring Bias in Forecast Information Sharing in a Supply Chain

Anchoring Bias in Forecast Information Sharing in a Supply Chain Anchoring Bias in Forecast Information Sharing in a Supply Chain N. Karthikram R.K. Rajagopal G. Janarthanan RKAmit Abstract This paper investigates the behavioral aspects of decision making of retailers,

More information

Psychological Pricing in Mergers & Acquisitions using Game Theory

Psychological Pricing in Mergers & Acquisitions using Game Theory 19th International Congress on Modelling and Simulation, Perth, Australia, 12 16 December 2011 http://mssanz.org.au/modsim2011 Psychological Pricing in Mergers & Acquisitions using Game Theory N. Agarwal

More information

Computational Game Theory and Clustering

Computational Game Theory and Clustering Computational Game Theory and Clustering Martin Hoefer mhoefer@mpi-inf.mpg.de 1 Computational Game Theory? 2 Complexity and Computation of Equilibrium 3 Bounding Inefficiencies 4 Conclusion Computational

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

Coordination in Network Security Games

Coordination in Network Security Games Coordination in Network Security Games Marc Lelarge INRIA - ENS Paris, France Email: marc.lelarge@ens.fr Abstract Malicious softwares or malwares for short have become a major security threat. While originating

More information

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources

Cloud Computing. Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources Peter Key, Cloud Computing Computational Tasks Have value for task completion Require resources (Cores, Memory, Bandwidth) Compete for resources How much is a task or resource worth Can we use to price

More information

Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment

Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Cooperative Virtual Machine Management for Multi-Organization Cloud Computing Environment Dusit Niyato, Zhu Kun, and Ping Wang School of Computer Engineering, Nanyang Technological University (NTU), Singapore

More information

An Implementation of Active Data Technology

An Implementation of Active Data Technology White Paper by: Mario Morfin, PhD Terri Chu, MEng Stephen Chen, PhD Robby Burko, PhD Riad Hartani, PhD An Implementation of Active Data Technology October 2015 In this paper, we build the rationale for

More information

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com WHITE PAPER Monetizing the Cloud: XaaS Opportunities for Service Providers Sponsored by: EMC Brad Nisbet March 2011 Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015

More information

Master of Science Advanced Software Services. Courses description

Master of Science Advanced Software Services. Courses description Master of Science Advanced Software Services Courses description Architecture of Service Oriented Information Systems The course explains the concept of the different architectural views (e.g. function

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

Individual security and network design

Individual security and network design Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be

More information

Imperfect monitoring in communication networks

Imperfect monitoring in communication networks Journal of Economic Theory (00) www.elsevier.com/locate/jet Imperfect monitoring in communication networks Michael McBride University of California, Irvine, Social Science Plaza, Irvine, CA -00, USA Received

More information

Securing Cloud Infrastructures with Elastic Security

Securing Cloud Infrastructures with Elastic Security Securing Cloud Infrastructures with Elastic Security White Paper September 2012 SecludIT 1047 route des dolines, 06560 Sophia Antipolis, France T +33 489 866 919 info@secludit.com http://secludit.com Core

More information

Security Games in Online Advertising: Can Ads Help Secure the Web?

Security Games in Online Advertising: Can Ads Help Secure the Web? Security Games in Online Advertising: Can Ads Help Secure the Web? Nevena Vratonjic, Jean-Pierre Hubaux, Maxim Raya School of Computer and Communication Sciences EPFL, Switzerland firstname.lastname@epfl.ch

More information

Application of Game Theory in Inventory Management

Application of Game Theory in Inventory Management Application of Game Theory in Inventory Management Rodrigo Tranamil-Vidal Universidad de Chile, Santiago de Chile, Chile Rodrigo.tranamil@ug.udechile.cl Abstract. Game theory has been successfully applied

More information

Network Formation and Routing by Strategic Agents using Local Contracts

Network Formation and Routing by Strategic Agents using Local Contracts Network Formation and Routing by Strategic Agents using Local Contracts Elliot Anshelevich 1 and Gordon Wilfong 2 1 Department of Computer Science, Rensselaer Polytechnic Institute, Troy, NY. 2 Bell Labs,

More information

Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web

Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web Proceedings of the International Conference on Advances in Control and Optimization of Dynamical Systems (ACODS2007) Bidding Dynamics of Rational Advertisers in Sponsored Search Auctions on the Web S.

More information

Cloud Computing for SCADA

Cloud Computing for SCADA Cloud Computing for SCADA Moving all or part of SCADA applications to the cloud can cut costs significantly while dramatically increasing reliability and scalability. A White Paper from InduSoft Larry

More information

2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering

2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering 2014-2015 The Master s Degree with Thesis Course Descriptions in Industrial Engineering Compulsory Courses IENG540 Optimization Models and Algorithms In the course important deterministic optimization

More information

17.6.1 Introduction to Auction Design

17.6.1 Introduction to Auction Design CS787: Advanced Algorithms Topic: Sponsored Search Auction Design Presenter(s): Nilay, Srikrishna, Taedong 17.6.1 Introduction to Auction Design The Internet, which started of as a research project in

More information

AN INTRODUCTION TO GAME THEORY

AN INTRODUCTION TO GAME THEORY AN INTRODUCTION TO GAME THEORY 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. MARTIN J. OSBORNE University of Toronto

More information

Mechanism Design for Federated Sponsored Search Auctions

Mechanism Design for Federated Sponsored Search Auctions Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence Mechanism Design for Federated Sponsored Search Auctions Sofia Ceppi and Nicola Gatti Dipartimento di Elettronica e Informazione

