A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

Size: px
Start display at page:

Download "A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation"

Transcription

1 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation Science & Technoogy, Nanjing, 0044, China Schoo o Computer & Sotware, Nanjing University o Inormation Science & Technoogy, Nanjing, 0044, China Abstract. With the growing popuarity o coud computing, more and more users outsource their private data to the coud. To ensure the security o private data, data owners usuay encrypt their private data beore outsourcing the data to the coud server, which brings incommodity o data operating. This paper proposes a scheme or simiar search on encrypted images based on a secure transormation method. The transormation on eatures protects the inormation about eatures, and does not degrade the resut accuracy. Moreover, the image owner coud update the encrypted image database as we as the secure index very easiy. Introduction Due to strong data storage and management abiity o the coud server, more and more data owners wi outsource data to the coud server. In order to ensure the security o private data, data owners need to encrypt their data beore upoading the data. Unortunatey, data encryption, i not done appropriatey, may reduce the eectiveness o data utiization. For exampe, content-based image retrieva (CBIR) techniue has been widey used in the rea word; however, the technoogies are invaid ater the eature vectors are encrypted. Currenty, searchabe symmetric encryption has been widey researched. Song et a. proposed the irst practica searchabe encryption method []. Ater that, in order to enhance the search exibiity and usabiity, some researchers proposed works to support simiar keyword search which coud toerate typing errors [-4]. On the other hand, some o the works ocused on muti-keyword searches which coud return more accurate resuts ranked according to some predeined criterions [5-8]. However, these works are mainy designed or the search on encrypted texts, and coud not be utiized directy or the encrypted images. Inspired by the searchabe encryption on texts, Lu et a. proposed a search scheme over encrypted mutimedia databases [9]. They extracted visua words rom images, based on which they coud achieve simiar search on encrypted images with the methods that are usuay empoyed by the encrypted text search schemes. However, this work is not suitabe or other image eatures except the NGCIT 03, ASTL Vo. 7, pp , 03 SERSC 03 03

2 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy visua words, and their index makes the search resut ess accurate. In this paper, we propose a scheme that not ony ensure the security o the images and eatures but aso support simiar search on encrypted images. In the proposed scheme, the encryption on eatures does not degrade the resut accuracy. Moreover, the image owner coud update the encrypted image database as we as the secure index uite easiy. Probem Formuations The proposed scheme incudes three dierent entities: image owner, coud server, and image user. Image owner has a coection o n images M = { m, m,, m n } that he wants to outsource to the coud server in encrypted orm. Meanwhie, the image owner wants to keep the capabiity to search through the images or eective utiization reasons. First, the image owner extracts a eature vector = (,,, ) T rom each image as common image retrieva system does. Secondy, the images are encrypted. Thirdy, the image owner buids a secure searchabe index I with the set{ } n i i=. Finay, the encrypted images and the index I are upoaded to the coud server. Image user is the authorized ones to use the images. We assume that the authorization between the image owner and image user is appropriatey done. In order to uery images, the image user extracts the uery eature vector rom the uery image. Then, the vector is used to generate a trapdoor TD( ). Finay, the trapdoor TD( ) is submitted to the coud server or the purpose o searching simiar images. Coud server stores the encrypted images and the index I or the image owner and processes the uery o image users. Ater receiving a uery trapdoor TD( ), coud server compares the trapdoor T ( ) with the items in index I to return k most simiar images. 3 Preiminaries 3. Feature Extraction Content-based image retrieva usuay invoves extraction o eatures and search on the eature index or simiar images. Without oss o generaity, the proposed scheme chooses the histogram eatures which are the most typica and simpest ones or CBIR. 04

