Dynamic Network Security Deployment Under Partial Information

Size: px
Start display at page:

Download "Dynamic Network Security Deployment Under Partial Information"

Transcription

1 Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan epfl.ch John S. Baras University of Marylan College Park, MD, USA um.eu Jean-Yves Le Bouec EPFL Lausanne, Switzerlan epfl.ch Abstract A network user s ecision to start an continue using security proucts is base on economic consierations. The cost of a security compromise e.g., worm infection) is compare against the cost of eploying an maintaining a sufficient level of security. These costs are not necessarily the real ones, but rather the perceive costs, which epen on the amount of information available to a user at each time. Moreover, the costs whether real or perceive) epen on the ecisions of other users, too: The probability of a user getting infecte epens on the security eploye by all the other users. n this paper, we combine an epiemic moel for malware propagation in a network with a game theoretic moel of the users ecisions to eploy security or not. Users can ynamically change their ecision in orer to maximize their currently perceive utility. We stuy the equilibrium points, an their epenence on the spee of the learning process through which the users learn the state of the network. We fin that the faster the learning process, the higher the total network cost.. NTRODUCTON Mobile evices cellphones, smartphones, pocket PCs, etc.) acquire more an more capabilities in terms of both computation an communication. Processors are getting faster, memory an storage capacity increase, an as a consequence applications for such evices multiply in number an complexity. On the other han, communication interfaces multiply, too: Cellphones use to have only GSM protocol implementations, but now most have also GPRS, UMTS, Bluetooth, an of course many smartphones are WiFi enable. These capabilities have mae mobile evices very popular. Their popularity combine with their capabilities have mae them an attractive target for malware [], []. No user likes his evice to be infecte with malware; on the other han, installing an using security software costs money, battery, CPU resources, an usability. Therefore, users have to make a traeoff between staying unprotecte thus risking infection) an buying protection thus incurring protection costs). To make an informe traeoff, the users nee to estimate the risk of infection, for which they nee to know the size of existing infections if any). The more current the infection information is, the better the cost optimization that the users can o. A mobile operator can warn users for currently ongoing infections. Shoul it? How frequently? The operator wants to reuce the total network cost, but the users want to reuce their personal expecte cost. Are these two objectives aligne? These questions have not been aequately aresse. Traitionally, research has focuse on moeling only the propagation of worms, in the nternet [3], [4], [5], an also in mobile networks [6], [7], [8], among others. Research that goes beyon moeling propagation to moel countermeasures has not explicitly taken into account the users freeom to install protection or not. The ecision to eploy countermeasures was assume to be taken unilaterally by the operator e.g., [9]) or, at any rate, always accepte by the users e.g., [], []). The work most similar to ours [] has only moele static ecisions, where users ecie once an for all. At the same time, users are assume to have perfect knowlege of all relevant parameters, an also perfect reasoning capabilities. The main moeling novelty in the present work is the combination of a worm propagation moel with a game theoretic process which involves learning) that etermines users actions: The users maximize their perceive personal cost through their ecision to install or uninstall protection an this ecision epens on the information that the users possess about the state of the network. That information is given to them at some upate rate from the operator. Consequently, it is not current at all times, since the network state changes, first, because of the propagation of the worm, an, secon, because of the ecisions of other users. Also, our users o not take into account the effect that their actions will have on the network state, an therefore on the future actions of other users. n that, they have limite reasoning capabilities. We fin game theoretic equilibria, which are stable in the sense that if a small proportion of the population changes strategy, or if a small proportion of infecte users enters the population, then the ynamics of the system lea it back to the stable equilibrium point. Our main fining is that the total cost to the network increases as the upate rate increases. The rest of the paper is organize as follows: n Section, we escribe the system moel, the two components of which are the epiemic worm propagation, an the game theoretic ecision making proceure. Section presents the results about the equilibrium points an their stability, an

