ECONOMICS OF SECURITY PATCH MANAGEMENT

Size: px
Start display at page:

Download "ECONOMICS OF SECURITY PATCH MANAGEMENT"

Transcription

1 ECONOMCS OF SECURTY PATCH MANAGEMENT Huseyin Cavusoglu * Hasan Cavusoglu Jun Zhang AB Freeman Shool o Business, Tulane University 7 MAlister Drive, New Orleans, LA 70118, USA Sauder Shool o Business, The University o British Columia 2053 Main Mall, Vanouver, BC V6T1Z2, CANADA huseyin@tulaneedu, avusoglu@sauderua, jzhang4@tulaneedu Astrat Path management is a ruial omponent o T seurity programs An important prolem within this ontext is to determine how oten to update the systems with neessary pathes eeping the systems pathed with more requent path updates inreases operational osts while reduing seurity risks On the other hand, leaving the systems unpathed with less requent path updates dereases operational osts while inreasing seurity risks n this paper we develop a game theoreti model to derive the optimal requeny o path updates to alane the operational osts and damage osts assoiated with seurity vulnerailities We irst analyze a entralized system in a enhmark ase to ind the soially optimal path management poliy and assoiated path release yle o the vendor and path update yle o the irm Then we onsider a nonentralized system in whih the vendor determines its path release poliy and the irm selets its path update poliy in a Stakelerg ramework Given the results in entralized and nonentralized path management, we next address how we an oordinate the path release poliy o the vendor and the path update poliy o the irm using ost sharing and/or liaility to ahieve the soially optimal path management in a nonentralized setting eywords: Path management, path update yle, path release yle, nested poliies, oordination, ost sharing, liaility 1 ntrodution Today most seurity inidents are aused y laws in sotware, alled vulnerailities t is estimated that there are as many as 20 laws per thousand lines o sotware ode (Daey, 2003) Computer Emergeny Response Team/Coordination Center (CERT/CC) statistis reveal that the numer o vulnerailities reported has inreased dramatially over the years, rom only 171 in 1995 to 3784 in 2003 (CERT, 2004) The ultimate solution to sotware vulnerailities is appliation o pathes Sotware vendors generally release pathes to ix vulnerailities in their sotware produts These pathes, i applied orretly, remove vulnerailities rom the systems However, many systems are let unpathed or months, even years (Shostak, 2003) Aording to CERT/CC, around 95 perent o seurity reahes ould e prevented y keeping systems up-to-date with appropriate pathes (Daey, 2003) The Slammer virus, whih swept the nternet in January 2003, aused network outages all around the world, aeting 911 all enters, airlines, ATMs But Mirosot had released the path ixing the vulneraility that Slammer exploited six months eore the inident Similarly, Code Red and Nimda wreaked havo on those ompanies that were not urrent with their sotware path updates (MGhie, 2003) So i pathes are the panaea to sotware vulnerailities, why don t irms apply them as soon as vendors make them availale? To egin with, path management is multiaeted, and there are several operational reasons or not applying pathes immediately First, there are too many vulnerailities to path n an average week, vendors and seurity organizations announe around one hundred and ity vulnerailities * orresponding author

