A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES

Size: px
Start display at page:

Download "A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES"

Transcription

1 A MUTI-CRITERIA EVAUATION OF INFORMATION SECURITY CONTROS USING BOOEAN FEATURES Angel R. Otero 1, Carlos E. Otero 2 an Abrar Qureshi 2 1 Grauate School of Computer an Information Sciences, Nova Southeastern Universit, Fort auerale, F, USA [email protected] 2 Department of Mathematics & Computer Science, Universit of Virginia s College at Wise, Wise, VA, USA [email protected]; [email protected] ABSTRACT For organizations, the protection of information is of utmost importance. Throughout the ears, organizations have experience numerous sstem losses which have ha a irect impact on their most valuable asset, information. Organizations must therefore fin was to make sure that the appropriate an most effective information securit controls are implemente in orer to protect their critical or most sensitive classifie information. Existing information securit control selection methos have been emploe in the past, incluing risk analsis an management, baseline manuals, or ranom approaches. However, these methos o not take into consieration organization specific constraints such as costs of implementation, scheuling, an availabilit of resources when etermining the best set of controls. In aition, these existing methos ma not ensure the inclusion of require/necessar controls or the exclusion of unnecessar controls. This paper proposes a novel approach for evaluating information securit controls to help ecision-makers select the most effective ones in resource-constraine environments. The propose approach uses Desirabilit Functions to quantif the esirabilit of each information securit control taking into account benefits an penalties (restrictions) associate with implementing the control. This provies Management with a measurement that is representative of the overall qualit of each information securit control base on organizational goals. Through a case stu, the approach is proven successful in proviing a wa for measuring the qualit of information securit controls (base on multiple application-specific criteria) for specific organizations. KEYWORDS Information securit; information securit controls; risk analsis an management; baseline manuals; best practice frameworks; esirabilit functions 1. INTRODUCTION For organizations, the protection of information is of utmost importance. Throughout the ears, organizations have experience numerous sstem losses which have ha a irect impact on their most valuable asset, information. Accoring to [1], losses relate to information securit will continue to happen an their effect will be evastate to organizations. In 2006, the CSI/FBI Computer Crime an Securit Surve state that total losses in the Unite States attributable to computer securit breaches reache $52,494,290. Further, eight former emploees of Bank of America, Wachovia, an other major banks were arreste for illegall stealing an selling account information of approximatel 500,000 customers [2]. These alarming figures point to an inaequac in toa's information securit practices an serves as motivation for fining new was to help organizations improve their capabilities for securing valuable information. DOI : /nsa

2 In toa's organizational culture, most information securit challenges are aresse through the use of securit tools an technologies, such as, encrption, firewalls, access management, etc. [3], [4]. Although tools an technologies are an integral part of organizations information securit plans [5], [6], it is argue that the alone are not sufficient to aress information securit problems [7]. To improve overall information securit, organizations must evaluate (an thus implement) appropriate information securit controls (ISC) that satisf their specific securit requirements [8], [9], [10]. However, ue to a variet of organizational-specific constraints (e.g., cost, scheule, resources availabilit), organizations o not have the luxur of selecting an implementing all require ISC. Therefore, the selection, aoption, an implementation of ISC within organizations' business constraints become a non-trivial task. This paper proposes a novel approach for evaluating an ientifing the most appropriate ISC base on organization specific criteria. The propose approach uses Desirabilit Functions to quantif the esirabilit of each ISC taking into account benefits an penalties (restrictions) associate with implementing the ISC. This provies Management with a measurement that is representative of the overall qualit of each ISC base on organizational goals. The erive qualit measurement can be use as the main metric for selecting ISC. The remainer of the paper is organize as follows. Section 2 provies a summar of previous work on ISC selection. Section 3 briefl escribes the propose solution approach. Section 4 provies etaile explanations of the Desirabilit Functions technique. Section 5 presents the results of a case stu. astl, Section 6 provies summarize conclusions an highlights of the propose approach. 2. BACKGROUND WORK Various reasons have been put forth for explaining the lack of effectiveness in the evaluation, selection, an implementation process of ISC. Base on [11], the implementation of ISC in organizations ma constitute a barrier to progress. For instance, participants from the ICIS 1993 conference panel inicate that the implementation of ISC ma slow own prouction thereb turning the emploees work ineffective [12]. Emploees ma view ISC as interrupting their a-to-a tasks [13] an ma, therefore, ten to ignore implementing them in orer to be effective an efficient with their ail job tasks. Accoring to [14], organizations are require to ientif an implement appropriate controls to ensure aequate information securit. In [15], the authors place emphasis on the fact that ifferent organizations have ifferent securit nees, an thus ifferent securit requirements an objectives. In aition, [16] stress that there is no single information securit solution that can fit all organizations. As a result, ISC must be carefull selecte to fit the specific nees of the organization. Ientification an implementation of the most effective ISC is a major step towars proviing an aequate level of securit in organizations [8] Previous Approaches in the Selection of ISC in Organizations Base on [8], the process of ientifing (an selecting) the most effective ISC in organizations has been a challenge in the past, an plent of attempts have been mae to come up with the most effective wa possible. Risk analsis an management (RAM) is just one example. RAM has been recognize in the literature as an effective approach to ientif ISC [8]. RAM consists of performing business analses as well as risk assessments, resulting in the ientification of information securit requirements [8]. RAM woul then list the information securit requirements as well as the propose ISC to be implemente to mitigate the risks resulting from the analses an assessments performe. RAM, however, has been escribe as a subjective, bottom-up approach [17], not taking into account organizations specific constraints. For example, through performing RAM, organizations ma ientif 50 information securit risks. Nonetheless, Management ma not be 2

