A Framework to Decompose GSPN Models

Size: px
Start display at page:

Download "A Framework to Decompose GSPN Models"

Transcription

1 A Framework to Decompose GSPN Modes Leonardo Brenner, Pauo Fernandes, Afonso Saes, and Thais Webber Pontifícia Universidade Catóica do Rio Grande do Su, Av. Ipiranga, Porto Aegre, Brazi {brenner, pauof, asaes, Abstract. This paper presents a framework to decompose a singe GSPN mode into a set of sma interacting modes. This decomposition technique can be appied to any GSPN mode with a finite set of tangibe markings and a generaized tensor agebra (Kronecker) representation can be produced automaticay. The numerica impact of a the possibe decompositions obtained by our technique is discussed. To do so we draw the comparison of the resuts for some practica exampes. Finay, we present a the computationa gains achieved by our technique, as we as the future extensions of this concept for other structured formaisms. 1 Introduction It is common knowedge in the research community the advantages in using the GSPN (Generaized Stochastic Petri Nets) formaism [2] to mode compex systems, i.e., systems with both parae and synchronous behavior. For a quite ong time, the main imitation to use the GSPN formaism was the absence of an efficient numerica support to hande usefu, and consequenty arge, modes. Ciardo and Trivedi s work [14] brought a first approach that coud be empoyed to decompose a singe mode into components. However, their approach does not mention any specific storage or numericay suitabe soution technique. The need of a theoretica too to represent such structured modes naturay eads to Tensor Agebra representations [4, 8, 3, 15]. The term Tensor Agebra is being empoyed in this paper, but many authors sti prefer the cassic denomination Kronecker Agebra chosen in honor of Leopod Kronecker. The first compete approaches in this direction were the works of Donatei in the SGSPN (Superposed GSPN ) formaism [16, 17]. By compete, we understand that it was proposed a compete framework to: construct a SGSPN mode by assembing synchronized components; generate a Markovian descriptor, i.e., a tensor agebra formua, as the infinitesima generator of the equivaent Markov chain; and consequenty an efficient way to sove it (functiona eements). However, the SGSPN formaism coud ony be used to mode a rather sma cass of GSPN modes which compy to the restrictive rues of generation defined by This work was partiay funded by CNPq/Brazi. Corresponding author. The order of authors is merey aphabetica. G. Ciardo and P. Darondeau (Eds.): ICATPN 2005, LNCS 3536, pp , c Springer-Verag Berin Heideberg 2005

2 A Framework to Decompose GSPN Modes 129 Donatei, i.e., a SGSPN mode is composed of a set of standard GSPN modes which interact ony through a set of synchronized transitions. The SGSPN appication scope restriction, and the consequent disadvantages in terms of numerica performance, suggests the use of other formaisms that coud be coser to the tensor representation, such as SAN (Stochastic Automata Networks) [26]. At this time, the soution through the shuffe agorithm used in SAN [18, 7] presents an efficient soution with reasonabe memory needs. Evidenty, the use of other structured storage and soution techniques instead of the tensor agebra aso presents good aternatives to the imited scope of the SGSPN formaism. This is the case of the quite impressive techniques based on MDD (Muti-vaued Decision Diagrams) [22]andMxD (Matrix Diagrams) [21] proposed by Ciardo and Miner. Furthermore, the MDD and MxD techniques are very efficient to sove very sparse modes, i.e., modes with a huge product state space and a comparativey sma number of reachabe states. In fact, we beieve that the techniques based on tensor agebra are sti worthy, at east considering the new improvements to hande tensor structures [5, 10]. This paper presents a study about the decomposition of a very genera cass of GSPN modes, expoiting the description power of the GSPN formaism. It aso proposes a memory efficient tensor agebra format to describe the components and their interactions. As the first step, we formay define the cass of GSPN modes in which our technique can be appied. The proposed decomposition technique and the consequent tensor format representation are generaizations of the SGSPN formaism [17], but we extend the appication scope foowing the ideas firsty advanced in [14] and empoyed ater in [20]. The new contribution of our work is justified by the numerica impact of the decomposition choices on the storage demands. We are specificay interested to hande modes with a reay arge reachabe state space. Buchhoz, Ciardo, Donatei, Kemper, and Miner [9, 23, 11] aready present very efficient methods to dea with absoutey huge modes (e.g., states in 1000 dining phiosophers exampe [22]), but with consideraby fewer reachabe states. Our decomposition technique intends to spit a GSPN mode into subnets providing a structured representation. Regardess the number of subnets, we wi aways have the same reachabe state space. With many (sma) subnets, we have a very structured (and therefore memory efficient) representation, but aso a product state space much arger than the reachabe state space. With few (arge) subnets, we have a ess structured representation, but a product state space equa or a itte bit arger than the reachabe state space. In fact, we intend to compare possibe decompositions in order to show the trade off between many sma and few arge subnets. In addition, we point out the underestimated benefits of the use of guards in the GSPN formaism, which can be ceary demonstrated by the tensor format proposed in our work. We do not pay much attention in this paper to the computationa cost to sove the tensor representations. The recent evoutions in pure tensor soutions [5, 10], the promising ideas of parae impementations, and the MDD and MxD techniques [12] suggest many changes in the computationa

3 130 L. Brenner et a. cost in a near future. We focus our interest in the memory savings due to our decomposition techniques and the corresponding tensor format. The next section briefy presents the theoretica too used to the tensor representation: Cassica (CTA) and Generaized Tensor Agebra (GTA). Section 3 describes the GSPN formaism, the appication scope of our technique and the scope of the technique proposed for SGSPN. Section 4 presents our decomposition technique and the corresponding tensor format. Section 5 draws some considerations about the possibe choices of decomposition. Section 6 presents some modeing exampes in order to discuss numerica issues about the decomposition technique. Finay, the concusion summarizes our contribution and suggests the sti vast future work to be done. 2 Tensor Agebra In this section, the concepts of Cassica Tensor Agebra [3, 15] and Generaized Tensor Agebra [25, 18] are briefy presented. 2.1 CTA - Cassica Tensor Agebra The tensor product of two matrices: A of dimensions (ρ 1 γ 1 )andb of dimensions (ρ 2 γ 2 ) is a tensor with dimensions (ρ 1 ρ 2 γ 1 γ 2 ) which may be considered as consisting of ρ 1 γ 1 bocks each having dimensions (ρ 2 γ 2 ), i.e., the dimensions of B. To specify a particuar eement, it suffices to specify the bock in which the eement occurs and the position within that bock of the eement under consideration. Thus, as mentioned previousy, eement c 36 (a 11 b 02 ) is in the (1, 1) bock and at position (0, 2) of that bock. The tensor C = A B is defined by assigning to the eement of C that is in the (k, ) position of bock (i, j), the vaue a ij b k, i.e., c [ik][j] = a ij b k.thetensor sum of two square matrices A and B is defined in terms of tensor products as: A B = A I nb + I na B where n A is the order of A; n B is the order of B; I ni is the identity matrix of order n i ; and + represents the usua operation of matrix addition. Since both sides of this operation (matrix addition) must have identica dimensions, it foows that tensor addition is defined for square matrices ony. The vaue assigned to the eement c [ik][j] of the tensor C = A B is c [ik][j] = a ij δ k + b k δ ij, where δ ij is the eement of i th row and j th coumn of an identity matrix defined as δ ij =1 for i = j and δ ij =0fori j. 2.2 GTA - Generaized Tensor Agebra Generaized Tensor Agebra is an extension of Cassica Tensor Agebra. The main distinction of GTA with respect to CTA is the addition of the concept of functiona eements. However, a matrix can be composed of constant eements