2 along with inormation on how to ix them (MGhie, 2003) Sorting through all these vulnerailities to ind relevant ones is a tedious and laor-intensive jo Seond, pathes annot e trusted without testing (Donner, 2003) Beore eing applied in prodution environments, eah path must e tested to make sure that it is working properly and does not onlit with other existing appliations in the system n some ases, irms need to reonigure the system and/or reode some appliations so that the path an work without ausing any new prolem Third, distriution o pathes is not standard Some pathes are availale on the vendor we site and some pathes are not Even i they are availale, irms are too usy to ontinually hek the vendor site Fourth, every path requires installation ater testing This mostly means taking the system down and restarting (reooting) it the path is applied to a ritial system in a prodution environment, downtime an e very expensive Thereore, updating systems with pathes is ostly On the other hand, the onsequenes o not updating systems promptly with neessary pathes an e severe too The time window etween identiiation o vulnerailities and reation o exploits has shrunk dramatially over the years One an exploit is released, it may e too late to onsider pathing For instane, Slammer exploited 90% o vulnerale systems within 10 minutes o its release (Daey, 2003) Code Red ineted a total o 359,000 omputers within 14 hours o its release (MGhie, 2003), just to name a ew So irms must at ast to avoid alling vitim to maliious ats Sine irms an update their vulnerale systems only with availale pathes, the way sotware vendors release pathes has a proound eet on how irms manage the pathing proess Although the ommon pratie in the past was to release pathes as soon as they were ready, in an eort to ease the urden on system administrators struggling with requeny o updates, and to make the proess more preditale, today many sotware vendors ollow period path release poliies (Pruitt, 2003) For example, Mirosot hanged its shedule and swithed to a monthly path release yle in Otoer 2003 Computer Assoiates and PeopleSot, n issue pathes quarterly (Foley and Hulme, 2004) Given the omplexities surrounding path management, quantitative models are needed to help irms determine the optimal path management strategy (Donner, 2003) n this paper we speiially study this prolem to understand how oten systems should e updated with released pathes We irst study a enhmark senario to determine the optimal path release and path update poliies or a entralized system onsisting o a sotware vendor and a sotware user (irm) Next we analyze a nonentralized system in whih path release and path update deisions are made y the vendor and the irm, individually in a Stakelerg game ramework, where the vendor announes its path release poliy irst, and then the irm reats to it y hoosing its path update poliy Given that path management is ostly and vulnerailities are deets aused y sotware vendors, reently seurity experts started questioning the impliations o ost sharing in path management Sine irms urrently ear the ost o pathing, and irms annot keep up with the sheer numer o pathes released y vendors every day, it may help irms i sotware vendors share this urden (Farer, 2003) The argument is very simple: Sine you do not have to pay to repair your ar when a manuaturer deet, suh as aulty rakes, is ound, why should irms pay or the ost o pathing? What i the vendor s release poliy prevents the path rom eing released? Then the question hanges to a liaility issue in seurity Using the previous analogy, i aulty reaks ause you to e in an aident, the ar manuaturer an e held liale in ourt What i your server is attaked eause o a speii vulneraility or whih a path has not yet een released y the vendor? Thereore we examine ost sharing and liaility as possile oordination shemes to ahieve the soially optimal levels o path release and update yles 2 Model Basis We study a simple system onsisting o one sotware vendor and one irm that uses the sotware We assume that identiiation o vulnerailities ollows a Poisson proess with an arrival rate o The irm updates its system with new pathes one in every T time units (ie, the irm s path update yle is T )