3 able to select an implement all necessar ISC to aress the previousl ientifie 50 risks ue to costs an scheuling constraints. Moreover, there ma not be enough resources within the organization to implement these ISC. In this case, Management shoul lists all those risks ientifie an etermine how critical each iniviual risk is to the organization, while consiering cost versus benefit analses. Management must, therefore, explore new was to etermine/measure the relevanc of these ISC consiering the constraints just presente. Baseline manuals or best practice frameworks is another approach wiel use b organizations to introuce minimum securit controls in organizations [8]. Per [14], best practice frameworks assist organizations in ientifing appropriate ISC. Some best practices inclue: Control Objectives for Information an relate Technolog (COBIT), Information Technolog Infrastructure ibrar (ITI), an Operationall Critical Threat, Asset an Vulnerabilit Evaluation (OCTAVE). Aitionall, [9] have mentione other best practice frameworks which have assiste in the ientification an selection of ISC. These are: International Organization for Stanarization (ISO) / International Electrotechnical Commission (IEC) an ISO/IEC 27001, PROTECT, Capabilit Maturit Moel (CMM), an Information Securit Architecture (ISA). The process of selecting the most effective ISC from these best practice frameworks can be challenging [17]. Accoring to [17], best practice frameworks leave the choosing of controls to the user, while offering little guiance in terms of etermining the best controls to provie aequate securit for the particular business situation. Aitionall, frameworks o not take into consieration organization specific constraints, such as, costs of implementation, scheuling, an resource constraints. Other less formal methos use in the past, such as, a hoc or ranom approaches, coul lea to the inclusion of unnecessar controls an/or exclusion of require/necessar controls [8]. Ientifing an selecting ISC base on the above ma result in organizations not being able to protect the overall confientialit, integrit, an availabilit of their information [14]. In orer to increase the effectiveness of the selection an prioritization process for ISC, new methos nee to be evelope that save time while consiering major factors (e.g., constraints, restrictions, etc.) that unoubtel affect the selection of ISC. From the reviewe literature, it is evient that the selection of ISC is mostl riven b cost, scheuling, an resource availabilit. In other wors, ISC at organizations will be selecte b Management when the benefits of implementing them surpass the costs of establishing the control. Equall important, scheuling issues ma affect whether ISC shoul be selecte. Implementation of ISC ma require specific scheule times, not necessaril planne b the organization. Finall, availabilit of personnel often etermines whether ISC can be selecte or not. Effective information sstem securit implementation requires the ientification an aoption of the most appropriate an effective set of ISC [17] taking into account the issues presente above. 3. SOUTION APPROACH To properl evaluate the qualit, importance, an priorit of ISC in organizations, Management must follow a methoolog that takes into consieration the qualit attributes of the ISC that are consiere relevant. The methoolog must provie capabilities to etermine the relative importance of each ientifie qualit attribute. This woul allow the methoolog to provie an ISC selection/prioritization scheme that represent how well these ISC meet qualit attributes an how important those qualit attributes are for the specific organization. To achieve this, the methoolog create in [18] is moifie an customize to solve the problem of prioritizing ISC in organizations. First, a set of qualit attributes are ientifie as evaluation criteria for all possible ISC. These attributes are efine in terms of ifferent features, where each feature is etermine to be either present or not. Once all features are ientifie, each iniviual ISC is evaluate against each feature using a simple binar (boolean) scale (i.e., 0 or 1). ISC that 3

