A Keyword Filters Method for Spam via Maximum Independent Sets
|
|
- Margery Ross
- 8 years ago
- Views:
Transcription
1 Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2 Air Defene Fores Aademy 3 Inner Mongolia eletri power information and Communiation Center lzjtuwhl@163.om Abstrat In order to evade the keyword filtering, the spammers insert omments into s, suh as unusual symbols # or, to divide some keywords. In the paper, one keyword filters method for spam via maximum independent sets is presented, and the main ontents inlude: (1) build a mathing relation matrix algorithm to help us to improve the performane of maximal independent sets; (2) develop a judgmental riterion aording to the mathing relation matrix algorithm. (3) design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. Proved by the experiments and analyses of examples, the spae and time omplexity of this algorithm is muh smaller than (mn). The operating effiieny is also satisfatory, and is able to ahieve the omplete filtering of targeted unusual symbols during the keyword filtering. Keywords: Maximum independent sets; semi-diagonal line; keyword filters; mathing relation matrix 1. Introdution has beome the important method for network ommuniation as it is widely used among the Internet users and is regarded as one of the most ommonly used network appliations. However, with the development of Internet, junk s (spam) bothering most people do not only bring disontent to users, but also ause some web seurity issues and eonomi losses. In reent years, a large number of dediated servers generate and send out spam though . Aording to the statistis from the anti-spam enter of the Internet Soiety of China, There are more than 1 servers per month whih were sent into the blaklisted by authoritative foreign anti-spam organization sine 25. With the development of the network, spam beomes an inreasingly serious global seurity problem. More and more researhers pay attention and onern to this field. Negative effets derived from spam, whih bring great eonomi losses and result in large amounts of data and information blokage, have beome a worldwide problem. Numerous experts and sholars put forward a lot of targeted prevention methods that ease the problem to some extent. Data Mining is a relatively popular tehnique for the filtering of ontents and theme keywords, whih detet spam keywords through keyword lassifiation and statistial algorithm. Bayes filter is an effetive method. The harateristis of Bayes filter are adaptation and self-learning. Bayes filter has the advantages of high detetion auray [1]. Other widely used deteting approahes inlude detetion based on memorial information, detetion based on desription of event features, and filtering based on spam feature analysis and regular expression mathes. 31
2 Vol. 7, No. 3, May, Related Filtering Tehnology and Analysis In Anti-Spam Solutions and Seurity, Dr. Neal Krawetz sorts the anti-spam tehniques into four main ategories: Filter, Reverse lookup, Challenges, and Cryptography. All of these solutions an ease the spam problems, but have respetive limitations. Filter is a relatively simple and widely used tehnique in spam detetion. It is ommonly used in mail reeiving management system for judging and eliminating spam. Currently, most of the mail servers apply anti-spam plug-ins, detetion gateways and lient-side spam filtering, based on varieties of filtering tehniques suh as keyword filtering algorithm, blak and white list, rule-based filtering and Bayesian filtering algorithm [2]. 2.1 Keyword filtering algorithm Mail ontent filtering uses a key word or multiple keywords as a general basis to judge. Using keyword hit rate to onfirm whether this message is spam or not, if the hit rate is large than a set threshold, it is onsidered as a spam. In addition, the key words an also be phrases and short sentenes. Mail header information is the original reord of the mail delivery proess whih is also a very important sense data, this is spam. Spammers use various tools and randomly send the span to forged losing sender, subjet and ontent, but some ommon information stored in the message header information, whih onsist IP address, host name, X-identifiation [3]. Through the filter of this information, you an find out the spam from several mail sent from the same address whih inludes different transeiver address and subjet. Keyword filtering algorithm generally reated some spam assoiated keyword table to judge and proess spam. If ertain keyword appears in large numbers of spam , then we an put them on the filtered list. The defet of this algorithm are there is a great impat on filtering apaity, the seletion proedure osts a lot resoures, and relatively low effiieny in the stage of seletion of keywords. In addition, the word-split funtion and wordombination funtion an easily avoid the filtering. 