2 Section V conclues with some practical interpretation of our results. More etaile erivations of the results are in the Appenix.. SYSTEM MODEL List of Variables β contact rate per user per time unit upate rate rate of learning from the monitor) rate of recovery from the infection N total number of users N ) S fraction of Susceptible users in the network fraction of nfecte users in the network P fraction of Protecte users in the network c cost of infection c P cost of protection p SP ) Probability that a Susceptible user switches to Protecte when learning see Eq. 3)) p P S ) Probability that a Protecte user switches to Susceptible when learning p P S ) = p SP )) ɛ shape parameter of p SP ) ) position parameter of p SP ), = c P c < TABLE LST OF VARABLES A. Epiemic-base Worm Propagation Moel We assume a network with N users, an the total contact rate is βn contacts per time unit in the whole network, where β > is constant with respect to N. So, a given user makes β contacts per time unit, an a given pair makes N contacts per time unit. Each user can be at each time instant t in one of three states: Susceptible S), nfecte ), Protecte P). We enote St), t), P t) the respective percentages St) + t) + P t) = ; the time epenence will not be explicitly given in the rest of the paper). A worm propagates in the network, infecting susceptible users. The infection lasts for a ranom amount of time, exponentially istribute with parameter >. While being infecte, a user infects other susceptible users he contacts. After the infection is over, the user becomes protecte. For the worm behavior escribe above, we use the stanar SR moel [3], which we will call SP P for Protecte): t S = S a) = S t b) t P = c) B. Game Theoretic Decision Making The non-infecte users S an P) can choose whether to remain in their current state or switch to the other state. Their choice epens on the risk of getting infecte versus the cost of protection. The cost of protection is fixe at c P <, but the risk of getting infecte epens on the infection cost c < c P < an also on the percentage of infecte users in the network. We efine the total network cost to be the quantity C, P ) = c + c P P. ) We encoe these consierations in the following game escription. There are two player types: Type is noninfecte, an Type is infecte. We are intereste in the viewpoint of a Type player. The players are matche at ranom, so the probability that a given Type player will meet a Type player is equal to the percentage of the infecte users. The Type versus Type player game is: S P S, ), c P ) P c P, ) c P, c P ) an the Type versus Type player game is: S c, ) P c P, ) where we omit the payoffs of the Type infecte) player. f the non-infecte players know the fraction, they can choose their best response as follows: Choose S if c > c P < c P c, an P otherwise. The users nee to learn the value of. For the learning process, we assume there is a centralize service for monitoring the network, which knows instantly the current percentage of infecte users in the network. The users contact the service at rate times per time unit, an learn the value of. As a consequence, the users o not know the exact value of at all times. More importantly, it has been observe [4, Ch. 4] that when aske to choose between two alternatives, behavior is ranom, becoming more eterministic when the two alternatives become more istinct. n our case, more istinct translates to larger utility ifference. To moel this ranom aspect of the users behavior, we assume that a user switches from S to P with probability p SP ), an from P to S with probability p P S ). We set p SP ) to be the following piecewise linear function see Fig. ): < ɛ p SP ) = ɛ + ɛ ) ɛ < < + ɛ > + ɛ an p P S ) = p SP ). For ɛ, this function becomes a pure best response function. For ɛ > it is a smoothe best response. The best response an smoothe best response ynamics are common moels for the learning behavior of game theoretic users [4, Ch. 3 an 4]. C. Learning Through Centralize Monitoring: The Complete Moel The users learn the percentage of infecte users at rate, the upate rate, which leas to the following system: t S = S Sp SP ) + P p P S ) = S t 4b) t P = + Sp SP ) P p P S ) 3) 4a) 4c)