4 satisf the highest number of features woul expose a higher level of qualit (or priorit) for that particular qualit attribute. Once all ISC are evaluate an measurements compute for all features, the propose approach uses Desirabilit Functions to fuse all measurements into one unifie value that is representative of the overall qualit of the ISC. This unifie value is compute b using a set of Desirabilit Functions that take into consieration the priorit of each qualit attribute. Therefore, the resulting priorit of each ISC is erive base on Management s goals an organization s specific nees. This results in an ISC evaluation/prioritization approach base on how well ISC meet qualit attributes an how important those qualit attributes are for the organization. 4. DESIRABIITY FUNCTIONS Desirabilit Functions are a popular approach for simultaneous optimization of multiple responses [19], [20]. The have been use extensivel in the literature for process optimization in inustrial settings, where fining a set of operating conitions that optimize all responses for a particular sstem is esire [18], [21]. Through Desirabilit Functions, each sstem response i is converte into an iniviual function i that varies over the range 0 i 1, where i = 1 when a goal is met, an i = 0 otherwise [20]. Once each response is transforme, the levels of each factor are tpicall chosen to maximize the overall esirabilit which is represente as the geometric mean of all m transforme responses [19]. Alternativel, when factors are uncontrollable, the overall esirabilit value can be use to characterize the sstem base on the multiple selecte criteria. Similar to the characterization of inustrial processes, the evaluation of the qualit an prioritization of each ISC in organizations can be approache b fining the set of criteria that provie the optimal benefit versus cost value for a particular organization. When formulate this wa, Desirabilit Functions can be use to provie a unifie measurement that characterizes the qualit of ISC base on a set of preefine evaluation criteria. Once the esirabilit of all ISC is compute, Management can use this information to etermine the relative priorit of ISC an select the best ones simpl b choosing the most esirable ones for a particular organization Computing Desirabilit The first step in the Desirabilit Functions approach involves ientifing all possible ISC that coul be implemente in an organization. These ISC can be obtaine from the best practice frameworks liste in Section 2. For instance, the ISO/IEC stanar has over 127 ISC available accoring to the organizations specific nees [14]. Once selecte, the results of these ISC are capture in the ISC vector, as presente in (1). n1 n2 X = M n n (1) Once the ISC vector is ientifie, each ISC can be evaluate against a set of qualit attributes QA 1, QA 2,.., QA n. The evaluation process takes place as follow. First, each qualit attribute is efine in terms of m features, where m > 1. The evaluation scale for each feature is binar; that is, the feature is evaluate as being present/true (i.e., 1) or missing/false (i.e., 0). For example, ISC can be prioritize base on their Scope. In other wors, ISC that provie securit of information in man sstems have a higher priorit than ISC that aress securit of information in a minimal number of sstems. In this case, the qualit attribute Scope can be efine with the following features: Sstem 1, Sstem 2,..., Sstem n. Therefore, the highest priorit ISC (base on the Scope qualit attribute) woul be one where Sstem 1 = 1, Sstem 2 = 1, an Sstem n = 1. Similarl, the lowest priorit ISC base on the Scope qualit attribute is 4