3 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation We denote mxas ( ) the gray vaue at the ocation x in an image m. Then, the histogram eatures can be ormuated as { mx ( ) = i} i =, () m where { mx ( ) = i} =, i mxeuas ( ) to i, ese { mx ( ) = i} =0, m is the pixe number o the image. The simiarity between two histogram eature vectors can be evauated by Eucidean distance, deined as ( ),, D(, )= =. () i j i j ik jk k = 3. Secure Transormation Approach Image eatures in paintext may revea inormation about image content. First, the eature vector = (,,, ) T is extended as where = i i= an ( + ) ( + ) invertibe matrix R as T = (,,, ), (3). Then, the modiied eature vector is transormed with T = R, (4) where the matrix R is kept as the secure key by image owner and the authorized image user. In summary, the secure transorm agorithm can be written as = SecureTransrom( R, ) T T = R (,...,, ). (5) 4 The Proposed Scheme To achieve secure simiar search on images outsourced to the coud, the image owner needs to construct a secure searchabe index and outsource it to the coud server aong with the encrypted images. Ater that, coud server coud perorm simiar search on the index according to the uery reuests submitted by image users. The proposed scheme needs to ensure that the coud server earns nothing about the uery, index, and image databases. In this section, we describe our scheme in detai in two phases. 05

4 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy 4. The Setup Phase In the setup phase, image owner needs to buid a secure index and encrypt the images. Then, the index and the encrypted images are upoaded to the coud. Step: Key Generation. The image owner generates the private key k img eature vectors respectivey. Step: Feature Extraction. and R to encrypt the images and the The image owner extracts a eature vector = (,,, ) T rom each image in the databases M. In the proposed scheme, the eatures are the histogram eatures as it is described in subsection 3.. Step3: Secure Index Construction. Ater the eature vectors are extracted rom the image database M, they are utiized to buid secure searchabe index I. The image owner transorms each with private key R by using the secure transormation method SecureTransrom( R, ) so as to generate the corresponding encrypted eature vector. Then, the secure index I is constructed as shown in Tabe, where ID( m i ) is the identiier o ie mi that can uniuey ocate the actua ie. Tabe. The secure searchabe index I ID( m ) ID( m ) ID( m ) 3 3 ID( m ) n n Step4: Upoad. Ater constructing the index I, data owner encrypts a o the images in M with the secure key k img. Then, the encrypted images and the secure searchabe index I are upoaded to the coud. 06

5 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation 4. Search phase In search phase, the image user wants to retrieve images that are simiar to a uery image rom the coud server. In order to avoid the inormation eakage, the image user generates a secure trapdoor with the uery image. Then, the trapdoor is submitted to the coud server. Utiizing the trapdoor, the coud server returns k most simiar images by searching on the index I. Step: Trapdoor Generation. In order to uery images, the image user extracts the uery eature vector = (,,...,, ) rom the uery image with the eature extraction method introduced in the step o setup phase. Then, the uery eature vector is used to generate a trapdoor TD( ) as oowing. First, with the, the image user generates = (,...,,) T. (6),, Then, the trapdoor TD( ) is cacuated as TD R, (7) ( ) = r where r is a positive random rea number, and R is the shared secure key. Finay, the trapdoor TD( ) is submitted to coud server by the image user. Step: Search Index. Ater receiving a search reuest TD( ), the coud server wi search on the secure index I, and return k most simiar images to the user. The distance between uery vector and the vector i, i =,..., n, can be cacuated as oows: Dis TD T ( ( ), i) = ( TD( )) i T T T T ( rr (,,...,,,) ) ( R ( i,,..., i,, i ) ) = T T T,, R R i, i, i = r(,...,,) ( ) (,...,, ) ( i ) = r. (8) For every uery, the r and between and i is impied in the are the same or every i, and the Eucidean distance ( ( ), i) Dis TD. Thereore, with this distance criterion, the coud server coud return the same k most simiar resuts exacty as it does on unencrypted eature vectors. Finay, the coud server returns k most simiar resuts with minimum distance to the uery vector to image user, who coud decrypt the images with the shared key k img. 07