4 A Framework to Decompose GSPN Modes 131 (beonging to R) or functiona eements. A functiona eement is a function evauated in R according to a set of parameters composed of the rows of one or more matrices. Generaized tensor product is denoted by. The vaue assigned g to the eement c [ik][j] of the tensor C = A(B) B(A) isc [ik][j] = a ij (b k )b k (a i ). g Generaized tensor sum is aso anaogous to the ordinary tensor sum, and is denoted by. The eements of the tensor C = A(B) B(A) arec [ik][j] = g g a ij (b k )δ k + b k (a i )δ ij. 3 Generaized Stochastic Petri Nets The GSPN formaism [2] is a performance anaysis too on the graphica system representation typica of Petri Nets [27, 24]. The GSPN formaism is derived from the SPN formaism and contains two types of transitions: timed and immediate. An exponentiay distributed random firing time is associated with each timed transition, whereas immediate transitions, by definition, fire in zero time. Immediate transitions aways have precedence to fire over timed transitions. The GSPN modes with immediate transitions can aways be represented by a mode with timed transitions. In the graphica representation of a GSPN mode, paces are drawn as circes, timed transitions as rectanges and immediate transitions as bars. Paces may contains tokens, which are drawn as back dots. A pace is an input to a transition if an arc exists from the pace to the transition. A pace is an output from a transition if an arc exists from the transition to the pace. A transition is enabed when a of its input paces contain at east one token. Enabed transitions can fire, thus removing one token from each input pace and pacing one token in each output pace. Additionay, a condition can be associated to enabe the firing of the transitions. Such conditions are caed guards and, with the avaiabiity of tokens in the input paces, they are the ony restrictions to enabe the firing of a given transition. A forma description is presented as foows. Let C set of conditions associated to transitions of T. Definition 1. A GSPN is defined by tupe (P, T, π, I, O, W, G, M 0 ), where: 1.1. P non-empty set of paces; 1.2. T non-empty set of transitions; 1.3. π: T {0, 1} priority function of the transitions; 1.4. I and O: T P input and output functions of the transitions; 1.5. W : T R + function that assigns a rate to each transition; 1.6. G: T C function, caed guard, that associates a necessary, but not sufficient, condition c C to the firing of each transition t T; 1.7. M 0 : P N initia marking in each pace.

5 132 L. Brenner et a. Definition 2. c Cis a condition that may be associated to a transition t T, which depends on tokens of one or more p P. This condition is a function with domain on tokens of a paces p and counter-domain on R. A condition c defines the firing rate of a transition according to the number of tokens in a specific set of paces. Athough the counter-domain of c is R, ony a discrete set of vaues can be obtained, since the possibe combination of markings of paces (i.e., the domain of c) is a discrete set. Definition 3. Set of timed transitions T T of a GSPN is defined as T T = {t T π(t) =0}. Definition 4. Set of immediate transitions T I of a GSPN is defined as T I = {t T π(t) =1}. Definition 5. Set of transitions T of a GSPN is defined as T = T T T I and T T T I =. Numerica Soution Restriction. Athough the framework proposed in this paper coud be appied to a arger cass of GSPN modes, we assume a singe restriction in order to faciitate the stationary or transient numerica soution: the set of tangibe markings of the modes must be finite. 4 Framework We present in this section a framework to decompose GSPN modes. Our decomposition technique is shown in Fig. 1. The basic idea is to decompose a GSPN mode into N components GSPN (i) (i [1..N]), where each component GSPN (i) is viewed as a subsystem of the GSPN mode. A component GSPN (i) may not be a GSPN mode. It is then necessary to know the possibe tangibe markings. This is done by the construction of TRG (i) considering the possibe firing of a transitions imited by: avaiabiity of tokens; guards; and maximum number of tokens in each pace. A component GSPN (i) has an independent behavior (oca transitions) and occasiona interdependencies (synchronized transitions and/or transitions with guards). It is important to notice that there is a strong equivaence between the decomposition of a TRG (i) and the TRG of the whoe GSPN (which is the underying Markov Chain). Nevertheess the computationa cost to obtain the TRG from the composition of a TRG (i) is usuay too high. In fact, the memory needs can be prohibitive as wi be seem in the Section 6. In the next section, we define a component GSPN (i) and its properties. In Section 4.2, we formay present the tensor format (Markovian Descriptor) used to obtain the infinitesima generator Q of a decomposed GSPN mode.

6 A Framework to Decompose GSPN Modes Decomposition There is no restriction to decompose a GSPN mode with a finite set of tangibe marking into N components GSPN (i) (i [1..N]). Our technique is ess restrictive than the definition of the SGSPN formaism. Definition 6. Each component GSPN (i) is defined as a GSPN, i.e., it is defined by tupe (P (i), T (i), π (i), I (i), O (i), W (i), G (i), M (i) 0 ), where: 6.1. P (i) non-empty set of paces, such that p (i) P (i) p (i) Pand N i=1 P (i) = P and P (i) = P; 6.2. T (i) non-empty set of transitions, such that t (i) T (i) t (i) T and p I (i) (t) or p O (i) (t) such that p P (i) ; 6.3. π (i) : T (i) {0, 1} priority function of the transitions; 6.4. I (i) and O (i) : T (i) P (i) input and output functions of the transitions in which P (i) denotes a possiby empty set of paces; 6.5. W (i) : T (i) R + function that assigns a rate to each transition; 6.6. G (i) : T (i) Cfunction guard that associates a necessary, but not sufficient, condition c (i) C to the firing of each transition t (i) T (i) ; 6.7. M (i) 0 : P(i) N initia marking in each pace p (i) P (i). It is important to notice that the set of paces P (i) is a subset of P, asweas the set of transitions T (i) is a subset of T. Obviousy, the subset of paces P (i) of a component GSPN (i) cannot be the whoe set of paces P, otherwise there is no decomposition. The same restriction does not appy to T (i), since it can be identica to T. There is no restriction to paces superposition. A pace p Pcanbeinas many subsets of paces P (i) as wanted. Obviousy, the same appies to transitions. The soe restriction regards the immediate transitions that cannot be used to synchronized two or more partitions. However such restriction is a minor discomfort since a GSPN mode can be described by an equivaent SPN (i.e., without immediate transitions) mode. Eements of tupe (P (i), T (i), π (i), I (i), O (i), W (i), G (i), M (i) 0 (i) ) are conservatives, i.e., an eement in component GSPN has the same vaue of the corresponding eement in that origina GSPN, e.g., if t (i) correspond to t, then W (i) (t (i) ) has the same vaue of W (t). 4.2 Tensor Format We now formay present the tensor format (Markovian Descriptor) used to obtain the infinitesima generator Q of a decomposed GSPN mode. As shown in Fig. 1, the decomposition technique uses the concepts of Tangibe Reachabiity Graph and Stochastic State Machine. So we firsty remind the cassica definitions of P-invariants, Reachabiity Set (RS), Tangibe Reachabiity Set (TRS), Tangibe Reachabiity Graph (TRG) and Stochastic State Machine (SSM).