2.2 White and Blak List The blaklist ontains the basi information of onfirmed spammers: IP address or IP address of the mail sender. If the sender of the mail is the same as the address of the known spam, we an judge this message as a spam, and rejet the mail. The disadvantage of this method is that the an bypass the blaklist deteted by using a different IP address. The spammer an use the forgery and hanged sender's address [4]. In addition, rely on manual proessing administrator is unable to update the blaklist in time effetively. The whitelist ontains the trusted address, or IP address. If the information of send s mail mathes the data in whitelist. This mail an be onsidered as a normal mail and was released. The disadvantage of this approah is that if the user wishes to reeive from a ertain address, the user reeives this address mail rules must be set in advane to allow. If a user want to hange his/her mail address, the whitelist should be updated in time. Otherwise, the mail server will rejet this mail. 2.3 Rule-based Filtering The rule-based filtering tehnology defines the filtering expressions or rules mainly by seleting ertion harateristis of keywords to desribe spam s feature value. The fatal defet of this filtering method is that it requires managers to maintain a relatively large rules library, 32
3 Vol. 7, No. 3, May, 213 and in order to keep the effetive and real-time of the system, managers need to organize new rules regularly [5]. 2.4 The stati ontent filtering tehnology Stati ontent filtering atually is only useful for the ruling spam. For example, marketing advertising is a spam whih always ontains these rules, the advertising mail inludes a subjet if ADV. If the user does not want to reeive the spam like this type, he an simply set a filter to rejet the mail whih subjet with the ADV tag. However, the further mail spam appears, for example, some of the words "free" was transformed into "Free... fee" or "Free - fee" spam. It beomes another hot problem in filtering fields. If we san the mail and rejet the mail whih inludes these types data, some normal mail will be deleted. Therefore, the keyword filtering tehnology based on the message ontent will lead to a high false rate in pratial. This tehnology an be used in the environment under highly ontrolled [6]. 2.5 Bayesian Algorithm Bayesian filter mainly alulates the probability that whether an inludes a spam message ontent (TOKEN string), trains from the manually identified spam and legitimate mail. Thus the result is more effetive than other average ontent filters. Bayesian filter is a sore determined filter whih utilize the automati reation of spam feature table. The algorithm first analysis respetive feature value in massive spam and legitimate mails, and then alulate the probability that multiple features ontains in the mail. The priniple of this algorithm is to hek the keywords in spam set and legitimate mail set, statistis eah feature value as a TOKEN string, then builds hash tables respetively for TOKEN string in the spam set and legitimate mail set aording to the ourrenes of the extrated TOKEN string, named as word frequeny. And these tables store the mapping relationship from TOKEN string to the word frequeny. We ompute the probability that TOKEN string exists in the hash tables by WF,WF is the word frequeny of a ertain TOKEN string, and L is the P L length of orresponding hash table. P indiates the probability that new reeived is spam when the mail ontent ontains ertain TOKEN string in the hash tables established by system [7]. Finally, we get the spam deision sore from the overall mail, alulating by the omposite probability formula we obtain: P( A t 1,t, t 2 n ) P * P 1 2 P1 * P2 * Pn * P (1- P )*(1- P ) (1 P ) n 1 2 n (1) P(A t i ), where P i (1 i n) denotes the probability that a mail is spam when it ontains the TOKEN string. If the result is greater than a speified threshold, we set the mail as the spam; otherwise, the mail is legitimate. What we an observe from the Bayesian algorithm that spammers may esape the Bayesian algorithm filtering by random inserting a word or sentene. Beause of these filter using the stati passive detetion tehnology, many of them an be most effetive only within a very short period. In order to maintain the effetiveness and real-time of spam detetion, the managers should update the rules of filter onstantly [8]. Currently, the main anti-spam systems ommonly used keywords filtering tehnology based on omplete mathing, interepting samples, analyzing harateristis, generating rules, 33