6 Proceedings, The nd Internationa Conerence on Next Generation Computer and Inormation Technoogy 5 Security and Perormance 5. Security Anaysis () Conidentiaity o the data: In the proposed scheme, the image database, index, and uery are encrypted. The coud server can not access the origina images and eature vectors without the secure key k img and R. () Query uninkabiity: By introducing the random vaue r in trapdoor generation, the same uery reuests wi generate dierent trapdoors. Thus, uery uninkabiity is better protected. 5. Perormance () Resut accuracy: This criterion is used to evauate the correction o the returned resuts. The accuracy o the scheme is mainy decided by the eature extraction method in common image retrieva systems. The proposed scheme hods the same resut accuracy as the common schemes that do not encrypt the eature vectors according to the ormua (8). () Time compexity: The process o index construction incudes eature extraction and eature vector transormation. The time cost o cacuation o histogram is O ( m n). Here, m is pixe number o the image, and n is number o images. The transormation o eature vectors invoves a mutipication o a ( + ) ( + ) matrix, and thus, the time cost iso (( + ) n). In summary, the time compexity o index construction iso (( m + ( + ) ) n). The search process incudes trapdoor generation and search, the time costs o which areo( ) and O ( n), respectivey. In summary, the time compexities o index construction and uery are determined by the size o database n. 6 Concusion A basic simiarity search scheme over encrypted images is proposed based on a secure transormation approach. The proposed scheme protects the conidentiaity o image database, eature vectors, and user s uery. Meanwhie, the proposed scheme possesses the same accuracy as the schemes which use the same eature extraction method but do not encrypt the eatures. However, the proposed scheme is by no means the optima one. It does not bedim the search pattern and access pattern, and thus may suer rom statistic attacks. In addition, the time compexity o uery on invert index is O ( n), which can be urther improved by using better index. In uture, we wi improve our scheme in these two aspects. 08

7 A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Acknowedgements. This work is supported by the NSFC (6306, 6034, , , 6734, 6734, 67336, 6035, 63733, , and 60739), Nationa Basic Research Program 973 (0CB3808), 0GK009, GYHY006033, , 03DFG860, SBC030569, Research Start-Up und o NUIST (0048), and PAPD und. Reerences. D. X. Song, et a., "Practica techniues or searches on encrypted data," in Security and Privacy, 000. S&P 000. Proceedings. 000 IEEE Symposium on, ed: IEEE, 000, pp C. Wang, et a., "Achieving usabe and privacy-assured simiarity search over outsourced coud data," in INFOCOM, 0 Proceedings IEEE, pp , J. Li, et a., "Fuzzy keyword search over encrypted data in coud computing," in INFOCOM, 00 Proceedings IEEE, pp. -5, M. Chuah and W. Hu, "Privacy-aware bedtree based soution or uzzy muti-keyword search over encrypted data," in Distributed Computing Systems Workshops (ICDCSW), 0 3st Internationa Conerence on, pp. 73-8, D. Boneh and B. Waters, "Conjunctive, subset, and range ueries on encrypted data," in Theory o cryptography, ed: Springer, 007, pp C. Ning, et a., "Privacy-preserving muti-keyword ranked search over encrypted coud data," in INFOCOM, 0 Proceedings IEEE, pp , W. Sun, et a., "Privacy-preserving muti-keyword text search in the coud supporting simiarity-based ranking," in Proceedings o the 8th ACM SIGSAC symposium on Inormation, computer and communications security, pp. 7-8, X. Jun, et a., "Two-Step-Ranking Secure Muti-Keyword Search over Encrypted Coud Data," in Coud and Service Computing (CSC), 0 Internationa Conerence on, pp. 4-30, W. Lu, et a., "Enabing search over encrypted mutimedia databases," in IS&T/SPIE Eectronic Imaging, pp ,

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud

An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud , pp.246-252 http://dx.doi.org/10.14257/astl.2014.49.45 An Efficiency Keyword Search Scheme to improve user experience for Encrypted Data in Cloud Jiangang Shu ab Xingming Sun ab Lu Zhou ab Jin Wang ab

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data

An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data , pp.323-332 http://dx.doi.org/10.14257/isia.2014.8.2.33 An Efficient and Privacy-Preserving Semantic Multi-Keyword Ranked Search over Encrypted Cloud Data Li Chen, Xingming Sun, *Zhihua Xia and Qi Liu

More information

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

CLOUD service providers manage an enterprise-class

CLOUD service providers manage an enterprise-class IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With