5 one where Sstem 1 = 0, Sstem 2 = 0, an Sstem n = 0. For qualit attributes where the presence of features affects the securit of information negativel (e.g., restrictions, penalties), the reverse is true. In these cases, ISC with all features present (i.e., 1) result in lower priorit an ISC with all features missing (i.e., 0) result in higher priorit. With this framework in place, a measurement of the importance of the j th ISC base on the i th qualit attribute (e.g., Scope) can be compute using (2), m m f x x= = 0 (2) where m is the number of features ientifie for the i th qualit attribute. This computation normalizes the evaluation criteria to a scale of 0 100, where 0 represents the lowest score an 100 the highest (or backwars for restrictions or penalties). The overall assessment of the ISC set base on all qualit attributes is capture using the qualit assessment matrix Q presente in (3). As seen, each value of the matrix represents the score of the j th ISC base on each iniviual i th qualit attribute. It is important to point out that the qualit assessment matrix can be extene to evaluate ISC base on an qualit attributes containing numerous features. Q = QA M n QA M 2 2n O QAm m 1 m2 M mn (3) Finall, to assess the importance of each qualit attribute, a weight vector W is create where r i represents the importance of the QA i qualit attribute using the scale 0 10, where 0 represents lowest importance an 10 represents highest importance. The weight vector W is presente in (4). r1 r2 W = M r m (4) Once the information from X, Q, an W is collecte, esirabilit values for each ISC can be compute using the esirabilit matrix presente in (5). As seen, each value of the matrix represents the esirabilit of the j th ISC base on each iniviual i th qualit attribute. 12 = M 1n M 2n Each iniviual esirabilit value for the ISC is compute accoring to Management base on the organization s specific nees an goals. For example, qualit attributes that are represente positivel b a higher value are transforme using the maximization function in (6) [20]. Alternativel, qualit attributes that are represente negativel b a higher value are transforme using the minimization function in (7) [20], O m1 m2 M mn (5) 5

6 0 = T 1 ri T > T (6) 1 U = U T 0 ri T < T U > U (7) where an U are the lower an upper limits, T is the target objective (e.g., 100 for maximization, 0 for minimization), an r i is the esirabilit weight for the i th qualit attribute. It is important to note that (6) an (7) are the normal equations for the Desirabilit Function approach. However, through experimentation, it was foun that the approach for ISC selection an prioritization performe better when > 0. Therefore, as heuristic, when is less than.0001, the value is set to A esirabilit weight of r = 1 results in a linear Desirabilit Function; however, when r > 1, curvature is expose b the Desirabilit Function to emphasize on being close to the target objective (T). When 0 < r < 1, being close to the target objective is less important. Once iniviual esirabilit values for each qualit attribute are compute, the overall ISC esirabilit value can be compute using (8). As seen, each overall esirabilit value is compute as the geometric mean of all m iniviual esirabilit values for ISC 1, 2,, n. After the overall esirabilit value is compute for all ISC, Management can use this value as a priorit measurement erive from the preefine qualit attributes an their relative importance for the particular organization. 5. CASE STUDY D = m i= 1 m i= 1 m i= 1 i1 i2 M in This section presents the results of an ISC evaluation/prioritization case stu using the propose approach. The case stu evaluates 10 ISC base on the following ientifie qualit attributes, some of which have been efine within the ISO/IEC stanar [9]. Restrictions there are restrictions that Management must take into account before selecting an implementing ISC. These ma inclue whether the costs involve in the selection an implementation of ISC are high, whether resources are not available, an whether there are scheuling constraints associate with implementing the ISC. The presence of an of the above will negativel affect the specific qualit attribute. That is, ISC with all features present will result in a lower priorit; conversel, ISC with all 1 m 1 m 1 m (8) 6