3 The irm inurs two types o ost in path management: damage ost as a result o exploitation o vulnerailities not pathed and path update ost assoiated with identiying, testing, and installing pathes The ojetive o the irm is to minimize the sum o damage ost and path update ost y hoosing an appropriate path update yle Damage ost is inurred eause either (i) the vendor waits to release pathes until its next release yle or identiied vulnerailities or (ii) the irm does not update its system with released pathes until its next update yle We all the period etween the time at whih a vulneraility is identiied and the time at whih a path is released the pre-release period Similarly, we all the period etween the time at whih a path is released and the time at whih the irm applies the path the post-release period We assume that the damage inurred is proportional to the duration o preor post-release periods We deine and a as the damage ost per unit time in the pre- and post-release periods, respetively Every time the irm updates its system with missing pathes, it inurs (i) a ixed ost,, whih aptures the ost assoiated with identiiation o missing pathes and the ost o downtime during installation o tested pathes and (ii) a variale ost, n, due to testing and oniguration hanges and/or reoding, and installation, where n is the numer o missing pathes n our model the vendor releases pathes to ix vulnerailities in its sotware one in every T v time units (ie, the vendor s path release yle is T v ) The vendor inurs two types o ost: path release ost assoiated with developing pathes or its identiied vulnerailities and reputation ost or having vulnerale sotware The vendor minimizes the sum o path release ost and reputation ost y hoosing an appropriate path update yle n order to develop a path or a vulneraility, the vendor must assign some resoures This is the variale omponent o path release ost, n v There is also a ixed ost o inorming the puli aout pathes, making pathes availale, and other PR osts, denoted y v The vendor inurs a ost in term o reputation loss This ost inludes the loss in uture sales eause o redution in pereived quality o sotware and trust in sotware y the irm We deine and a as the reputation ost per unit time o exposure in pre- and post-release periods, respetively n this paper, we onsider a nested poliy A path management poliy is nested i the path update yle o the irm is a multiple o the path release yle o the vendor; that is, one path update yle onsists o k path release yles (T = kt v ) 3 The ntegrated System n the integrated system, a entral planner deides on the path release yle and path update yle to minimize the total system ost We an write the total expeted system ost during one update yle onditional on n pathes released within this update yle as L ( T, T n) n k n nt / 2 n( k 1) T / 2 (1) v v v v a v Beause identiiation proess is Poisson, the total expeted system ost during one update yle is n ( T ) T L ( Tv, T ) L ( Tv, T n) e kv ( v Tv / 2 a ( k1) Tv / 2) T (2) n! n0 t ollows that the expeted average ost per unit time is a v a C ( Tv, T ) L ( Tv, T ) / T T ( ) Tv ( v ) (3) T 2 T 2 Thus, the entral planner s prolem an e stated as min { C ( T, T ) T kt or any k} Tv0, T0 v v v The ollowing result haraterizes the optimal path management poliy when T and T v are determined together y the entral planner

4 Proposition 1 Let respetively Then, * * Tv and T e the optimal path release and update yles or the integrated system, 2( ) * * v Tv T, (4) * * and the minimum expeted average system ost is C ( T, T ) 2 ( ) ( ) v v v Proposition 1 states that at soial optimality path release and update yles must e synhronized, that is, pathes must e applied to the system as soon as they are released y the vendor n pratie, T and T v are determined y the irm and the vendor individually n the next setion, we disuss how path release and update yles hange when these are determined in a nonooperative setting 4 The Deentralized System To solve this game, we work akward and irst ous on the irm s path update prolem, assuming a path release yle T v is given 41 The Firm s Prolem Given that the irm ollows a nested poliy, that is, T = kt v, one path update yle o the irm is divided into k path release yles Beause the release times o n pathes are uniormly distriuted within ktv time units, (n1,, nk) ollows a multinomial distriution Hene, the irm s expeted average ost per unit time is C ( T, k) T / 2 ( k1) T / 2 /( kt ) (5) v v a v v For a given T v, the irm s prolem an e ormulated as min { T / 2 ( k1) T / 2 /( kt ) k is integer} k v a v v Lemma 1 haraterizes the optimal path update poliy or the irm Lemma 1 For a given path release yle T v o the vendor, k satisies 2 * * 2 * * k ( k 1) and k ( k 1) 2 2 T T (6) a v a v Given the irm s est response, we next study how the vendor hooses its path release yle 42 The Vendor s Prolem * Taking irm s response k into onsideration, the vendor hooses its path release yle T v to minimize its average ost The average expeted ost or vendor an e written as * * C ( T, k ) / T ( ) T / 2 k T / 2 (7) v v v v a v a v v * The vendor hooses T v to minimize Cv ( Tv, k ) or a given reation k * Note that y onstraints in (6); thereore, the vendor s prolem an e ormulated as min / T ( ) T / 2 kt / 2 Tv, k v v a v a v v * k is uniquely identiied 2 2 s t k( k 1) and k( k1) 2 2 atv atv Unortunately, there are no lose-orm solutions or the vendor s prolem Beause our ous is on oordination shemes to ahieve the soially optimal path release and update yles, and the path