More information

Secure semantic based search over cloud

Secure semantic based search over cloud Volume: 2, Issue: 5, 162-167 May 2015 www.allsubjectjournal.com e-issn: 2349-4182 p-issn: 2349-5979 Impact Factor: 3.762 Sarulatha.M PG Scholar, Dept of CSE Sri Krishna College of Technology Coimbatore,

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

Certificateless Public Auditing for Data Integrity in the Cloud

Certificateless Public Auditing for Data Integrity in the Cloud Certificateess Pubic Auditing for Data Integrity in the Coud Boyang Wang,, Baochun Li, Hui Li and Fenghua Li, State Key Laboratory of Integrated Service Networks, Xidian University,Xi an,shaanxi,china

More information

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD

MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD MUTI-KEYWORD SEARCH WITH PRESERVING PRIVACY OVER ENCRYPTED DATA IN THE CLOUD A.Shanthi 1, M. Purushotham Reddy 2, G.Rama Subba Reddy 3 1 M.tech Scholar (CSE), 2 Asst.professor, Dept. of CSE, Vignana Bharathi

More information

Storing Shared Data on the Cloud via Security-Mediator

Storing Shared Data on the Cloud via Security-Mediator Storing Shared Data on the Coud via Security-Mediator Boyang Wang, Sherman S. M. Chow, Ming Li, and Hui Li State Key Laboratory of Integrated Service Networks, Xidian University, Xi an, China Department

More information

Hybrid Selection of Language Model Training Data Using Linguistic Information and Perplexity

Hybrid Selection of Language Model Training Data Using Linguistic Information and Perplexity Hybrid Seection o Language Mode Training Data Using Linguistic Inormation and Antonio Tora Schoo o Computing Dubin City University Dubin, Ireand atora@computing.dcu.ie Abstract We expore the seection o

More information

LT Codes-based Secure and Reliable Cloud Storage Service

LT Codes-based Secure and Reliable Cloud Storage Service 2012 Proceedings IEEE INFOCOM LT Codes-based Secure and Reiabe Coud Storage Service Ning Cao Shucheng Yu Zhenyu Yang Wenjing Lou Y. Thomas Hou Worcester Poytechnic Institute, Worcester, MA, USA University

More information

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA

A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA A NOVEL APPROACH FOR MULTI-KEYWORD SEARCH WITH ANONYMOUS ID ASSIGNMENT OVER ENCRYPTED CLOUD DATA U.Pandi Priya 1, R.Padma Priya 2 1 Research Scholar, Department of Computer Science and Information Technology,

More information

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method , pp. 129-270 http://dx.doi.org/10.14257/ijsia.2015.9.4.24 ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science,

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

How To Search Over Encrypted Cloud Data

How To Search Over Encrypted Cloud Data Xia et al. Journal of Cloud Computing: Advances, Systems and Applications 2014, 3:8 RESEARCH Open Access Secure semantic expansion based search over encrypted cloud data supporting similarity ranking Zhihua

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

Vendor Performance Measurement Using Fuzzy Logic Controller

Vendor Performance Measurement Using Fuzzy Logic Controller The Journa of Mathematics and Computer Science Avaiabe onine at http://www.tjmcs.com The Journa of Mathematics and Computer Science Vo.2 No.2 (2011) 311-318 Performance Measurement Using Fuzzy Logic Controer

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Research Article Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks

Research Article Efficient Pairing-Free Privacy-Preserving Auditing Scheme for Cloud Storage in Distributed Sensor Networks Internationa Journa of Distributed Sensor Networks Voume 2015, Artice ID 593759, 10 pages http://dx.doi.org/10.1155/2015/593759 Research Artice Efficient Pairing-Free Privacy-Preserving Auditing Scheme

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Ranked Search over Encrypted Cloud Data using Multiple Keywords

Ranked Search over Encrypted Cloud Data using Multiple Keywords Ranked Search over Encrypted Cloud Data using Multiple Keywords [1] Nita Elizabeth Samuel, [2] Revathi B. R, [3] Sangeetha.M, [4] SreelekshmySelvin, [5] Dileep.V.K [1][2][3][4] LBS Institute of Technology