7 features missing will result in a higher priorit. A high priorit scenario will be one where the implementation cost of the specific ISC is consiere aequate an/or manageable (e.g., within buget), resources are available to implement the particular ISC, an there are no restrictions in terms of scheuling the ISC (i.e., the ISC can be scheule antime uring the ear). Restrictions is efine as: Costs (C), Availabilit of Resources (AoR), an Scheuling (T). Scope This qualit attribute assesses the impact of the ISC on the organization. ISC that provie securit of information in man sstems have a higher priorit than ISC that aress securit of information in a minimal number of sstems. Scope is efine as: Sstem 1 (S1), Sstem 2 (S2),, Sstem n (Sn). Organization s Objectives the number of information securit objectives the ISC satisfies. The higher the number of objectives the ISC satisfies, the higher the esirabilit of the ISC. Organization s objectives is efine with the following features: Objective 1 (O1), Objective 2 (O2),, Objective n (On). Phsical Access ISC will prevent an/or recor unauthorize access to the organization s builing facilities, incluing computer rooms where information processing takes place, the finance/accounting epartment, human resources epartment, etc. The higher the number of phsical locations aresse b the ISC, the higher the esirabilit of the ISC. Phsical access is efine as: ocation 1 (1), ocation 2 (2),, ocation n (n). Access Controls implementation of an ISC for this qualit attribute will promote appropriate levels of access controls to ensure protection of the organization s sstems/applications against unauthorize activities. Organizations ma implement network access controls (N), operating sstems access controls (O), an application controls (A) base on their specific nees. Human Resources implementation of an ISC supports reuctions of risk of theft, frau, or misuse of computer resources b promoting information securit awareness (Aw), training (Tn), an eucation of emploees (E) [22]. Depening on the particular situation, costs involve, an availabilit of personnel, organizations ma select which of these to emplo. Communications an Operations Management ISC will ensure the correct an secure operation of information processing facilities, which inclues aressing for aequate segregation of uties (SoD), change management (CM), an network securit (NS). Organizations ma select ISC to aress all of these or just some epening on their particular nees. Sstems Acquisition, Development, an Maintenance ISC will support securit relate to the organization s in-house an/or off-the-shelf sstems or applications (e.g., ensuring personnel with authorize access can move changes into prouction environments, etc.). The higher the number of sstems or applications aresse b the ISC, the higher the esirabilit of the ISC. Sstems Acquisition, Development, an Maintenance is efine as: Sstems or Applications 1 (SoA1), Sstems or Applications 2 (SoA2),, an Sstems or Applications n (SoAn). Incient Management ensures that securit-relate incients (e.g., attempts to change/manipulate financial ata, etc.) ientifie within the organization s processing of information are communicate in a timel manner an that corrective action is taken for an exceptions ientifie. Incient management ma appl to online processing 7

8 an/or batch processing. Incient Management is efine as Processing 1 (P1), Processing 2 (P2),, an Processing n (Pn). Using snthetic ata for the ientifie qualit attributes, a binar input evaluation (Table 1), an Desirabilit Functions parameters (Table 2), results were generate from the Desirabilit Functions an presente in Table 3. As seen in Table 2, all lower an upper bounaries are set to 0 an 100, respectivel. Also, all qualit attributes have been ientifie as having equal priorit. This is accomplishe b setting the weight r = 1 for all qualit attributes. Finall, ifferent target values have been ientifie for each qualit attribute. This means that the threshol for achieving 100% esirabilit is customize for each qualit attribute. For example, qualit attributes where T = 70 are consiere 100% esirable if the exhibit 70% (or more) of the features that efine them. Table 1. Binar Input Evaluation. Table 2. Desirabilit Functions Parameters. Table 3. Desirabilit Functions Results. 8