5 release and update yles are idential at soial optimality, in the next proposition we haraterize the region where the path release and update yles are idential without any oordination mehanism Proposition 2 / 2 /, then the optimal path release yle is a v orresponding path update yle p* p* T is equal to T v T 2 /( ) and the p* v v Note that / an e interpreted as the tolerane level o the irm to wait or update, and / as the a tolerane level o the vendor to wait or release without any oordination When the irm s tolerane level is smaller than twie the vendor s tolerane level, path update will e synhronized with path release when oth deisions are made individually This result is very intuitive Unless the irm is tolerant to wait till every other release, the irm hooses to path its system immediately with every new release However, one should note that even or this ase, the synhronized path release/update yle is not neessarily idential to the synhronized yle that minimizes the soial ost Thereore, path update and path release yles are, in general, not soially optimal when they are determined separately n the next setion, we study possile oordination shemes that an ahieve the soially optimal path management 5 Coordination Shemes Through ost sharing, every time a path update ours, (0 1) portion o the ixed ost or path update is harged to the vendor Through liaility, every time a vulneraility is exploited eore the l path that ixes the vulneraility is released, the vendor has to pay (0 l 1) portion o the damage ost inurred y the irm For oth oordination shemes, we irst haraterize the optimal path release and update yles and then develop suiient onditions under whih the soially optimal path release/update an e ahieved We summarize results elow Proposition 3 (Cost Sharing Only) Cost sharing y itsel an ahieve the soially optimal path update and release i v v va a Then, the required level o ost sharing is ( ) /( ) / v v Proposition 4 (Liaility Only) Liaility y itsel an ahieve the soially optimal path update and release i v v l Then, the required level o liaility is /( ) / v v Proposition 5 (Cost Sharing plus Liaility) Cost sharing together with liaility an ahieve the soially optimal path release and update i v va a l And the levels o ost sharing and liaility satisy ( ) /( ) ( ) / v v Propositions 3, 4, and 5 haraterize the onditions under whih a entral planner an use ost sharing or liaility or oth to ahieve the soially optimal path release and update Our analysis shows that what oordination sheme to use depends on where the tolerane level o the system alls When the system s tolerane level is lower than the vendor s tolerane level with maximum ost sharing, there is a v

6 oordination mehanism(s) that an ahieve the soially optimal path management the system s tolerane level is lower than the vendor s tolerane level without ost sharing or liaility, then liaility y itsel results in the soially optimal path release/update On the other hand, i the system s tolerane level is higher than the vendor s tolerane level without ost sharing or liaility, then ost sharing y itsel may lead to the soially optimal path release/update the system s tolerane level is very high, neither ost sharing nor liaility an oordinate the vendor s path release and the irm s path update deisions nterestingly, or these senarios, the joint use o these two shemes annot ahieve the soially optimal path release/update yle either Thereore, using oth oordination shemes does not enlarge the easile region to ahieve soial optimality ompared to using ost sharing and liaility individually Proposition 5 implies that ost sharing and liaility are not sustitutes or eah other; that is, using liaility in addition to ost sharing does not redue the level o ost sharing required to ahieve optimality, or vie versa Thereore the entral planner should never use oth oordination shemes at the same time to oordinate path management deisions 6 Conlusions n this paper we develop a game theoreti model to derive the optimal requeny o path updates Our analysis reveals that the soially optimal path management requires synhronization o path release and update yles When deisions or path release and update poliies are let to the vendor and the irm, individual deision making may result in asynhronized yles or path management Even i path release and update yles are synhronized, the synhronized yle is not the optimal path release/update yle Further, our analysis demonstrates that ost sharing an always synhronize path release and path update yles whereas liaility an never e used to synhronize them Sine ost sharing is not a sustitute or liaility, and liaility is not a sustitute or ost sharing, using oth ost sharing and liaility together to ahieve oordination does not add value other than ausing the vendor to ear more ost Thereore, depending on the inentive levels o the system and the vendors, vendors should share either the urden (ost sharing) or the damage (liaility), ut not oth to reah the soial optimality with minimum level o additional ost on the vendor side We assumed that there is only one vulnerale sotware program running on one omputer n reality, multiple omputers with diverse risk proiles an e at risk rom a speii vulneraility To manage path updates, irms an arrange these vulnerale mahines into groups and apply dierent path update poliies We also assumed that eah vulneraility auses the same level o threat This is a reasonale assumption given that there is no easy way or an administrator to tell whether a vulneraility is serious or very serious (Donner, 2003) Reently some vendors started attahing a severity rating to their vulnerailities Using this inormation, irms an devise path update poliies or vulnerailities with dierent severity ratings Future researh should address aove-mentioned prolems Reerenes CERT (2004) Cert/ statistis Daey, R F (2003) Eetive path management is ritial to mitigating sotware vulnerailities GAO T Donner, M (2003) Path management - its, ad guys, and uks! Seure Business Quarterly, 3(2), 1-4 Farer, D (2003) Should mirosot pay or your seurity path osts? TehUpdate, January 30 Foley, J and G V Hulme (2004) Get ready to path normationweek, August 30 MGhie, L (2003) Sotware path management - the new rontier Seure Business Quarterly, 3(2), 1-4 Pruitt, S (2003) Sotware users hit a rough path PC World, Novemer 10 Shostak, A (2003) Quantiying path management Seure Business Quarterly, 3(2), 1-4