7 134 L. Brenner et a. GSPN (1) TRG (1) SSM (1) GSPN GSPN (N) TRG (N) SSM (N) Markovian Descriptor Fig. 1. Decomposition technique Let C incidence matrix of a GSPN (dimensions: P T ); eement from row j and coumn k of an incidence matrix. c jk Definition 7. Eements of an incidence matrix C are defined by: 7.1. p j P, t k T +1 if p j O(t k ) c jk = 1 if p j I(t k ) 0 if p j O(t k ) and p j I(t k ) Definition 8. P-invariants of a GSPN are defined by vector soutions σ composed of non-negative integer: 0 and 1, given by equation σc = 0[27], where vaue 1 in i th position of σ means that i th pace of GSPN beongs to the P- invariant. Let PI minima set of P-invariants, where PI = {PI 1, PI 2, }. The scaar product between a P-invariant and any marking M produces a constant. If in a GSPN a paces are covered by P-invariant, the maximum number of tokens in any pace in any reachabe marking is finite, and the net is said to be bounded [1]. Therefore, a GSPN must have a paces covered by P-invariants (a paces are bounded) in order to have a finite set of tangibe markings. We assume a minima set of P-invariants as a set with the smaer number of P-invariants that covers a paces of the whoe net. Let M i (p) number of tokens in pace p in marking M i ; B(PI i ) number of tokens in any P-invariant PI i (bound ); max(p) maximum number of tokens in pace p defined as the minimum B(PI i ) for a PI i, where p PI i ; M k [t>m change from marking M k to M due to the firing of t.

8 A Framework to Decompose GSPN Modes 135 Definition 9. Reachabiity Set RS (i) (M (i) 0 ) of component GSPN (i) is defined as the smaest set of markings, such that: 9.1. M (i) 0 RS (i) (M (i) 9.2. M (i) RS (i) (M (i) M (i) k 0 ); 0 ),ifandonyif p(i),m (i) (p (i) ) max(p (i) );and RS (i) (M (i) 0 ) and t T(i) such that M (i) [t>m(i) Definition 10. Tangibe Reachabiity Set TRS (i) (M (i) (i) 0 ) of component GSPN is composed of a tangibe markings of RS (i) (M (i) 0 ). Definition 11. Tangibe Reachabiity Graph TRG (i) (M (i) 0 ) of component GSPN (i) given an initia marking M (i) 0 is a abeed directed mutigraph whose set of nodes TM (i) is composed of markings of Tangibe Reachabiity Set TRS (i) (M (i) 0 ) and whose set of arcs TARC(i) is defined as foows: TARC (i) TRS (i) (M (i) 0 ) T RS(i) (M (i) (i) (i) 0 ) T T T I ; a (i) =[M (i) k,m(i),t 0,σ] TARC (i),ifandonyif M (i) k [t 0 >M (i) 1,σ = t 1,,t n, (n 0); and M (i) 2,,M(i) n such that M (i) 1 [t 1 >M (i) 2 [t 2 >M n (i) [t n >M (i) k Definition 12. A Stochastic State Machine (SSM) is defined by tupe (P, T,F,Λ), where: P set of non-empty paces; T set of non-empty transitions; F ((P T) (T P)) with dom(f ) codom(f )=P T is the fow reation. It has to satisfy the foowing restriction 1 : t T: t = t =1; Λ : T R +,whereλ(t) is the rate of the exponentia probabiity distribution associated to transition t. A decomposed GSPN mode has N components GSPN (i), where i [1..N]. Each component GSPN (i) has a tangibe reachabiity graph TRG (i) (Definition 12). Each tangibe reachabiity graph TRG (i) has an equivaent stochastic state machine SSM (i) such that: 1. Each node M (i) j TM (i) corresponds to p (i) P (i) of SSM (i) ; 2. Each arc a (i) TARC (i) corresponds to [p (i),t (i) ] F (i) and [t (i),q (i) ] F (i), if and ony if exist a (i) =[M (i) k to pace p (i) P (i), M (i) σ T (i) I.,M(i).,t,σ] such that M (i) k. corresponds,and corresponds to pace q (i) P (i), t T (i) T 1 t and t indicate the number of input and output paces of t.

9 136 L. Brenner et a. The transition rate of t (i) T (i) (obtained from [M (i) k,m(i),t,σ]) can be computed as Λ(t).Λ(σ) 2, where Λ(t) is the transition rate of t. Any transition t (i) T (i), whose guard has dependency on markings of other components GSPN (j) (i, j [1..N] andi j), has a function f mutipied by its rate. Function f is evauated as true for a markings whose its guard is satisfied, and fase otherwise. So we can now cassify a transition as oca or synchronized. Let T (i) set of oca transitions of component SSM (i) ; T s (i) set of synchronized transitions of component SSM (i). Definition 13. Set of synchronized transitions T s of a decomposed GSPN mode is defined as T s = T s (1) T s (2) T s (N). Markovian Descriptor is an agebraic formua that aows to store, in a compact form, the infinitesima generator of an equivaent Markov chain. This mathematica formua describes the infinitesima generator through the transition tensors of each component. Each component SSM (i) has associated: 1 tensor, which has a transition rates for oca transitions in T (i) ; 2 T s tensors t and + t, which have a transition rates for synchronized transitions in T (i) s. Let k (p(i),q (i) ) tensor eement k from row p (i) and coumn q (i), where i [1..N] andk {, t +,t }; I P (i) identity tensor of order P (i), where i [1..N]; τ t (p (i),q (i) ) occurrence rate of transition t T (i), where [p (i),t] F (i) and [t, q (i) ] F (i) ; succ t (p (i) ) successor pace q (i) such that [p (i),t] F (i) and [t, q (i) ] F (i). Definition 14. Tensor eements, which represent a oca transitions t of component SSM (i), are defined by: T (i) p (i),q (i) P (i) such that q (i) succ t (p (i) ) and p (i) q (i) (p (i),q (i) )= τ t (p (i),q (i) ); t T (i) p (i) P (i) such that q (i) succ t (p (i) ) (p (i),p (i) )= τ t (p (i),q (i) ); t T (i) 2 See [1] for the computation of Λ(σ) (sequence of immediate transitions).