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

Design and Analysis of a Hidden Peer-to-peer Backup Market

Design and Analysis of a Hidden Peer-to-peer Backup Market Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

Assessing Network Vulnerability Under Probabilistic Region Failure Model

Assessing Network Vulnerability Under Probabilistic Region Failure Model 2011 IEEE 12th Internationa Conference on High Performance Switching and Routing Assessing Networ Vunerabiity Under Probabiistic Region Faiure Mode Xiaoiang Wang, Xiaohong Jiang and Achie Pattavina State

More information

Sentiment Analysis with Global Topics and Local Dependency

Sentiment Analysis with Global Topics and Local Dependency Proceedings of the Tenty-Fourth AAAI Conference on Artificia Inteigence (AAAI-10) Sentiment Anaysis ith Goba Topics and Loca Dependency Fangtao Li, Minie Huang, Xiaoyan Zhu State Key Laboratory of Inteigent

More information

Network/Communicational Vulnerability

Network/Communicational Vulnerability Automated teer machines (ATMs) are a part of most of our ives. The major appea of these machines is convenience The ATM environment is changing and that change has serious ramifications for the security

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing

Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Privacy-preserving Ranked Multi-Keyword Search Leveraging Polynomial Function in Cloud Computing Yanzhi Ren, Yingying Chen, Jie Yang, Bin Xie 3 Department of ECE, Stevens Institute of Technology, Hoboken,

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES About ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account. Some of

More information

Betting on the Real Line

Betting on the Real Line Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing

More information

Managing Business Risks from Major Chemical

Managing Business Risks from Major Chemical Managing Business Risks from Major Chemica Process Accidents Mariana Bardy 1, Dr Luiz Fernando Oiveira 2, and Dr Nic Cavanagh 3 1 Head of Section, Risk Management Soutions Savador, DNV Energy Soutions

More information

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 TREATMENT TMENT OF GOODWILL IN ACCOUNTING Mohammad Taha GOODWILL is usuay ony recorded in an accounting system when a company purchases an unincorporated

More information

Nonlinear Orbital Dynamic Equations and State- Dependent Riccati Equation Control of Formation Flying Satellites 1

Nonlinear Orbital Dynamic Equations and State- Dependent Riccati Equation Control of Formation Flying Satellites 1 Noninear Orbita Dynamic Equations and State- Dependent Riccati Equation Contro o Formation Fying Sateites 1 Chang-Hee Won and Hyo-Sung Ahn Department o Eectrica Engineering University o North Dakota 15

More information

Migrating and Managing Dynamic, Non-Textua Content

Migrating and Managing Dynamic, Non-Textua Content Considering Dynamic, Non-Textua Content when Migrating Digita Asset Management Systems Aya Stein; University of Iinois at Urbana-Champaign; Urbana, Iinois USA Santi Thompson; University of Houston; Houston,

More information

OpenScape Desk Phone IP 35G OpenScape Voice. User Guide A31003-D3500-U101-2-7619

OpenScape Desk Phone IP 35G OpenScape Voice. User Guide A31003-D3500-U101-2-7619 OpenScape Desk Phone IP 35G OpenScape Voice User Guide A31003-D3500-U101-2-7619 Our Quaity and Environmenta Management Systems are impemented according to the requirements o the ISO9001 and ISO14001 standards

More information

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining

An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining An Efficient Multi-Keyword Ranked Secure Search On Crypto Drive With Privacy Retaining 1 B.Sahaya Emelda and 2 Mrs. P. Maria Jesi M.E.,Ph.D., 1 PG Student and 2 Associate Professor, Department of Computer

More information

Leadership & Management Certificate Programs

Leadership & Management Certificate Programs MANAGEMENT CONCEPTS Leadership & Management Certificate Programs Programs to deveop expertise in: Anaytics // Leadership // Professiona Skis // Supervision ENROLL TODAY! Contract oder Contract GS-02F-0010J