3 Switching probability psp) ɛ = ɛ + ɛ Fraction of infecte users S X Fig.. The probability that a Susceptible user switches to being Protecte, when learning the fraction of nfecte users in the network. Note that one of the three equations is reunant, since we know that S + + P = at all times. We keep the first two, together with S + + P =, from which we substitute P into the first one. D. Mathematical Moels Our moel i.e., the system 4)) escribes an evolutionary game on the simplex in R 3, since S + + P = [5]. Such games on the simplex have been intensively stuie over the last twenty years as they are very relevant for biological an social population ynamics, e.g., replication ynamics [5], [6], [7], [8], [9], [], []. More specifically, it is possible to stuy the ynamics an equilibria of our moel globally using the methos of [5], [6], [7], [8], [9], [], [], which originate in the seminal work of Shahshahani [5]. The methos involve inclue Lie-algebraic conitions, potential games an Lyapunov functions. t is also possible to view our moel as a switching system see [], [3], [4], as examples) on the simplex in R 3, where the switching controls are the probabilities, p SP.) an p P S.); actually only one is neee. Then one can formulate more general ynamic games where these controls can epen on the past history of t) in various ways. Other formulations can be also stuie where the whole problem is consiere in either finite or infinite time, as a stochastic game with switching strategies, still on the simplex in R 3. All these more general frameworks an formulations are consiere in our forthcoming paper [5].. RESULTS: EQULBRUM PONTS AND STABLTY Our main fining is Fig.. The vector fiel of the system 4) for the case >. At the point S, ), an arrow parallel to S t, ) is plotte. The only equilibrium point t is X =, ). t is also stable. Theorem. n the stable equilibrium points of our system, the total network cost C, P ) monotonically ecreases with the upate rate. So, the value of that minimizes C, P ) is opt =. n this section we state our finings about the equilibrium points an their stability. The erivations are in the Appenix. We look for equilibrium points by solving the system: = S Sp SP ) + P p P S ) 5a) = S 5b) = S + + P 5c) f >, the only equilibrium point is X = S,, P ) =,, ) 6) an it is stable. The vector fiel of the system 4) corresponing to the conition > is shown in Fig. f <, the point X is still an equilibrium point but it is no longer stable. Now, there are two new potential equilibrium points: X = S,, P ) =, +, ) + 7) an X = S,, P ) =,, ), 8) where is the smallest solution of the equation ɛ + ɛ ) + + +ɛ ) + ɛ =. 9)

4 = = + X = + = X S = S X S = S X Fig. 3. The vector fiel of the system 4) for the case < an < ɛ S. At the point S, ), an arrow parallel to + t, t ) ) is plotte. The point X =,, + + is an equilibrium point an it is stable. The point X =, ) is also an equilibrium point but it is unstable. We can see that all trajectories converge to X, except those that start on the axis =, which converge to X. Fig. 4. The vector fiel of the system 4) for the case < an > + ɛ S. At the point S, ), an arrow parallel to t, ) is plotte. The t point X =,, ) for the value of see )) is a stable equilibrium point, always within ɛ below see Appenix). The point X =, ) is also an equilibrium point but it is unstable. We can see that all trajectories converge to X, except those that start on the axis =, which converge to X. That is, = ɛ + ɛ + + ɛ + ɛ + + ) 4 ɛ ) ) +. ) The point X exists an is stable if an only if in aition to < ) + < ɛ. ) Otherwise, the point X exists an is stable. Figures 3 an 4 show the vector fiels of the system 4) in the two cases where X an X, respectively, exist an are stable. The stability in all cases was checke through the evaluation of the Jacobian at each point. n all cases, the Jacobian ha eigenvalues with negative real part. n the case of X an X, there can be an imaginary part for some values of the parameters, so we have iminishing oscillations spiral). n particular, we have a spiral aroun X when β is close enough to + ), an aroun X when ɛ is small enough. Note that the evaluation of the Jacobian proves local stability i.e., if the perturbation from the equilibrium point is small enough, the system returns to it). However, the figures imply global stability, that is, the system returns to the unique for each combination of parameters) regarless of the initial conitions, or the size of the perturbation away from the equilibrium point. The only exception is when the system starts on the = axis, in which case it converges to the unstable point X. We inee investigate an establish global stability results for this problem in [5]. We can now prove Theorem that network cost in the equilibrium points X, X, X increases with ) by ifferentiating an with respect to. At the point X, the value = oes not epen on, an so the network cost in that case is for all values of. = = + ) ) + >, ) To fin we ifferentiate 9), which satisfies, with respect to : ɛ + ɛ ) ɛ ) + ɛ =