10 A Framework to Decompose GSPN Modes p (i),q (i) P (i) such that q (i) succ t (p (i) ) and p (i) q (i) (p (i),q (i) )=0. Let η (t) ι (t) set of indices i (i [1..N]) such that component SSM (i) has at east one transition t T (i) ; index of the component SSM which has the transition rate of synchronized transition t T s, where ι (t) [1..N]. Actuay a transition t can be viewed as oca transition if η (t) = 1 or as synchronized transition if η (t) > 1. Definition 15. Tensor eements t, which represent the occurrence of synchronized transition t T s (i), are defined by: i η (t) t = I + P ; (i) p (ι(t)),q (ι(t)) P (ι(t)) such that q (ι(t)) succ t (p (ι(t)) ) Q (ι(t) ) t (p (ι(t)),q (ι(t)) )=τ + t (p (ι(t)),q (ι(t)) ); i η (t) such that i ι (t), p (i),q (i) P (i) such that q (i) succ t (p (i) ) t (p (i),q (i) )=1; i η (t), p (i),q (i) P (i) such that q (i) succ t (p (i) ) t (p (i),q (i) )=0. + Definition 16. Tensor eements t, which represent the adjustment of synchronized transition t T s (i), are defined by: i η (t) t = I P ; (i) p (ι(t)) P (ι(t) ) Q (ι(t) ) t (p (ι(t)),p (ι(t)) )= { 0 if q (ι(t)) succ t (p (ι(t)) ) τ t (p (ι(t)),q (ι(t)) ) if q (ι(t)) succ t (p (ι(t)) ) i η (t), i ι (t) { and p (i) P (i) t (p (i),p (i) 0 if q (i) succ t (p (i) ) )= 1 if q (i) succ t (p (i) ) i η (t), p (i),q (i) P (i) and p (i) q (i) t (p (i),q (i) )=0. Definition 17. Infinitesima generator Q corresponding to the Markov chain associated to a decomposed GSPN mode is represented by tensor formua caed Markovian Descriptor: Q = N g i=1 + t T s N g i=1 t + + N g i=1 t (1)

11 138 L. Brenner et a. Once a tensor sum is equivaent to a sum of particuar product tensors, the Markovian Descriptor may be represented as: Q = (N+2 T s ) j=1 where j = N g i=1 j, (2) I P (i) t + (j N) t (j (N+ Ts )) if j N and j i if j N and j = i if N<j (N+ T s ) if j>(n+ T s ) 5 Choosing a Decomposition In this section, we present severa approaches to decompose a GSPN mode. We show the necessary steps to obtain a components SSM. Afterwards, we comment about the side effect of guards and its consequences. Fig. 2 presents an exampe of a GSPN mode. Based on this mode, we show our decomposition technique appied in three different approaches. For a the possibe decomposition approaches, the demonstration in Section 4.2 can be used to obtain the equivaent tensor agebra representation automaticay. 5.1 Decomposing by Paces Firsty, we anayse a quite naive approach, which is based on decomposing a GSPN mode by paces. Each pace has a maximum number of tokens K, and so we can view each pace as a SSM with K + 1 states. A decomposed GSPN mode by paces of Fig. 2 is presented in Fig. 3. Each component SSM (i) represents the possibe states of pace p i of a GSPN mode. Note that paces p 2 and p 5 in Fig. 2 are 2-bounded, i.e., there are no P 1 t 1 P 2 P 3 P 4 t 2 t 4 P 5 P 6 P 7 t 5 Fig. 2. An exampe of a GSPN mode

12 A Framework to Decompose GSPN Modes 139 SSM (1) SSM (2) t 1 t 5 t 2 1 SSM (3) SSM (4) t t 1 t 4 t SSM (5) SSM (6) SSM (7) t t 5 t 5 t 4 t Fig. 3. Decomposed GSPN mode by paces more than 2 tokens in each pace in any marking M RS. Hence SSM (2) and SSM (5) have three paces which represent the states (0, 1 and 2) of paces p 2 and p 5 respectivey. Anaogousy, paces p 1, p 3, p 4, p 6,andp 7 are 1-bounded. So SSM (1), SSM (3), SSM (4), SSM (6), and SSM (7) have two states (0 and 1). 5.2 Decomposing by P-Invariants Other decomposition of GSPN modes is based on P-invariants. A P-invariant is composed of a set of paces with constant token count. Fig. 4 presents a decomposed mode of Fig. 2 using the P-invariants concept. There are three minima soutions of σ given by equation σc =0(seeDefinition 8). So we can define three P-invariants to GSPN mode of Fig. 2. PI 1 has two paces (p 2 and p 5 ), PI 2 has three paces (p 1, p 3 and p 6 ), and PI 3 aso has three paces (p 1, p 4 and p 7 ). SSM (1) SSM (2) SSM (3) t 2 t 1 t 1 t 2 t 4 t 5 t 5 Fig. 4. Decomposed GSPN mode by P-invariants

13 140 L. Brenner et a. Each PI i corresponds to a component SSM (i) of the GSPN mode. So, in this exampe, we can decompose the GSPN mode in three components SSM. It is important to note that, besides the transition superposition, there is a pace superposition between components SSM (2) and SSM (3). 5.3 Decomposing as Superposed GSPN Another possibe approach to decompose a GSPN mode is through transition superposition proposed by Donatei [17]. Donatei proposed the SGSPN formaism in which components (subsystems) interact each other through transition superposition. Exampe of Fig. 2 can be decomposed by SGSPN, since there is a transition which synchronizes two components GSPN. Component GSPN (1) is composed of two paces (p 2 and p 5 ), whereas component GSPN (2) is composed of five paces (p 1, p 3, p 4, p 6,andp 7 ). Once defined the components GSPN (i), it is possibe to obtain the equivaent components SSM (i). Fig. 5 presents the equivaent components SSM of the GSPN mode (Fig. 2). SSM (2) SSM (1) t 1 t 2 t 4 t 2 t 4 t 5 Fig. 5. Decomposed GSPN mode by SGSPN 5.4 Decomposing Arbitrariy It is aso possibe to decompose a GSPN mode according to an arbitrariy chosen semantic. We can decompose the GSPN mode of Fig. 2 as foows: markings of paces p 1, p 2, p 3,andp 4, as we as markings of paces p 5, p 6,andp 7. Hence component SSM (1) is obtained from distinct markings of paces p 1, p 2, p 3,and p 4 of TRG, and component SSM (2) is aso obtained from distinct markings of paces p 5, p 6,andp 7 of TRG. Note that the decomposition choice may priviege some features of the tensor format which is important to the soution method. In some cases, it may be important to decompose a GSPN mode considering: a arge or sma number of components SSM; a sma number of reachabe states; or even the difference between reachabe and unreachabe states.