More information

Master of Science Service Oriented Architecture for Enterprise. Courses description

Master of Science Service Oriented Architecture for Enterprise. Courses description Master of Science Service Oriented Architecture for Enterprise Courses description SCADA and PLC networks The course aims to consolidate and transfer of extensive knowledge regarding the architecture,

More information

CPC/CPA Hybrid Bidding in a Second Price Auction

CPC/CPA Hybrid Bidding in a Second Price Auction CPC/CPA Hybrid Bidding in a Second Price Auction Benjamin Edelman Hoan Soo Lee Working Paper 09-074 Copyright 2008 by Benjamin Edelman and Hoan Soo Lee Working papers are in draft form. This working paper

More information

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming 1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson Fellow, IEEE, Danfeng (Daphne) Yao, Member, IEEE

More information

Federation of Cloud Computing Infrastructure

Federation of Cloud Computing Infrastructure IJSTE International Journal of Science Technology & Engineering Vol. 1, Issue 1, July 2014 ISSN(online): 2349 784X Federation of Cloud Computing Infrastructure Riddhi Solani Kavita Singh Rathore B. Tech.

More information

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming

Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming 1 Security Optimization of Dynamic Networks with Probabilistic Graph Modeling and Linear Programming Hussain M.J. Almohri, Member, IEEE, Layne T. Watson, Danfeng (Daphne) Yao, Member, IEEE and Xinming

More information

Tutorials: Abstracts and Speakers Bio

Tutorials: Abstracts and Speakers Bio Tutorials: Abstracts and Speakers Bio 1. Name of Speaker: Rene van Dorp Affiliation: George Washington University, Washington, DC Email or other contact info:dorpjr@gwu.edu Brief bio: J. Rene van Dorp

More information

Trust areas: a security paradigm for the Future Internet

Trust areas: a security paradigm for the Future Internet Trust areas: a security paradigm for the Future Internet Carsten Rudolph Fraunhofer Institute for Secure Information Technology SIT Rheinstrasse 75, Darmstadt, Germany Carsten.Rudolph@sit.fraunhofer.de

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute

More information

A Blueprint for Universal Trust Management Services

A Blueprint for Universal Trust Management Services A Blueprint for Universal Trust Management Services Tomasz Kaszuba Krzysztof Rzadca Adam Wierzbicki Grzegorz Wierzowiecki Polish-Japanese Institute of Information Technology Warsaw, Poland adamw@pjwstk.edu.pl

More information

How To Understand The Value Of A Website In A Blog Post

How To Understand The Value Of A Website In A Blog Post Ron Berman Contact Information 2220 Piedmont Avenue University of California at Berkeley phone: +1-415- 379-0011 email: ron_berman@haas.berkeley.edu web: faculty.haas.berkeley.edu/ron_berman Education

More information

How To Understand Network Security

How To Understand Network Security Network Security: an Economic Perspective Marc Lelarge (INRIA-ENS) currently visiting STANFORD TRUST seminar, Berkeley 2011. Threats and Vulnerabilities Attacks are exogenous Contribution (1) Optimal security

More information

Telecommunication (120 ЕCTS)

Telecommunication (120 ЕCTS) Study program Faculty Cycle Software Engineering and Telecommunication (120 ЕCTS) Contemporary Sciences and Technologies Postgraduate ECTS 120 Offered in Tetovo Description of the program This master study

More information

Cloud deployment model and cost analysis in Multicloud

Cloud deployment model and cost analysis in Multicloud IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 4, Issue 3 (Nov-Dec. 2012), PP 25-31 Cloud deployment model and cost analysis in Multicloud

More information

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33

IJRSET 2015 SPL Volume 2, Issue 11 Pages: 29-33 CLOUD COMPUTING NEW TECHNOLOGIES 1 Gokul krishnan. 2 M, Pravin raj.k, 3 Ms. K.M. Poornima 1, 2 III MSC (software system), 3 Assistant professor M.C.A.,M.Phil. 1, 2, 3 Department of BCA&SS, 1, 2, 3 Sri

More information

What mathematical optimization can, and cannot, do for biologists. Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL

What mathematical optimization can, and cannot, do for biologists. Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL What mathematical optimization can, and cannot, do for biologists Steven Kelk Department of Knowledge Engineering (DKE) Maastricht University, NL Introduction There is no shortage of literature about the

More information

DOCTOR OF PHILOSOPHY IN BUSINESS BBA 920: ECONOMIC ANALYSIS FOR BUSINESS DECISIONS. Course Description

DOCTOR OF PHILOSOPHY IN BUSINESS BBA 920: ECONOMIC ANALYSIS FOR BUSINESS DECISIONS. Course Description DOCTOR OF PHILOSOPHY IN BUSINESS BBA 920: ECONOMIC ANALYSIS FOR BUSINESS DECISIONS Basic concepts and techniques of microeconomic analysis; Utility and demand; Theory of Production and costs; Market structures

More information

NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS

NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS NETWORK DESIGN AND MANAGEMENT WITH STRATEGIC AGENTS A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor

More information

MDE Opportunities in Multi-Tenant Cloud Applications

MDE Opportunities in Multi-Tenant Cloud Applications MDE Opportunities in Multi-Tenant Cloud Applications Mohammad Abu Matar 1 and Jon Whittle 2 1 Etisalat British Telecom Innovation Center Khalifa University of Science, Technology and Research Abu Dhabi,

More information