Patch management is a crucial component of information security management. An important problem within

Patch management is a crucial component of information security management. An important problem within MANAGEMENT SCIENCE Vol. 54, No. 4, April 2008, pp. 657 670 issn 0025-1909 eissn 1526-5501 08 5404 0657 inorms doi 10.1287/mnsc.1070.0794 2008 INFORMS Security Patch Management: Share the Burden or Share

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

The Price of Uncertainty in Security Games

The Price of Uncertainty in Security Games The Prie of Unertainty in Seurity Games Tehnial Report Jens Grossklags a Benjamin Johnson iolas Christin a Shool of Information University of California, Berkeley Berkeley, CA 947 jensg@ishool.erkeley.edu

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Job Creation and Job Destruction over the Life Cycle: The Older Workers in the Spotlight

Job Creation and Job Destruction over the Life Cycle: The Older Workers in the Spotlight DISCUSSION PAPER SERIES IZA DP No. 2597 Job Creation and Job Destrution over the Life Cyle: The Older Workers in the Spotlight Jean-Olivier Hairault Arnaud Chéron François Langot February 2007 Forshungsinstitut

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION

REDUCTION FACTOR OF FEEDING LINES THAT HAVE A CABLE AND AN OVERHEAD SECTION C I E 17 th International Conferene on Eletriity istriution Barelona, 1-15 May 003 EUCTION FACTO OF FEEING LINES THAT HAVE A CABLE AN AN OVEHEA SECTION Ljuivoje opovi J.. Elektrodistriuija - Belgrade -

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

In many services, the quality or value provided by the service increases with the time the service provider

In many services, the quality or value provided by the service increases with the time the service provider MANAGEMENT SCIENCE Vol. 57, No. 1, January 2011, pp. 40 56 issn 0025-1909 eissn 1526-5501 11 5701 0040 informs doi 10.1287/mns.1100.1250 2011 INFORMS Quality Speed Conundrum: Trade-offs in Customer-Intensive

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Income Protection CLAIM FORM

Income Protection CLAIM FORM Inome Protetion CLAIM FORM PLEASE COMPLETE THIS APPLICATION IN BLACK PEN ONLY USING BLOCK LETTERS 1 PERSONAL DETAILS Poliy numer Important notes: a This form must e ompleted in full and returned to PO

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Up or Down? A Male Economist s Manifesto on the Toilet Seat Etiquette

Up or Down? A Male Economist s Manifesto on the Toilet Seat Etiquette Up or Down? A Male Eonoist s Maniesto on the Toilet Seat Etiquette By Jay Pil Choi* Mihigan State University Noveber 2002 Abstrat This paper develops an eonoi analysis o the toilet seat etiquette, that

More information

Monetary Policy, Leverage, and Bank Risk-Taking

Monetary Policy, Leverage, and Bank Risk-Taking Monetary Poliy, Leverage, and Bank Risk-Taking Giovanni Dell Ariia IMF and CEPR Lu Laeven IMF and CEPR Otober 200 Robert Maruez Boston University Abstrat We provide a theoretial foundation for the laim