14 A Framework to Decompose GSPN Modes Side Effect of Guards The concept of guards in the GSPN formaism aows transition firing dependency according to the number of tokens in each pace. Guards in GSPN are quite simiar to functiona eements in the SAN formaism [26, 18]. A natura decomposition among components GSPN of a GSPN mode can be viewed through the use of guards. Therefore, guards in the GSPN modes can aow to produce disconnected GSPN modes, which have synchronization through the guards on theirs transitions. As shown in Section 4.2, tensor format (Markovian Descriptor) of a decomposed GSPN mode uses generaized tensor sum and products. GTA operators in the Markovian descriptor are used to represent the functiona rates of transitions, but as ong as there are no guards defined to transitions, they can be cassica tensor products. Hence, guards on transitions are evauated in Markovian Descriptor by GTA operators. Another consequence of the use of guards is the possibiity to define GSPN modes with disconnected parts, i.e., modes where there is not ony a singe net, but two or more nets with no arcs connecting them. In this case, there must be guards referring to paces of other components in order to estabish an interdependency (not a synchronization) among parts. The ast exampe (Section 6.3) shows a net with disconnected parts and the use of guards to estabish the interdependency. 6 Modeing Exampes We now present three modeing exampes in order to present the approaches discussed in the previous section. The first one presents a Structured mode, the second one describes a Simutaneous Synchronized Tasks mode, whereas the ast one shows a Resource Sharing mode. 6.1 Structured Mode Fig. 6 presents an exampe of a Structured mode composed of four submodes. The submode i is composed of four paces (p ai, p bi, p ci, p di ) and two oca transitions. There are aso four synchronized transitions responsibe for the synchronization of the submodes. It is important to observe that guards were chosen to define the possibe firing sequence of transitions. This mode was introduced by Miner [20]. In this mode, the decomposition by paces is rather catastrophic, since there is a correation among marking of paces. It resuts in a quite arge product state space (65, 536 states) for a rather sma reachabe state space (ony 486 states). According to the SGSPN and P-invariants approaches, we have exacty the same decomposition and a more reasonabe product state space (1, 296 states). As a genera concusion one may discard the decomposition by paces approach, but this is not reay a fair concusion, since this mode is quite particuar. Modes

15 142 L. Brenner et a. p a1 t a1 p b1 p a2 t a2 p b2 t d1 p d1 1 4 p c1 p d2 p c2 t synch41 t synch23 p a4 p b4 p a3 p b3 t d4 t synch12 t synch34 p t c4 d4 p p t c3 c4 d3 2 3 t b2 t b3 p c3 Guards g a1 =(tk(p b1 )==0) g d1 =(tk(p a1 )==0) g a2 =(tk(p b2 )==0) g b2 =(tk(p c2 )==0) g b3 =(tk(p c3 )==0) g c3 =(tk(p d3 )==0) g c4 =(tk(p d4 )==0) g d4 =(tk(p a4 )==0) g 12 =((tk(p c1 ) == 0)&(tk(p a2 )==0)) g 23 =((tk(p d2 ) == 0)&(tk(p b3 ) == 0)) g 34 =((tk(p a3 ) == 0)&(tk(p c4 )==0)) g 41 =((tk(p d1 ) == 0)&(tk(p b4 ) == 0)) Fig. 6. Exampe of a structured mode with paces with a arger bound (nets with more tokens) may be more interesting, as the next exampe wi demonstrate. 6.2 Simutaneous Synchronized Tasks Fig. 7 describes a Simutaneous Synchronized Tasks (SST) mode in which five tasks are modeed. Such tasks have synchronization behavior among them, and those synchronization behaviors occur in different eves of the task execution. t 0 P 0 N t 1 P 1 P 5 P 9 t 2 t 5 t 8 P 2 P 6 P 7 P 10 t 6 t 9 P 3 P8 P 11 P 13 t 4 t 7 t 10 P 4 P 12 P 14 P15 t 11 P 16 Fig. 7. Simutaneous Synchronized Tasks

16 1 3 9 A Framework to Decompose GSPN Modes 143 Tabe 1. Indices of decomposed SST modes N approach #SSM SSM sizes pss rss mem Paces 17 ( ) KB P-Inv 6 ( ) KB SGSPN 2 (49 2) KB Paces 17 ( ) , 100 2KB P-Inv 6 ( ) , 100 7KB SGSPN 2 (6, 050 2) , KB Paces 17 ( ) , 391, 512 6KB P-Inv 6 ( ) , 391, KB SGSPN 2 (11, 195, 756 2) , 391, MB Paces 17 ( ) , 887, 550 6KB P-Inv 6 (1, 001 1, 001 2) , 887, KB SGSPN 2 (25, 943, 775 2) , 887, Paces 17 ( ) , 994, 747, KB P-Inv 6 (10, , 626 2) , 994, 747, 662 3MB SGSPN 2 (9, 497, 373, 831 2) , 994, 747, Paces 17 ( ) , 368, 986, KB P-Inv 6 (12, , 650 2) , 368, 986, 350 4MB SGSPN 2 (14, 684, 493, 175 2) , 368, 986, Paces 17 ( ) , 448, 238, KB P-Inv 6 (31, , 465 2) , 448, 238, MB SGSPN 2 (143, 224, 119, 373 2) , 448, 238, Tabe 1 presents some indices to compare the decomposition aternatives. In this exampe, we use the foowing approaches: decomposing by Paces (Section 5.1), decomposing by P-invariants (Section 5.2) and decomposing by Superposed GSPN (Section 5.3). N represents the number of tokens in pace P 0. The number of SSM components, decomposed by a approaches, is indicated by #SSM. SSM sizes represents the number of states in each component SSM. Product State Space, Reachabe State Space, and memory needs to store the Markovian Descriptor 3 of the mode are denoted by pss, rss, andmem respectivey. The first important phenomenon to observe in Tabe 1 is the increasing gains of the P-invariant and Paces approaches achieved to modes with arge N vaues. For sma N vaues, there is much waste in the product state space that is not significant compared to the memory savings, speciay for the Paces approach. Regarding the comparison between SGSPN and P-invariant approaches, the mode with N = 9 is a turning point, since the memory savings are aready quite significant. In fact, arger modes coud not even be generated using the SGSPN decomposition. The reationship between product and reachabe state space for 3 We do not take into account the memory needs to store neither the probabiity vector to compute soution, nor any specia structure to represent the reachabe state space.