More information

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0

Art of Java Web Development By Neal Ford 624 pages US$44.95 Manning Publications, 2004 ISBN: 1-932394-06-0 IEEE DISTRIBUTED SYSTEMS ONLINE 1541-4922 2005 Pubished by the IEEE Computer Society Vo. 6, No. 5; May 2005 Editor: Marcin Paprzycki, http://www.cs.okstate.edu/%7emarcin/ Book Reviews: Java Toos and Frameworks

More information

Leakage detection in water pipe networks using a Bayesian probabilistic framework

Leakage detection in water pipe networks using a Bayesian probabilistic framework Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*

More information

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM

EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE EFFECTIVE DATA RECOVERY FOR CONSTRUCTIVE CLOUD PLATFORM Macha Arun 1, B.Ravi Kumar 2 1 M.Tech Student, Dept of CSE, Holy Mary

More information

NCH Software MoneyLine

NCH Software MoneyLine NCH Software MoneyLine This user guide has been created for use with MoneyLine Version 2.xx NCH Software Technica Support If you have difficuties using MoneyLine pease read the appicabe topic before requesting

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE

AN APPROACH TO THE STANDARDISATION OF ACCIDENT AND INJURY REGISTRATION SYSTEMS (STAIRS) IN EUROPE AN APPROACH TO THE STANDARDSATON OF ACCDENT AND NJURY REGSTRATON SYSTEMS (STARS) N EUROPE R. Ross P. Thomas Vehice Safety Research Centre Loughborough University B. Sexton Transport Research Laboratory

More information

Documentation. OpenScape Voice OpenStage 20 E SIP, OpenStage 20/20 G SIP. User Guide. Communication for the open minded. V1 R3.x V1 R4.

Documentation. OpenScape Voice OpenStage 20 E SIP, OpenStage 20/20 G SIP. User Guide. Communication for the open minded. V1 R3.x V1 R4. Documentation OpenScape Voice OpenStage 20 E SIP, OpenStage 20/20 G SIP User Guide Communication or the open minded V1 R3.x V1 R4.x Siemens Enterprise Communications www.siemens-enterprise.com Important

More information

Technology and Consulting - Newsletter 1. IBM. July 2013

Technology and Consulting - Newsletter 1. IBM. July 2013 Technoogy and Consuting - Newsetter Juy 2013 Wecome to Latitude Executive Consuting s atest newsetter, reviewing recent marketpace activity. The newsetter focuses on the Technoogy and Consuting sectors,

More information

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies

Normalization of Database Tables. Functional Dependency. Examples of Functional Dependencies: So Now what is Normalization? Transitive Dependencies ISM 602 Dr. Hamid Nemati Objectives The idea Dependencies Attributes and Design Understand concepts normaization (Higher-Leve Norma Forms) Learn how to normaize tabes Understand normaization and database

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301

US 20060288075Al (19) United States (12) Patent Application Publication (10) Pub. No.: US 2006/0288075 A1 Wu (57) A sender is selectively input- S301 US 20060288075A (19) United States (12) Patent Appication Pubication (10) Pub. No.: US 2006/0288075 A1 Wu (43) Pub. Date: Dec. 21, 2006 (54) ELECTRONIC MAILBOX ADDRESS BOOK MANAGEMENT SYSTEM AND METHOD

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

A RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE

A RAPID METHOD FOR WATER TARGET EXTRACTION IN SAR IMAGE A RAPI METHO FOR WATER TARGET EXTRACTION IN SAR IMAGE WANG ong a, QIN Ping a ept. o Surveying and Geo-inormatic Tongji University, Shanghai 200092, China. - wangdong75@gmail.com ept. o Inormation, East

More information

Efficient and Effective Clustering Methods for Spatial Data Mining

Efficient and Effective Clustering Methods for Spatial Data Mining Efficient and Effective Custering Methods for Spatia Data Mining Raymond T. Ng Department of Computer Science University of British Coumbia Vancouver, B.C., V6T 124, Canada rng@cs.ubc.ca Jiawei Han Schoo

More information

Lexmark ESF Applications Guide

Lexmark ESF Applications Guide Lexmark ESF Appications Guide Hep your customers bring out the fu potentia of their Lexmark soutions-enabed singe-function and mutifunction printers Lexmark Appications have been designed to hep businesses