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Health Savings Account Application

Health Savings Account Application Health Savings Aount Appliation FOR BANK USE ONLY: ACCOUNT # CUSTOMER # Health Savings Aount (HSA) Appliation ALL FIELDS MUST BE COMPLETED. Missing fields may delay the aount opening proess and possibly

More information

Globalization, Jobs, and Welfare: The Roles of Social Protection and Redistribution 1

Globalization, Jobs, and Welfare: The Roles of Social Protection and Redistribution 1 Globalization, Jobs, and Welfare: The Roles of Soial Protetion and Redistribution Priya Ranjan University of California - Irvine pranjan@ui.edu Current Draft Otober, 04 Abstrat This paper studies the welfare

More information

) ( )( ) ( ) ( )( ) ( ) ( ) (1)

) ( )( ) ( ) ( )( ) ( ) ( ) (1) OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

A Theoretical Analysis of Credit Card Reform in Australia *

A Theoretical Analysis of Credit Card Reform in Australia * A Theoretial Analysis of Credit Card Reform in Australia * by Joshua S. Gans and Stephen P. King Melbourne Business Shool University of Melbourne First Draft: 12 th May, 2001 This Version: 5 th May, 2003

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Surveillance coverage of sensor networks under a random mobility strategy

Surveillance coverage of sensor networks under a random mobility strategy µ Surveillane overage o sensor networks under a random moility strategy eorge Kesidis & CS Depts, Penn State University University Park, PA, USA kesidis@engrpsuedu Takis Konstantopoulos C Dept, University

More information

BOSTON UNIVERSITY SCHOOL OF LAW

BOSTON UNIVERSITY SCHOOL OF LAW BOSTON UNIVERSITY SCHOOL OF LAW WORKING PAPER SERIES, LAW & ECONOMICS WORKING PAPER NO. 00-03 AN ASYMMETRIC INFORMATION MODEL OF LITIGATION KEITH N. HYLTON This paper an be downloaded without harge at:

More information

Hybrid linear programming to estimate CAP impacts of flatter rates and environmental top-ups

Hybrid linear programming to estimate CAP impacts of flatter rates and environmental top-ups AUA Working Paper Series No. 2010-?? September 2010 Hybrid linear programming to estimate CAP impats o latter rates and environmental top-ups The ase o arable ropping in Kopais plain, Greee Stelios Rozakis

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully.

Procurement auctions are sometimes plagued with a chosen supplier s failing to accomplish a project successfully. Deision Analysis Vol. 7, No. 1, Marh 2010, pp. 23 39 issn 1545-8490 eissn 1545-8504 10 0701 0023 informs doi 10.1287/dea.1090.0155 2010 INFORMS Managing Projet Failure Risk Through Contingent Contrats

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits

The Optimal Deterrence of Tax Evasion: The Trade-off Between Information Reporting and Audits The Optimal Deterrene of Tax Evasion: The Trade-off Between Information Reporting and Audits Yulia Paramonova Department of Eonomis, University of Mihigan Otober 30, 2014 Abstrat Despite the widespread

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Paid Placement Strategies for Internet Search Engines

Paid Placement Strategies for Internet Search Engines Paid Plaement Strategies for Internet Searh Engines Hemant K. Bhargava Smeal College of Business Penn State University 342 Beam Building University Park, PA 16802 bhargava@omputer.org Juan Feng Smeal College

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

Suggested Answers, Problem Set 5 Health Economics

Suggested Answers, Problem Set 5 Health Economics Suggested Answers, Problem Set 5 Health Eonomis Bill Evans Spring 2013 1. The graph is at the end of the handout. Fluoridated water strengthens teeth and redues inidene of avities. As a result, at all

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Economic and Antitrust Barriers to Entry

Economic and Antitrust Barriers to Entry Eonomi and Antitrust Barriers to Entry R. Preston MAfee, Hugo M. Mialon, and Mihael A. Williams 1 Deember 1, 2003 Abstrat We review the extensive literature on barriers to entry in law and eonomis; we