9 As evience, each ISC has been evaluate using the ientifie features for each qualit attribute. The binar input scale is use to etermine the presence of features. Using the propose approach, the most esirable ISC (base on the qualit attributes) is ISC 4 an ISC 7, followe b ISC 2 an ISC 10, an so on. It is important to notice that the evaluation of ISC using this approach is full epenent on the particular scenario at han. In this case stu, the results are base on the parameters configure in Table 2. However, if change to reflect more priorit on ifferent qualit attributes, the results woul var from the ones presente in Table 3. In aition, ifferent applications of the approach can contain numerous features, which make it full customizable for practical applications. These are perhaps the most meaningful contributions from this research; that is, the abilit to full customize an prioritize organization's goals when selecting ISC. This all can be one easil through simple spreasheet calculations. Similar to this case stu, man ifferent organizational-specific parameters can be specifie for the Desirabilit Functions to properl prioritize/evaluate ISC in inustr scenarios. 6. CONCUSION The research presente in this paper evelops an innovative approach for evaluating the qualit of ISC in organizations base on a multiple qualit evaluation criteria. Specificall, it presents a methoolog that uses Desirabilit Functions to create a unifie measurement that represents how well ISC meet qualit attributes an how important the qualit attributes are for the organization. Through a case stu, the approach is proven successful in proviing a wa for measuring the qualit of ISC for specific organizations. There are several important contributions from this research. First, the approach is simple an reail available for implementation using a simple spreasheet. This can promote usage in practical scenarios, where highl complex methoologies for ISC selection are impractical. Secon, the approach fuses multiple evaluation criteria an features to provie a holistic view of the overall ISC qualit. Thir, the approach is easil extene to inclue aitional qualit attributes not consiere within this research. Finall, the approach provies a mechanism to evaluate the qualit of ISC in various omains. B moifing the parameters of the Desirabilit Functions, qualit of ISC can be evaluate b taking consieration of prioritize qualit attributes that are necessar for ifferent organizations. This can be beneficial for cases such as [23], where the approach can be use to assess an help efine information sstems securit policies [23] an controls that are most effective. Overall, the approach presente in this research prove to be a feasible technique for efficientl evaluating the qualit of ISC in organizations. ACKNOWEDGEMENTS The authors woul like to thank the reviewers whose constructive critique greatl improve the qualit of the paper. REFERENCES [1] M. Schwartz, Computer securit: Planning to protect corporate assets, Journal of Business Strateg, vol. 11(1), pp , [2]. Yuan, Companies face sstem attacks from insie, too, Wall Street Journal, pp. B1 (2005, June 15). [3]. Volonino an S. R. Robinson, Principles an Practice of Information Securit. Pearson Prentice Hall, Inc., New Jerse, [4] E. Vaast, Danger is in the ee of the beholers: Social representations of information sstems securit in healthcare, Journal of Strategic Information Sstems, vol. 16(1), pp ,

10 [5] S. Ransbotham an S. Mitra, Choice an chance: A conceptual moel of paths to information securit compromise, Information Sstems Research, vol. 20(1), pp , [6] G. Rotvol, How to create a securit culture in our organization, Information Management Journal, vol. 42(6), pp , [7] T. Herath an H. R. Rao, Encouraging information securit behaviors in organizations: Role of penalties, pressures, an perceive effectiveness, Decision Support Sstems, vol. 47(2), pp , [8]. Barnar an R. Von Solms, A formalize approach to the effective selection an evaluation of information securit controls, Computers & Securit, vol. 19(2), pp , [9] A. Da Veiga an J. H. P. Eloff, An information securit governance framework, Information Sstems Management, vol. 24(4), pp , [10] M. Kara, E. Kiountouzis, an S. Kokolakis, Information sstems securit policies: A contextual perspective, Computer Securit, vol. 24(1), pp , [11] C. Woo, An unappreciate reason wh securit policies fail, Computer Frau an Securit, vol. 10(1), pp , [12] K. och, S. Conger, an E. Oz, Ownership, privac an monitoring in the workplace: A ebate on technolog an ethics, Journal of Business Ethics, vol. 17, pp , [13] G. V. Post an A. Kagan, Evaluating information securit traeoffs: Restricting access can interfere with user tasks, Computers & Securit, vol. 26(3), pp , [14] R. Saint-Germain, Information securit management best practice base on ISO/IEC 17799, The Information Management Journal, vol. August 2005, pp , [15] R. Baskerville an M. Siponen, An information securit meta-polic for emergent organizations, Journal of ogistics Information Management, vol. 15(1), pp , [16] M. E. Whitman, A. M. Towsen, an R. J. Aalberts, Information sstems securit an the nee for polic, in G. Dhillon, Es. Information securit management: Global challenges in the new millennium (pp 9-18). Hershe, PA: Iea Group Publishing (2001). [17] H. Van er Haar an R. Von Solms, A moel for eriving information securit controls attribute profiles, Computers & Securit, vol. 22(3), pp , [18] C. E. Otero, E. Dell, A. Qureshi, an. D. Otero, A qualit-base requirement prioritization framework using binar inputs, In 4th Asia International Conference on Mathematical/Analtical Moeling & Computer Simulation, pp , [19] G. Derringer an R. Suich, Simultaneous optimization of several response variables, Journal of Qualit Technolog, vol. 12(1), pp , [20] D. Montgomer, Design an Analsis of Experiments. John Wile & Sons, Inc., New York, [21] C. E. Otero,. D. Otero, I. Weissberger, an A. Qureshi, A multi-criteria ecision making approach for resource allocation in software engineering, In 12th International Conference on Computer Moeling an Simulation, pp , [22] J. D Arc, A. Hovav, an D. Galletta, User awareness of securit countermeasures an its impact on information sstems misuse: A eterrence approach, Information Sstems Research, vol. 20(1), pp , [23] Wilkinson, K., IT Securit Incients Prompt Nashville, Tenn., to Strengthen Polic, Hire IT Securit Chief, retrieve on August 24,