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

How To Deiver Resuts

How To Deiver Resuts Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District

More information

Keyword Search over Shared Cloud Data without Secure Channel or Authority

Keyword Search over Shared Cloud Data without Secure Channel or Authority Keyword Search over Shared Cloud Data without Secure Channel or Authority Yilun Wu, Jinshu Su, and Baochun Li College of Computer, National University of Defense Technology, Changsha, Hunan, China Department

More information

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015

arxiv:1506.05851v1 [cs.ai] 18 Jun 2015 Smart Pacing for Effective Onine Ad Campaign Optimization Jian Xu, Kuang-chih Lee, Wentong Li, Hang Qi, and Quan Lu Yahoo Inc. 7 First Avenue, Sunnyvae, Caifornia 9489 {xuian,kcee,wentong,hangqi,qu}@yahoo-inc.com

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l l. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l l. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow, some of which may not appy your account Some of these

More information

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks

A MPCP-Based Centralized Rate Control Method for Mobile Stations in FiWi Access Networks A MPCP-Based Centralized Rate Control Method or Mobile Stations in FiWi Access Networks 215 IEEE. Personal use o this material is permitted. Permission rom IEEE must be obtained or all other uses, in any

More information

How To Restore A Bue Scratch In Digita Image Sequences

How To Restore A Bue Scratch In Digita Image Sequences Consigio Nazionae dee Ricerche Istituto di Cacoo e Reti ad Ate Prestazioni Restoration of bue scratches in digita image sequences Lucia Maddaena, Afredo Petrosino RT-ICAR-NA-05-2 December 2005 Consigio

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Federal Financial Management Certificate Program

Federal Financial Management Certificate Program MANAGEMENT CONCEPTS Federa Financia Management Certificate Program Training to hep you achieve the highest eve performance in: Accounting // Auditing // Budgeting // Financia Management ENROLL TODAY! Contract

More information

Copyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005

Copyright 2005 IEEE. Reprinted from IEEE MTT-S International Microwave Symposium 2005 Copyright 2005 IEEE Reprinted rom IEEE MTT-S International Microwave Symposium 2005 This material is posted here with permission o the IEEE. Such permission o the IEEE does t in any way imply IEEE endorsement

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

Restoration of blue scratches in digital image sequences

Restoration of blue scratches in digital image sequences Avaiabe onine at www.sciencedirect.com Image and Vision Computing 26 (2008) 1314 1326 www.esevier.com/ocate/imavis Restoration of bue scratches in digita image sequences Lucia Maddaena a, *, Afredo Petrosino

More information

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud

Enhanced Algorithm for Efficient Retrieval of Data from a Secure Cloud OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Volume 1, Number 2, November 2014 OPEN JOURNAL OF MOBILE COMPUTING AND CLOUD COMPUTING Enhanced Algorithm for Efficient Retrieval of Data from a Secure

More information

The Web Insider... The Best Tool for Building a Web Site *

The Web Insider... The Best Tool for Building a Web Site * The Web Insider... The Best Too for Buiding a Web Site * Anna Bee Leiserson ** Ms. Leiserson describes the types of Web-authoring systems that are avaiabe for buiding a site and then discusses the various

More information

READING A CREDIT REPORT

READING A CREDIT REPORT Name Date CHAPTER 6 STUDENT ACTIVITY SHEET READING A CREDIT REPORT Review the sampe credit report. Then search for a sampe credit report onine, print it off, and answer the questions beow. This activity

More information

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l. l l. l l. l l

ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES. l l. l l. l l. l l ELECTRONIC FUND TRANSFERS YOUR RIGHTS AND RESPONSIBILITIES The Eectronic Fund Transfers we are capabe of handing for consumers are indicated beow some of which may not appy your account Some of these may

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage

Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Implementation of Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage 1 A. MsVaishali Patil, 2 B. Prof. Archana Lomte Dept of Computer,BSIOTR, Pune ABSTRACT Cloud computing is speculated