17 144 L. Brenner et a. decomposition based on P-invariants is consideraby arge, but we beieve that an optimized soution for modes with sparse reachabe state space coud take great advantage from this decomposition approach. The second very impressive resuts taken from Tabe 1 is the very consistent gains of the Paces approach. Even though the product state space waste is consideraby arge for smaer modes (roughy one or two orders of magnitude), the difference between the product state space for the P-invariant and Paces approaches becomes insignificant for the N = 20 mode. Taking the mode to its imits (N = 21 to 27) we observe an inversion, since the Paces approach has a smaer product state space than the P-invariant approach. 6.3 Resource Sharing Fig. 8 (a) shows a traditiona exampe of a Resource Sharing (RS) mode, which has N process sharing R resources. Each process i is composed of two paces: S i (seeping) andu i (using). Tokens in pace RS represent the number of avaiabe resources, whereas they represent the number of using resources in pace RU. Fig. 8 (b) is an equivaent mode in which guards impose a restriction to the firing of each transition ta i. S1 SN RS R S 1 S N ta1 U1 tan UN RU ta 1 U 1 ta N U N Guards ga 1 =((tk(u 1)+ + tk(u N)) <R)... ga N =((tk(u 1)+ + tk(u N)) <R) tr1 trn (a) tr 1 (b) tr N Fig. 8. (a) Resource Sharing without guards - (b) Resource Sharing with guards Tabe 2 shows some indices to compare the use of guards in a GSPN mode producing, in this case, an equivaent disconnected mode. The indices for the mode of Fig. 8 (a) are shown in the without guards rows, whereas indices for the mode of Fig. 8 (b) are presented in the with guards rows. R indicates the number of tokens in pace RS of Fig. 8 (a), as we as the number of avaiabe resources in the mode of Fig. 8 (b). The computationa cost (number of mutipications) to evauate the product of a probabiity vector by the Markovian Descriptor 4, the memory needs and the CPU time to perform one singe power iteraction are denoted by c.c., mem and time respectivey. The numerica resuts for those 4 The vector-descriptor mutipication is the basic operation for most of the iterative soutions, e.g., Power method, Uniformization [28].

18 1 3 9 A Framework to Decompose GSPN Modes 145 Tabe 2. IndicesofdecomposedRSmodes(N =16) R mode #SSM SSM sizes pss rss c.c. mem time without guards 17 (2 2 2) 131, KB0.33 s with guards 16 (2 2) 65, KB0.45 s without guards 17 (2 2 4) 262, KB0.71 s with guards 16 (2 2) 65, KB0.49 s without guards 17 (2 2 10) 655, , KB 1.81 s with guards 16 (2 2) 65, , KB0.53 s 15 without guards 17 (2 2 16) 1, 048, , KB 3.07 s with guards 16 (2 2) 65, , KB0.53 s exampes were obtained on a 2.8 GHz Pentium IV Xeon under Linux operating system with 2 GBytes of memory. The resuts in Tabe 2 show the decomposition based on P-invariants, since decomposition based on SGSPN coud ony be appied to the without guards mode. Observe that SGSPN approach woud resut in exacty the same decomposition as P-invariants. The main concusion observing this tabe is the absoute gains represented by the use of guards. It resuts in a mode which has the same product state space independenty from the number of resources, as we as the pss sizes are aways smaer than those in the without guards modes. It aso has a smaer memory need and a more efficient soution (smaer computationa cost). It is a common mistake in some segments of the research community to assume that a mode which requires functiona evauations (GTA operators) has a bigger CPU time to perform vector-descriptor mutipication than equivaent modes described ony with CTA operators. In fact, such use of guards gives to this GSPN mode an efficiency as good as the one achieved by an equivaent SAN mode [7]. Obviousy, it happens due to the Markovian Descriptor representation using GTA. 7 Concusion The main contribution of this paper is to foow up the pioneer works of Ciardo and Trivedi [14], Donatei [17], and Miner [20]. Our starting point is the assumption that for reay arge (and therefore structured) modes the main difficuty is the storage of the infinitesima generator. The soution techniques are rapidy evoving and many improvements, probaby based on efficient parae soutions, wi soon enough be avaiabe. Using this assumption, we do beieve that the tensor format based on Generaized Tensor Agebra has an important roe to pay. For the moment, it benefits the Stochastic Automata Networks and it can aso be appied to Generaized Stochastic Petri Nets. A natura future theoretica work is to expand those gains to other formaisms, such as PEPANETs [19]. A more immediate future work woud be the integration of this decompo-

19 146 L. Brenner et a. sition anaysis to the sovers for SAN and GSPN (PEPS [6] and SMART [13] software toos respectivey). It is easy to precompute the possibe decomposition with their memory and computationa costs. Therefore, the integration of such precacuation may automaticay suggest the best decomposition approach according to the amount of memory avaiabe. Finay, we woud ike to concude stating that the use of tensor based storage can sti give very interesting resuts and aows the soution (which cannot be done without the storage) of arger and arger modes. References 1. M. Ajmone-Marsan, G. Babo, G. Chioa, G. Conte, S. Donatei, and G. Franceschinis. An Introduction to Generaized Stochastic Petri Nets. Microeectronics and Reiabiity, 31(4): , M. Ajmone-Marsan, G. Conte, and G. Babo. A Cass of Generaized Stochastic Petri Nets for the Performance Evauation of Mutiprocessor Systems. ACM Transactions on Computer Systems, 2(2):93 122, V. Amoia, G. De Michei, and M. Santomauro. Computer-Oriented Formuation of Transition-Rate Matrices via Kronecker Agebra. IEEE Transactions on Reiabiity, R-30(2): , R. Beman. Introduction to Matrix Anaysis. McGraw-Hi, New York, A. Benoit, L. Brenner, P. Fernandes, and B. Pateau. Aggregation of Stochastic Automata Networks with repicas. Linear Agebra and its Appications, 386: , Juy A. Benoit, L. Brenner, P. Fernandes, B. Pateau, and W. J. Stewart. The PEPS Software Too. In Computer Performance Evauation / TOOLS 2003, voume 2794 of LNCS, pages , Urbana, IL, USA, Springer-Verag Heideberg. 7. L. Brenner, P. Fernandes, and A. Saes. The Need for and the Advantages of Generaized Tensor Agebra for Kronecker Structured Representations. Internationa Journa of Simuation: Systems, Science & Technoogy, 6(3-4):52 60, February J. W. Brewer. Kronecker Products and Matrix Cacuus in System Theory. IEEE Transactions on Circuits and Systems, CAS-25(9): , P. Buchhoz, G. Ciardo, S. Donatei, and P. Kemper. Compexity of memoryefficient Kronecker operations with appications to the soution of Markov modes. INFORMS Journa on Computing, 13(3): , P. Buchhoz and T. Dayar. Bock SOR for Kronecker structured representations. Linear Agebra and its Appications, 386:83 109, Juy P. Buchhoz and P. Kemper. Hierarchica reachabiity graph generation for Petri nets. Forma Methods in Systems Design, 21(3): , G. Ciardo, M. Forno, P. L. E. Grieco, and A. S. Miner. Comparing impicit representations of arge CTMCs. In 4 th Internationa Conference on the Numerica Soution of Markov Chains, pages , Urbana, IL, USA, September G. Ciardo, R. L. Jones, A. S. Miner, and R. Siminiceanu. SMART: Stochastic Mode Anayzer for Reiabiity and Timing. In Toos of Aachen 2001 Internationa Muticonference on Measurement, Modeing and Evauation of Computer- Communication Systems, pages 29 34, Aachen, Germany, September 2001.