11 Authors Angel R. Otero was born in 1974 in Baamon, Puerto Rico. He receive his B.S. in Accounting from The Pennslvania State Universit an M.S. in Software Engineering from the Floria Institute of Technolog. Mr. Otero is currentl a Ph.D. stuent at Nova Southeastern Universit's Grauate School of Computer an Information Sciences. Mr. Otero is currentl a Manager in the Floria/Puerto Rico Enterprise Risk Services practice of Deloitte & Touche, P, base in Puerto Rico. He has over 13 ears of inustr experience in the areas of public accounting/auiting, information technolog consulting, an information sstems auiting. Mr. Otero is a Certifie Public Accountant, Certifie Information Sstems Auitor, Certifie Information Technolog Professional, an Certifie Internal Controls Auitor. He is also a member of the American Institute of Certifie Public Accountants, the Information Sstems Auit an Control Association, the Puerto Rico Societ of Certifie Public Accountants, an The Institute for Internal Controls. Dr. Carlos E. Otero was born in 1977 in Baamon, Puerto Rico. He receive his B.S. in Computer Science, M.S. in Software Engineering, M.S. in Sstems Engineering, an Ph.D. in Computer Engineering from the Floria Institute of Technolog, in Melbourne, F. His primar research interests inclue performance evaluation an optimization of sstems an processes in a wie variet of omains (incluing wireless sstems, software engineering, an sstems engineering). He is currentl Assistant Professor in the epartment of Mathematics an Computer Science at the Universit of Virginia s College at Wise, Wise, VA. Previousl, he was ajunct professor in the epartment of Electrical & Computer Engineering at Floria Institute of Technolog. He has over 10 ears of inustr experience in satellite communications sstems, comman & control sstems, wireless securit sstems, an unmanne aerial vehicle sstems. Dr. Otero is an active professional member of the ACM an active senior member of the IEEE. Dr. Abrar Qureshi receive a BS egree in Mathematics from the Universit of the Punjab, a BS in Electrical Engineering from Central Philippines Universit, an a MS an Ph.D. in Computer Engineering from Floria Institute of Technolog. He is currentl Assistant Professor in the epartment of Mathematics an Computer Science at the Universit of Virginia s College at Wise, Wise, VA. Before joining UVa-Wise, he worke in Inustr for more than thirteen ears where he worke on various software engineering projects, software evelopment, atabase esign, sstem/software test an automation, an qualit assurance. His research interests inclue software testing, qualit assurance, an software securit. 11

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University [email protected] Abstract A number of Enterprise Frameworks

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis. The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist [email protected] Juith I. Stallmann

More information

INCOME PROTECTION CLAIMS CLAIM FORM FOR THE SELF EMPLOYED

INCOME PROTECTION CLAIMS CLAIM FORM FOR THE SELF EMPLOYED PENSIONS INvESTMENTS LIFE INSURANCE INCOME PROTECTION CLAIMS CLAIM FORM FOR THE SELF EMPLOYED If ou are an Emploe Person o not complete this form. Please ring our Insurance Broker or Irish Life irectl

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

y or f (x) to determine their nature.

y or f (x) to determine their nature. Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone ([email protected]) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