5 + ɛ ɛ + ɛ ɛ + ɛ + + ) = + + )) + ɛ = 3) We know that < an < + ɛ. So, ɛ + ɛ + + ) is always negative. t follows that >,. 4) From ) an 4) we conclue that >,. Recalling that S = S =, we can see that the total network cost increases with, proving Theorem : C, P ) = c + c P P = c + c P ) = c c P ) + c P ) C, P ) C, P ) = c c P ) >, 5) V. CONCLUSON The users ability to switch from P to S, an vice versa, leas to a sustaine infection level enemic), if <. The actual fraction of the at the equilibrium point which is proportional to the total network cost) increases monotonically with the upate rate. This counterintuitive conclusion is an instance of the price of anarchy phenomenon: The iniviually rational outcome large implies more current information available to the users) is worse than the socially optimal outcome. The conflict between network optimality an iniviual optimality creates a ilemma for the operator. Not notifying the users might be interprete as trying to manipulate them into buying unnecessary protection. Acquiescing to their emans an upating them as quickly as possible woul be both expensive in terms of, e.g., monitoring infrastructure, an total network cost, as we have proven. Therefore, a sensible compromise seems to be for the operator to shouler at least part of the protection costs, perhaps as part of the package offere to users. ACKNOWLEDGMENT The research of the secon author was supporte by the Communications an Networks Consortium sponsore by the U.S. Army Research Laboratory uner the Collaborative Technology Alliance Program, Cooperative Agreement DAAD9---, by the U.S. Army Research Office uner MUR awar W 9 NF 787, an by the MAST Consortium sponsore by the U.S. Army Research Laboratory uner the Collaborative Technology Alliance Program, Cooperative Agreement W9NF REFERENCES [] M. Hypponen, Malware goes mobile, Scientific American, pp. 7 77, November 6. [] J. Kleinberg, Computing: The wireless epiemic, Nature, vol. 449, no. 76, pp , September 7, biological connection. [3] J. Kephart an S. White, Directe-graph epiemiological moels of computer viruses, Research in Security an Privacy, 99. Proceeings., 99 EEE Computer Society Symposium on, pp , - May 99. [4] J. O. Kephart an S. R. White, Measuring an moeling computer virus prevalence, in SP 93: Proceeings of the 993 EEE Symposium on Security an Privacy. Washington, DC, USA: EEE Computer Society, 993, p.. [5] C. C. Zou, W. Gong, an D. Towsley, Coe re worm propagation moeling an analysis, in CCS : Proceeings of the 9th ACM conference on Computer an communications security. New York, NY, USA: ACM,, pp [6] C. Fleizach, M. Liljenstam, P. Johansson, G. M. Voelker, an A. Mehes, Can you infect me now?: malware propagation in mobile phone networks, in WORM 7: Proceeings of the 7 ACM workshop on Recurring malcoe. New York, NY, USA: ACM, 7, pp [7] H. Zheng, D. Li, an Z. Gao, An epiemic moel of mobile phone virus, Pervasive Computing an Applications, 6 st nternational Symposium on, pp. 5, 3-5 Aug. 6. [8]. Carreras, D. Miorani, G. S. Canright, an K. Engo-Monsen, Unerstaning the sprea of epiemics in highly partitione mobile networks, in BONETCS 6: Proceeings of the st international conference on Bio inspire moels of network, information an computing systems. New York, NY, USA: ACM, 6, p.. [9] S. Sarat an A. Terzis, On using mobility to propagate malware, in Proceeings of the 5th nternational Symposium on Moeling an Optimization in Mobile, A Hoc, an Wireless Network WiOpt), April 7. [] M. Bloem, T. Alpcan, an T. Başar, Optimal an robust epiemic response for multiple networks, in Proc. 46th EEE Conference on Decision an Control, New Orleans, LA, December 7. [Online]. Available: papers/cc7patching.pf [] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, an P. Barham, Vigilante: en-to-en containment of internet worms, in SOSP 5: Proceeings of the twentieth ACM symposium on Operating systems principles. New York, NY, USA: ACM, 5, pp [] M. Lelarge an J. Bolot, Network externalities an the eployment of security features an protocols in the internet, in SGMETRCS 8: Proceeings of the 8 ACM SGMETRCS international conference on Measurement an moeling of computer systems. New York, NY, USA: ACM, 8, pp [3] W. O. Kermack an A. G. McKenrick, A contribution to the mathematical theory of epiemics, Proceeings of the Royal Society of Lonon. Series A, Containing Papers of a Mathematical an Physical Character, vol. 5, no. 77, pp. 7 7, 97. [Online]. Available: [4] D. Fuenberg an D. K. Levine, The Theory of Learning in Games. MT Press, May 998. [5] S. Shahshahani, A new mathematical framework for the stuy of linkage an selection, Memoirs of the American Mathematical Society, 979. [6] E. Akin, The ifferential geometry of population genetics an evolutionary games, in Mathematical an Statistical Developments of Evolutionary Theory, S. Lessar, E. Dorrecht: Kluwer, 99, pp. 93. [7] D. Monerer an L. Shapley, Potential games, Games an Economic Behavior, vol. 4, pp. 4 43, 996. [8] W. Sanholm, Evolution an equilibrium uner inexact information, Games an Economic Behavior, vol. 44, pp , 3. [9] T. Roughgaren, Selfish Routing an the Price of Anarchy. Cambrige, Mass.: MT Press, 5. [] W. Sanholm an R. Lahkar, The projection ynamic an the geometry of population games, Games an Economic Behavior, 8. [] W. Sanholm, E. Dokumaci, an R. Lahkar, The projection ynamic an the replicator ynamic, Games an Economic Behavior, 8. []. Matei, N. Martins, an J. Baras, Optimal linear quaratic regulator for markovian jump linear systems, in the presence of one stop-time