20 A Framework to Decompose GSPN Modes G. Ciardo and K. S. Trivedi. A Decomposition Approach for Stochastic Petri Nets Modes. In Proceedings of the 4 th Internationa Workshop Petri Nets and Performance Modes, pages 74 83, Mebourne, Austraia, December IEEE Computer Society. 15. M. Davio. Kronecker Products and Shuffe Agebra. IEEE Transactions on Computers, C-30(2): , S. Donatei. Superposed stochastic automata: a cass of stochastic Petri nets with parae soution and distributed state space. Performance Evauation, 18:21 36, S. Donatei. Superposed generaized stochastic Petri nets: definition and efficient soution. In R. Vaette, editor, Proceedings of the 15 th Internationa Conference on Appications and Theory of Petri Nets, pages Springer-Verag Heideberg, P. Fernandes, B. Pateau, and W. J. Stewart. Efficient descriptor - Vector mutipication in Stochastic Automata Networks. Journa of the ACM, 45(3): , J. Histon and L. Kou. An Efficient Kronecker Representation for PEPA modes. In L. de Afaro and S. Gimore, editors, Proceedings of the first joint PAPM-PROBMIV Workshop), pages , Aachen, Germany, September Springer-Verag Heideberg. 20. A. S. Miner. Data Structures for the Anaysis of Large Structured Markov Modes. PhD thesis, The Coege of Wiiam and Mary, Wiiamsburg, VA, A. S. Miner. Efficient soution of GSPNs using Canonica Matrix Diagrams. In 9 th Internationa Workshop on Petri Nets and Performance Modes (PNPM 01), pages , Aachen, Germany, September IEEE Computer Society Press. 22. A. S. Miner and G. Ciardo. Efficient Reachabiity Set Generation and Storage Using Decision Diagrams. In Proceedings of the 20 th Internationa Conference on Appications and Theory of Petri Nets, voume 1639 of LNCS, pages 6 25, Wiiamsburg, VA, USA, June Springer-Verag Heideberg. 23. A. S. Miner, G. Ciardo, and S. Donatei. Using the exact state space of a Markov mode to compute approximate stationary measures. In Proceedings of the 2000 ACM SIGMETRICS Conference on Measurements and Modeing of Computer Systems, pages , Santa Cara, Caifornia, USA, June ACM Press. 24. T. Murata. Petri nets: Properties, anaysis and appications. Proceedings of the IEEE, 77(4): , Apri B. Pateau. On the stochastic structure of paraeism and synchronization modes for distributed agorithms. In Proceedings of the 1985 ACM SIGMETRICS conference on Measurements and Modeing of Computer Systems, pages , Austin, Texas, USA, ACM Press. 26. B. Pateau and K. Atif. Stochastic Automata Networks for modeing parae systems. IEEE Transactions on Software Engineering, 17(10): , W. Reisig. Petri nets: an introduction. Springer-Verag Heideberg, W. J. Stewart. Introduction to the numerica soution of Markov chains. Princeton University Press, 1994.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

A Latent Variable Pairwise Classification Model of a Clustering Ensemble

A Latent Variable Pairwise Classification Model of a Clustering Ensemble A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.

More information

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION

COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION COMPARISON OF DIFFUSION MODELS IN ASTRONOMICAL OBJECT LOCALIZATION Františe Mojžíš Department of Computing and Contro Engineering, ICT Prague, Technicá, 8 Prague frantise.mojzis@vscht.cz Abstract This

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Hybrid Process Algebra

Hybrid Process Algebra Hybrid Process Agebra P.J.L. Cuijpers M.A. Reniers Eindhoven University of Technoogy (TU/e) Den Doech 2 5600 MB Eindhoven, The Netherands Abstract We deveop an agebraic theory, caed hybrid process agebra

More information

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 FRANÇOIS SIMENHAUS Université Paris 7, Mathématiques, case 7012, 2, pace Jussieu, 75251 Paris, France

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

SAT Math Must-Know Facts & Formulas

SAT Math Must-Know Facts & Formulas SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas

More information

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan

Let s get usable! Usability studies for indexes. Susan C. Olason. Study plan Let s get usabe! Usabiity studies for indexes Susan C. Oason The artice discusses a series of usabiity studies on indexes from a systems engineering and human factors perspective. The purpose of these

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems

SQL. Ilchul Yoon Assistant Professor State University of New York, Korea. on tables. describing schema. CSE 532 Theory of Database Systems CSE 532 Theory of Database Systems Lecture 03 SQL Ichu Yoon Assistant Professor State University of New York, Korea Adapted from book authors sides SQL Language for describing database schema & operations

More information

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning

Learning from evaluations Processes and instruments used by GIZ as a learning organisation and their contribution to interorganisational learning Monitoring and Evauation Unit Learning from evauations Processes and instruments used by GIZ as a earning organisation and their contribution to interorganisationa earning Contents 1.3Learning from evauations

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

Semantics-based design for Secure Web Services

Semantics-based design for Secure Web Services 1 Semantics-based design for Secure Web Services Massimo Bartoetti Pierpaoo Degano Gian Luigi Ferrari Roberto Zunino bart@di.unipi.it degano@di.unipi.it giangi@di.unipi.it zunino@di.unipi.it Dipartimento

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 1 DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 2 ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group,

More information

Fast b-matching via Sufficient Selection Belief Propagation

Fast b-matching via Sufficient Selection Belief Propagation Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia

More information

ONE of the most challenging problems addressed by the

ONE of the most challenging problems addressed by the IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

A quantum model for the stock market

A quantum model for the stock market A quantum mode for the stock market Authors: Chao Zhang a,, Lu Huang b Affiiations: a Schoo of Physics and Engineering, Sun Yat-sen University, Guangzhou 5175, China b Schoo of Economics and Business Administration,