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1

IEICE TRANS. INF. & SYST., VOL.E200 D, NO.1 JANUARY 2117 1 IEICE TRANS. INF. & SYST., VOL.E200 D, NO. JANUARY 27 PAPER Specia Issue on Information Processing Technoogy for web utiization A new simiarity measure to understand visitor behavior in a web site Juan

More information

The Comparison and Selection of Programming Languages for High Energy Physics Applications

The Comparison and Selection of Programming Languages for High Energy Physics Applications The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

On Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks

On Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks On Distributed omputation ate Optimization for Depoying oud omputing Programming Framewors Jia Liu athy H. Xia Ness B. Shroff Xiaodong Zhang Dept. of Eectrica and omputer Engineering Dept. of Integrated

More information

Creat-Poreen Power Electronics Co., Ltd

Creat-Poreen Power Electronics Co., Ltd (STOCK CODE) 002350 Creat-Poreen Power Eectronics Co., Ltd Address: 4F, Xue Zhi Xuan Mansion, NO.16 Xue Qing Road, Hasidian District, Beijing, 100083 Te: +86 (010) 82755151 Fax: +86 (010) 82755268 Website:

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

Efficient Data Partitioning Model for Heterogeneous Graphs in the Cloud

Efficient Data Partitioning Model for Heterogeneous Graphs in the Cloud Efficient Data Partitioning Mode for Heterogeneous Graphs in the Coud Kisung Lee Georgia Institute of Technoogy ksee@gatech.edu Ling Liu Georgia Institute of Technoogy ingiu@cc.gatech.edu ABSTRACT As the

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

High-order balanced M-band multiwavelet packet transform-based remote sensing image denoising

High-order balanced M-band multiwavelet packet transform-based remote sensing image denoising Wang et a. EURASIP Journa on Advances in Signa Processing (2016) 2016:10 DOI 10.1186/s13634-015-0298-7 RESEARCH High-order baanced M-band mutiwaveet packet transform-based remote sensing image denoising

More information

A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW

A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW A NOVEL ALGORITHM WITH IM-LSI INDEX FOR INCREMENTAL MAINTENANCE OF MATERIALIZED VIEW 1 Dr.T.Nalini,, 2 Dr. A.Kumaravel, 3 Dr.K.Rangarajan Dept o CSE, Bharath University Email-id: nalinicha2002@yahoo.co.in

More information

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus

Oracle. L. Ladoga Rybinsk Res. Volga. Finland. Volga. Dnieper. Dnestr. Danube. Lesbos. Auditing Oracle Applications Peloponnesus N o r w e g i a n S e a White 60ûN ATLANTIC OCEAN UNITED KINGDOM Rio Douro Hebrid Bay of Biscay Garonne Faroe Isands Shetand Isands Orkney Isands North Loire ine Rhone Rhine Po Ebe Adriatic Batic Guf of

More information

Insertion and deletion correcting DNA barcodes based on watermarks

Insertion and deletion correcting DNA barcodes based on watermarks Kracht and Schober BMC Bioinformatics (2015) 16:50 DOI 10.1186/s12859-015-0482-7 METHODOLOGY ARTICLE Open Access Insertion and deetion correcting DNA barcodes based on watermarks David Kracht * and Steffen

More information

gdoc Core Cross-platform document conversion, optimization and manipulation technology

gdoc Core Cross-platform document conversion, optimization and manipulation technology Patform gdoc Core Cross-patform document conversion, optimization and manipuation technoogy gdoc Core gdoc Core technoogy forms part of a new generation of word-cass eectronic document soutions from Goba

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

Sketch-based Network-wide Traffic Anomaly Detection

Sketch-based Network-wide Traffic Anomaly Detection Sketch-based Network-wide Traffic Anomay Detection Yang Liu, Linfeng Zhang, and Yong Guan Department of Eectrica and Computer Engineering Iowa State University, Ames, Iowa 500 Emai: {yang, zhangf, guan}@iastate.edu

More information

Licensed to: CengageBrain User

Licensed to: CengageBrain User Licensed to: Licensed to: This is an eectronic version of the print textbook. Due to eectronic rights restrictions, some third party content may be suppressed. Editoria review has deemed that any suppressed

More information