6 step elaye moe observations, in Proceeings of the 7th FAC Worl Congress, Seoul, Korea, July 8. [3], Almost sure convergence to consensus in markovian ranom graph, in Proceeings of 8 EEE Conference on Decision an Control, December 8. [4], A consensus problem for markovian ranom graphs, 8, submitte for publication. [5] G. Theoorakopoulos, J. Baras, an J.-Y. Le Bouec, Dynamic network security eployment uner partial information: Global analysis, 8, in preparation. APPENDX We fin the equilibrium points X, X, X by solving the system 4) in the three ifferent regions of specifie in the function p SP : < ɛ, ɛ < < + ɛ, > + ɛ. We then verify that the solutions are in the proper region. For each case, we solve the respective simple system that results: > + ɛ The system becomes: = S S 6a) = S ) 6b) = S + + P 6c) The only solution is S,, P ) =,, ), but this contraicts the assumption > + ɛ. Note that the solution with S = leas to a negative value for. < ɛ The system becomes: = S + S ) 7a) = S ) 7b) = S + + P 7c) This system has the solutions: X = S,, P ) =,, ) 8) X = S,, P ) =, +, ) + 9). The secon solution, X, is amissible if an only if an also + < ɛ ). ) Note that if =, the two points coincie, so we on t nee to stuy X separately in this case. We now examine whether X an X are locally) stable equilibrium points. The Jacobian of the system of the first two equations is ) S JS, ) = S We evaluate the Jacobian at the point X : ) JX ) = J, ) = ) 3) The eigenvalues of JX ) are an. So, X is stable if an only if <, in which case note that X oes not exist. We evaluate the Jacobian at the point X : JX ) = J, ) + = + 4) + + The eigenvalues of JX ) are a ± a +4a a, where a ij are the elements of JX ) a = ). Since a <, the smallest eigenvalue is always negative. The largest one is negative if an only if a a < >. So X is stable whenever it exists. f we evaluate the square root a + 4a a at the point β = + ), we see that its argument can also take negative values. Since the eigenvalues are a continuous function of β, they will have an imaginary part for β close to + ), which means that the trajectories spiral towars X. ɛ < < + ɛ The system becomes: = S S + ɛ ) ɛ + S ) ɛ = S ) + ɛ ) ) 5a) 5b) = S + + P 5c) n the secon equation the only amissible solution is S =. For this value of S, the first equation gives the following quaratic equation for : ɛ + ɛ ) + + +ɛ ) + ɛ = 6) Defining f) to be the quaratic form above, we see that f an ɛ ) = ɛ + ) ɛ ) ) 7) f + ɛ ) = ɛ + ɛ + ). 8) So, f + ɛ ) is always negative, an f ɛ ) is positive if an only if ) is not satisfie. That is, a solution for exists an consequently the point X exists) if an only if X oes not exist. The exact value of is given in ). By evaluating f ) an using ), we get that f ) <, so actually ɛ, ). The Jacobian of the system of the first two equations is S JS, ) = ɛ + + ɛ ) ) S 9)