More information

The B.E. Journal of Macroeconomics

The B.E. Journal of Macroeconomics The B.E. Journal of Maroeonomis Contributions Volume 7, Issue 2007 Artile 9 Nominal Debt Dynamis, Credit Constraints and Monetary Poliy Liam Graham Stephen Wright University College London, liam.graham@ul.a.uk

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism

RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS. Discussion Paper No. 475. The Evolution and Utilization of the GATT/WTO Dispute Settlement Mechanism RESEARCH SEMINAR IN INTERNATIONAL ECONOMICS Shool of Publi Poliy The University of Mihigan Ann Arbor, Mihigan 48109-1220 Disussion Paper No. 475 The Evolution and Utilization of the GATT/WTO Dispute Settlement

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

Strategies for Development and Adoption of ERR in German Ambulatory Care

Strategies for Development and Adoption of ERR in German Ambulatory Care Strategies for Development and Adoption of ERR in German Ambulatory Care Sebastian Duennebeil 1, Ali Sunyaev 1, Jan Maro Leimeister 2, Helmut Krmar 1 1 Department of Informatis 1 Tehnishe Universitat MUnhen

More information

5.2 The Master Theorem

5.2 The Master Theorem 170 CHAPTER 5. RECURSION AND RECURRENCES 5.2 The Master Theorem Master Theorem In the last setion, we saw three different kinds of behavior for reurrenes of the form at (n/2) + n These behaviors depended

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

Effectiveness of a law to reduce alcohol-impaired driving in Japan

Effectiveness of a law to reduce alcohol-impaired driving in Japan Effetiveness of a law to redue alohol-impaired driving in Japan T Nagata, 1,2 S Setoguhi, 3 D Hemenway, 4 M J Perry 5 Original artile 1 Takemi Program, Department of International Health, Harvard Shool

More information

Variations in State-Level Definitions: Children with Special Health Care Needs

Variations in State-Level Definitions: Children with Special Health Care Needs Researh Artiles Variations in State-Level Definitions: Children with Speial Health Care Needs Nathaniel S. Beers, MD, MPA a,, Alexa Kemeny, MD Lon Sherritt, MPH Judith S. Palfrey, MD, SYNOPSIS Multiple

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia

JEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate

Price-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et

More information

SOFTWARE ENGINEERING I

SOFTWARE ENGINEERING I SOFTWARE ENGINEERING I CS 10 Catalog Desription PREREQUISITE: CS 21. Introdution to the systems development life yle, software development models, analysis and design tehniques and tools, and validation

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

Product Warranties and Double Adverse Selection

Product Warranties and Double Adverse Selection rodut Warranties and Double Adverse eletion David A. oberman Assistant rofessor of Marketing INEAD Boulevard de Constane 77305 Fontainebleau Cede, Frane The author thanks rofessors Andy Mithell, Jak Mintz,

More information

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers To Coordinate Or Not To Coordinate? Wide-Area Traffi Management for Data Centers Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang Department of Computer Siene, and Department of Eletrial

More information

REVISTA INVESTIGACIÓN OPERACIONAL Vol. 28, No.1, 4-16, 2007

REVISTA INVESTIGACIÓN OPERACIONAL Vol. 28, No.1, 4-16, 2007 REVISTA INVESTIGACIÓN OPERACIONAL Vol. 28 No.1 4-16 2007 ALGORITHMS FOR MEAN-RISK STOCHASTIC INTEGER PROGRAMS IN ENERGY Rüdiger Shultz Frederike Neise Department of Mathematis University of Duisburg-Essen

More information

3 Game Theory: Basic Concepts

3 Game Theory: Basic Concepts 3 Game Theory: Basi Conepts Eah disipline of the soial sienes rules omfortably ithin its on hosen domain: : : so long as it stays largely oblivious of the others. Edard O. Wilson (1998):191 3.1 and and

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential)