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group, then

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68

3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68 68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page

Chapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE

PROPAGATION OF SURGE WAVES ON NON-HOMOGENEOUS TRANSMISSION LINES INDUCED BY LIGHTNING STROKE Advances in Eectrica and Eectronic Engineering 98 PROPAGATION OF SRGE WAVES ON NON-HOMOGENEOS TRANSMISSION LINES INDCED BY LIGHTNING STROKE Z. Benešová, V. Kotan WB Pisen, Facuty of Eectrica Engineering,

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

Books on Reference and the Problem of Library Science

Books on Reference and the Problem of Library Science Practicing Reference... Learning from Library Science * Mary Whisner ** Ms. Whisner describes the method and some of the resuts reported in a recenty pubished book about the reference interview written

More information

Automatic Structure Discovery for Large Source Code

Automatic Structure Discovery for Large Source Code Automatic Structure Discovery for Large Source Code By Sarge Rogatch Master Thesis Universiteit van Amsterdam, Artificia Inteigence, 2010 Automatic Structure Discovery for Large Source Code Page 1 of 130

More information

The Comparison and Selection of Programming Languages for High Energy Physics Applications

The Comparison and Selection of Programming Languages for High Energy Physics Applications The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309

More information

7. Dry Lab III: Molecular Symmetry

7. Dry Lab III: Molecular Symmetry 0 7. Dry Lab III: Moecuar Symmetry Topics: 1. Motivation. Symmetry Eements and Operations. Symmetry Groups 4. Physica Impications of Symmetry 1. Motivation Finite symmetries are usefu in the study of moecues.

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS

More information

A Data Mining Support Environment and its Application on Insurance Data

A Data Mining Support Environment and its Application on Insurance Data From: KDD-98 Proceedings. Copyright 1998, AAAI (www.aaai.org). A rights reserved. A Data Mining Support Environment and its Appication on Insurance Data M. Staudt, J.-U. Kietz, U. Reimer Swiss Life, Information

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998

Subject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998 GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy

FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,

More information

Measuring operational risk in financial institutions

Measuring operational risk in financial institutions Measuring operationa risk in financia institutions Operationa risk is now seen as a major risk for financia institutions. This paper considers the various methods avaiabe to measure operationa risk, and

More information

Insertion and deletion correcting DNA barcodes based on watermarks

Insertion and deletion correcting DNA barcodes based on watermarks Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons

WHITE PAPER UndERsTAndIng THE VAlUE of VIsUAl data discovery A guide To VIsUAlIzATIons Understanding the Vaue of Visua Data Discovery A Guide to Visuaizations WHITE Tabe of Contents Executive Summary... 3 Chapter 1 - Datawatch Visuaizations... 4 Chapter 2 - Snapshot Visuaizations... 5 Bar

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS

WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with

More information

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 TREATMENT TMENT OF GOODWILL IN ACCOUNTING Mohammad Taha GOODWILL is usuay ony recorded in an accounting system when a company purchases an unincorporated

More information

Parallel PEPS Tool Performance Analysis Using Stochastic Automata Networks

Parallel PEPS Tool Performance Analysis Using Stochastic Automata Networks FACULDADE DE INFORMTICA PUCRS - Brazil http://www.pucrs.br/inf/pos/ Parallel PEPS Tool Performance Analysis Using Stochastic Automata Networks L. Baldo, L. Fernandes, P. Roisenberg, P. Velho, T. Webber

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Introduction to XSL. Max Froumentin - W3C

Introduction to XSL. Max Froumentin - W3C Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?

More information

Distributed Strategic Interleaving with Load Balancing

Distributed Strategic Interleaving with Load Balancing Distributed Strategic Intereaving with Load Baancing J.A. Bergstra 1,2 and C.A. Middeburg 1,3 1 Programming Research Group, University of Amsterdam, P.O. Box 41882, 1009 DB Amsterdam, the Netherands 2

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04

VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS. June 2004 - publication no. 8A/04 STICHTING VAN DE ARBEID REVISION VALUE TRANSFER OF PENSION RIGHTS IN THE NETHERLANDS June 2004 - pubication no. 8A/04 Vaue transfer of pension rights in the Netherands 1. Introduction The opportunity to

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

Risk Margin for a Non-Life Insurance Run-Off

Risk Margin for a Non-Life Insurance Run-Off Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

Breakeven analysis and short-term decision making

Breakeven analysis and short-term decision making Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt

More information

SAT Math Facts & Formulas

SAT Math Facts & Formulas Numbers, Sequences, Factors SAT Mat Facts & Formuas Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reas: integers pus fractions, decimas, and irrationas ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences:

More information

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market

Structural Developments and Innovations in the Asset- Backed Commercial Paper Market Structura Deveopments and Innovations in the Asset- Backed Commercia Paper arket ark H. Adeson anaging Director, Asset-Backed Commercia Paper oody s Investors Service Strategic Research Institute 1997

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1 IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan

More information

Storing Shared Data on the Cloud via Security-Mediator

Storing Shared Data on the Cloud via Security-Mediator Storing Shared Data on the Coud via Security-Mediator Boyang Wang, Sherman S. M. Chow, Ming Li, and Hui Li State Key Laboratory of Integrated Service Networks, Xidian University, Xi an, China Department

More information

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 Steven J Manchester BRE Fire and Security E-mai: manchesters@bre.co.uk The aim of this paper is to inform

More information

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities

A Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

Optimizing QoS-Aware Semantic Web Service Composition

Optimizing QoS-Aware Semantic Web Service Composition Optimizing QoS-Aware Semantic Web Service Composition Freddy Lécué The University of Manchester Booth Street East, Manchester, UK {(firstname.astname)@manchester.ac.uk} Abstract. Ranking and optimization

More information

Traffic classification-based spam filter

Traffic classification-based spam filter Traffic cassification-based spam fiter Ni Zhang 1,2, Yu Jiang 3, Binxing Fang 1, Xueqi Cheng 1, Li Guo 1 1 Software Division, Institute of Computing Technoogy, Chinese Academy of Sciences, 100080, Beijing,

More information

LT Codes-based Secure and Reliable Cloud Storage Service

LT Codes-based Secure and Reliable Cloud Storage Service 2012 Proceedings IEEE INFOCOM LT Codes-based Secure and Reiabe Coud Storage Service Ning Cao Shucheng Yu Zhenyu Yang Wenjing Lou Y. Thomas Hou Worcester Poytechnic Institute, Worcester, MA, USA University

More information

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers

Conference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,

More information

University of Southern California

University of Southern California Master of Science in Financia Engineering Viterbi Schoo of Engineering University of Southern Caifornia Dia 1-866-469-3239 (Meeting number 924 898 113) to hear the audio portion, or isten through your

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information