Software Diversity for Information Security

Software Diversity for Information Security for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,

More information

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements. WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Gender Differences in Educational Attainment: The Case of University Students in England and Wales

Gender Differences in Educational Attainment: The Case of University Students in England and Wales Gener Differences in Eucational Attainment: The Case of University Stuents in Englan an Wales ROBERT MCNABB 1, SARMISTHA PAL 1, AND PETER SLOANE 2 ABSTRACT This paper examines the eterminants of gener

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Trace IP Packets by Flexible Deterministic Packet Marking (FDPM) Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability

Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability www.corporate-env-strategy.com Sustainability Inex Dow Jones Sustainability Group Inex: A Global Benchmark for Corporate Sustainability Ivo Knoepfel Increasingly investors are iversifying their portfolios

More information

Sustainability Through the Market: Making Markets Work for Everyone q

Sustainability Through the Market: Making Markets Work for Everyone q www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Improving Direct Marketing Profitability with Neural Networks

Improving Direct Marketing Profitability with Neural Networks Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit [email protected] ABSTRACT Web site aresses of small on line retailers are often unknown

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

INTRODUCTION TO BEAMS

INTRODUCTION TO BEAMS CHAPTER Structural Steel Design LRFD etho INTRODUCTION TO BEAS Thir Eition A. J. Clark School of Engineering Department of Civil an Environmental Engineering Part II Structural Steel Design an Analsis

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Cost optimization of supply chain with multimodal transport

Cost optimization of supply chain with multimodal transport Proceeings of the Feerate Conference on Computer Science an Information Systems pp. 8 ISB 978-83-6080-5-4 Cost optimization of supply chain with multimoal transport Paweł Sitek Kielce University of Technology

More information

Aon Retiree Health Exchange

Aon Retiree Health Exchange 2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie

More information

Hybrid Model Predictive Control Applied to Production-Inventory Systems

Hybrid Model Predictive Control Applied to Production-Inventory Systems Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control

More information

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an

More information

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer

More information

S&P Systematic Global Macro Index (S&P SGMI) Methodology

S&P Systematic Global Macro Index (S&P SGMI) Methodology S&P Systematic Global Macro Inex (S&P SGMI) Methoology May 2014 S&P Dow Jones Inices: Inex Methoology Table of Contents Introuction 3 Overview 3 Highlights 4 The S&P SGMI Methoology 4 Inex Family 5 Inex

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Manure Spreader Calibration

Manure Spreader Calibration Agronomy Facts 68 Manure Spreaer Calibration Manure spreaer calibration is an essential an valuable nutrient management tool for maximizing the efficient use of available manure nutrients. Planne manure

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy

Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Cisco 7206 VXR NPE-G2 with VSA FIPS 140-2 Non-Proprietary Security Policy Level 2 Valiation Version 1.1 July 2011 Table of Contents Introuction 2 References 2 Document Organization 2 Moule Descriptions

More information

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

Bond Calculator. Spreads (G-spread, T-spread) References and Contact details

Bond Calculator. Spreads (G-spread, T-spread) References and Contact details Cbons.Ru Lt. irogovskaya nab., 21, St. etersburg hone: +7 (812) 336-97-21 http://www.cbons-group.com Bon Calculator Bon calculator is esigne to calculate analytical parameters use in assessment of bons.

More information

Wage Compression, Employment Restrictions, and Unemployment: The Case of Mauritius

Wage Compression, Employment Restrictions, and Unemployment: The Case of Mauritius WP/04/205 Wage Compression, Employment Restrictions, an Unemployment: The Case of Mauritius Nathan Porter 2004 International Monetary Fun WP/04/205 IMF Working Paper Finance Department Wage Compression,

More information

A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment

A Study on Intelligent Video Security Surveillance System with Active Tracking Technology in Multiple Objects Environment Vol. 6, No., April, 01 A Stud on Intelligent Video Securit Surveillance Sstem with Active Tracking Technolog in Multiple Objects Environment Juhun Park 1, Jeonghun Choi 1, 1, Moungheum Park, Sukwon Hong

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, [email protected] Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain [email protected]

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information