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential) Plan Basis The D.C. Long Term Disability Insurane Plan Exlusively for NBAC members Issued by The Prudential Insurane Company of Ameria (Prudential) What does it over? The D.C. Long Term Disability Insurane

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities

Impact Simulation of Extreme Wind Generated Missiles on Radioactive Waste Storage Facilities Impat Simulation of Extreme Wind Generated issiles on Radioative Waste Storage Failities G. Barbella Sogin S.p.A. Via Torino 6 00184 Rome (Italy), barbella@sogin.it Abstrat: The strutural design of temporary

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

Prices and Heterogeneous Search Costs

Prices and Heterogeneous Search Costs Pries and Heterogeneous Searh Costs José L. Moraga-González Zsolt Sándor Matthijs R. Wildenbeest First draft: July 2014 Revised: June 2015 Abstrat We study prie formation in a model of onsumer searh for

More information

Lemon Signaling in Cross-Listings Michal Barzuza*

Lemon Signaling in Cross-Listings Michal Barzuza* Lemon Signaling in Cross-Listings Mihal Barzuza* This paper analyzes the deision to ross-list by managers and ontrolling shareholders assuming that they have private information with respet to the amount

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

Journal of Engineering Science and Technology Review 6 (5) (2013) 143-148. Research Article

Journal of Engineering Science and Technology Review 6 (5) (2013) 143-148. Research Article Jestr Journal o Engineering Siene and Tehnology Review 6 (5) (13) 143-148 Researh Artile JOURNAL OF Engineering Siene and Tehnology Review www.jestr.org Numerial Analyses on Seismi Behaviour o Conrete-illed

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

Optimal Allocation of Filters against DDoS Attacks

Optimal Allocation of Filters against DDoS Attacks Optimal Alloation of Filters against DDoS Attaks Karim El Defrawy ICS Dept. University of California, Irvine Email: keldefra@ui.edu Athina Markopoulou EECS Dept. University of California, Irvine Email:

More information

Known: long, aluminum cylinder acts as an extended surface.

Known: long, aluminum cylinder acts as an extended surface. Prolem : A long, irular aluminium rod attahed at one end to the heated all and transers heat through onvetion to a old luid. (a) I the diameter o the rod is triples, y ho muh ould the rate o heat removal

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

PET INSURANCE GIVING YOUR PETS AS MUCH AS THEY GIVE YOU.

PET INSURANCE GIVING YOUR PETS AS MUCH AS THEY GIVE YOU. PET INSURANCE GIVING YOUR PETS AS MUCH AS THEY GIVE YOU. THEY RE HEALTHIER, YOU RE HAPPIER. ALL PART OF GENERATION BETTER. Give your best mate the best are possible Think of Medibank Pet Insurane like

More information

The Advantages of Using Aountable Care Organizations ( ACOs)

The Advantages of Using Aountable Care Organizations ( ACOs) JLEO, V3 S i77 Struturing Inentives within Aountable Care Organizations Brigham Frandsen Brigham Young University James B. Rebitzer* Boston University Shool of Management and ational Bureau of Eonomi Researh

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters

International Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters nternational Journal of Supply and Operations Management JSOM November 0, Volume, ssue 3, pp. 60-78 SSN-Print: 383-359 SSN-Online: 383-55 www.ijsom.om Mathematial modeling for EOQ inventory system with

More information

Optimal Online Buffer Scheduling for Block Devices *

Optimal Online Buffer Scheduling for Block Devices * Optimal Online Buffer Sheduling for Blok Devies * ABSTRACT Anna Adamaszek Department of Computer Siene and Centre for Disrete Mathematis and its Appliations (DIMAP) University of Warwik, Coventry, UK A.M.Adamaszek@warwik.a.uk

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association

Petri nets for the verification of Ubiquitous Systems with Transient Secure Association Petri nets for the verifiation of Ubiquitous Systems with Transient Seure Assoiation Fernando Rosa-Velardo Tehnial Report 2/07 Dpto. de Sistemas Informátios y Computaión Universidad Complutense de Madrid

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations

Board Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information