7 ) We evaluate the Jacobian at the point X =,. JX ) = ɛ + + ɛ ) ) 3) The eigenvalues of JX ) are α ± α +4α α, where α ij are the elements of JX ) α = ). Since α <, the smallest eigenvalue is always negative. The largest one is negative if an only if α α <. But α >, an α = ɛ + + ɛ ), which is always negative since < an < + ɛ. So the largest eigenvalue is also always negative, an therefore X is stable whenever it exists. Since lim ɛ + α =, we can see that for small enough values of ɛ the eigenvalues have an imaginary part, which causes the trajectories to spiral towars X.

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

y or f (x) to determine their nature.

y or f (x) to determine their nature. Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit [email protected] ABSTRACT Web site aresses of small on line retailers are often unknown

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom [email protected], WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1 Exponential Functions an their Derivatives Exponential functions are functions of the form f(x) = a x, where a is a positive constant referre to as the base. The functions f(x) = x, g(x) = e x, an h(x)

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan [email protected] Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, [email protected] Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone ([email protected]) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: [email protected] Hamireza Taremian Engineering

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT International Journal of Avance Research in Computer Engineering & Technology (IJARCET) HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT Pawan Kumar, Pijush Kanti Dutta Pramanik Computer Science

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University [email protected] Abstract A number of Enterprise Frameworks

More information

Rate control for communication networks: shadow prices, proportional fairness and stability

Rate control for communication networks: shadow prices, proportional fairness and stability Rate control for communication networks: shaow prices, proportional fairness an stability F Kelly, AK Maulloo an DKH Tan University of Cambrige, UK This paper analyses the stability an fairness of two

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz [email protected] Christian Bauckhage Deutsche Telekom Laboratories [email protected] Jérôme Kunegis [email protected]

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain [email protected]

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

Hybrid Model Predictive Control Applied to Production-Inventory Systems

Hybrid Model Predictive Control Applied to Production-Inventory Systems Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

There are two different ways you can interpret the information given in a demand curve.

There are two different ways you can interpret the information given in a demand curve. Econ 500 Microeconomic Review Deman What these notes hope to o is to o a quick review of supply, eman, an equilibrium, with an emphasis on a more quantifiable approach. Deman Curve (Big icture) The whole

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES

DECISION SUPPORT SYSTEM FOR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES DECISION SUPPORT SYSTEM OR MANAGING EDUCATIONAL CAPACITY UTILIZATION IN UNIVERSITIES Svetlana Vinnik 1, Marc H. Scholl 2 Abstract Decision-making in the fiel of acaemic planning involves extensive analysis

More information

Software Diversity for Information Security

Software Diversity for Information Security for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

Isothermal quantum dynamics: Investigations for the harmonic oscillator

Isothermal quantum dynamics: Investigations for the harmonic oscillator Isothermal quantum ynamics: Investigations for the harmonic oscillator Dem Fachbereich Physik er Universität Osnabrück zur Erlangung es Graes eines Doktors er Naturwissenschaften vorgelegte Dissertation

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László

More information

Learning using Large Datasets

Learning using Large Datasets Learning using Large Datasets Léon Bottou a an Olivier Bousquet b a NEC Laboratories America, Princeton, NJ08540, USA b Google Zürich, 8002 Zürich, Switzerlan Abstract. This contribution evelops a theoretical

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

A Theory of Exchange Rates and the Term Structure of Interest Rates

A Theory of Exchange Rates and the Term Structure of Interest Rates Review of Development Economics, 17(1), 74 87, 013 DOI:10.1111/roe.1016 A Theory of Exchange Rates an the Term Structure of Interest Rates Hyoung-Seok Lim an Masao Ogaki* Abstract This paper efines the

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

A hybrid approach to supply chain modeling and optimization

A hybrid approach to supply chain modeling and optimization Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1211 1218 A hybri approach to supply chain moeling an optimization Paweł Site Kielce University of Technology Al.

More information