4 Vol. 7, No. 3, May, 213 rules issued and ontent filtering tehnology. In order to avoid speial keywords filtering, spammers often insert a large number of omments into the in order to split some keywords (suh as 法 轮 功 ) and mix the mail ontent by some speial methods. for example: inserting symbols into Keywords 法 # 轮 功 et. Sometimes they onvert promotional ontent into a Zip pakage as the attahment to evade the filter. In this paper, we design and implement an adopted algorithm whih an effetively solve the problems inluding keywords split and ombine, as well as inserting speial symbols. Considering the traditional filter tehnology always hek the after all the ontent download into the loal disk, whih downgrade the performane. We also design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. In this way, we do not need to wait all the ontent fully reeived from the remote nodes, and diretly blok the at the very beginning of the transfer. The entire filter rule will be build at the initial period of the establishing SMTP onnetion. 3. The Keywords Filtering Algorithm Based on the Maximal Independent Set 3.1 Mathing relation matrix of string Given any two strings S and T, the maximum mathing problem of them is equivalent to the maximal independent set of mathing relation matrix. Define S a1 a2 am, T b1b 2 bn. Note that n { 1, 2,, n}, m {1, 2,, m} Thus i, j) i m, j n, a i b } is alled mathing relation set of S and {( j T, written M ( S, T) [5], here we assume that n m generally [9]. C mathing relation matrix, an be defined as follow: C m m1 1 n 2n mn (2) Where ij 1, if ai bj, if ai b j We only disuss the situation that weight C ij 1 in this paper. Definition This thesis defines that eah node in the independent set only exist a orresponding node at the bottom right loated in the different row or different olumn, alled quasi diagonal. 34
5 Vol. 7, No. 3, May, 213 The set of nodes whih value are 1 ( C 1) over a quasi diagonal of mathing relation ij matrix is alled an independent set. The keyword mathing problem an be transformed into solving maximal independent set of mathing relation matrix, and searhing all independent sets in a given mathing relation matrix. So the longest set is the answer. In partiular, we an searh points in mathing relation matrix that of whih value is 1 to determine whether they are ompletely math in the proess. However, the idea disuss above will make the problem more ompliated, we find that finding the maximal independent sets an be regarded as searhing for a road in the mathing relation matrix of whih value is 1. Eah node in the independent set only exist a orresponding node at the bottom right loated in the different row or different olumn, alled quasi diagonal, searh the bottom right aording to the quasi diagonal [1]. We introdue a new problem solving algorithm to find the independent sets in this paper. We will desribe the detail in Setion 3.2. The relationship between output result with original input string will satisfy the following relationship: a1 11 a2 21 am m m2 1 n b1 2n b2 mn bn (3) 3.2 The algorithm of maximal independent set of mathing relation matrix In order to searh the bottom right orresponding with the quasi diagonal, we propose an improved algorithm of maximal independent set of mathing relation matrix as follows: Assume string α and β are independent sets obtained in searhing, we set the length of them as α and β. The proedure of algorithm desribes as follows: Step 1. When searh the olumn j, if α β, and the absissa of the last harater of α i1 < i2(the absissa of the last harater of β), then stop the operation of β. Step 2. When searh the row i, if α β, and the ordinate of the last harater of α j1 < j2 (the ordinate of the last harater of β), then stop the operation of β. Step 3. When searhing mathing relation matrix is ompleted, the length of α is equal to the original string, then keywords are found [11]. In this algorithm, it may generate multiple result of β, beause we just find the length of α with the length of original string, so we an get multiple independent sets in the end. The finding proedure will be present as a pseudo ode in following [12]: 35
6 Vol. 7, No. 3, May, 213 searh d[]=;ol=;η[]=;k=; for j ol,,n do for i k,, m do if equal(s[i],t[j]) { d[]++;ol++;k++; ontinue;} if(j<n&&k>=m) k=; End of For η[] = d[]/m; End (4) Where d[] indiates the array of length of eah independent set during the storage and alulation, η[] presents the mathing auray of eah independent set, ol is the next mathing start position of target string T[j], This setting design of ol an largely redue the mathing time omplexity. K denotes the identity of searh the original string. When the first searhing trip of the original string is finished and the target string is not ompleted, and then searh from the first harater of the original string again, the searh proess will stop until it finds all the mathing string [13]. 3.3 Judgement Criterion The Mathing auray m N C ij n i1 j1 N, where N is the length of original keywords string, N is the length of all quasi diagonal (Cij only equal or 1). If η<1,indiates the string α and the deteting target string does not math exatly, then the system outputs the results: the mail is seure; if η>1, meaningless; if η=1, then the system shows the string α and the deteting target string math exatly, keywords hidden in the string β is found, then the system give a warning, and ontinue the next steps [14]. 3.4 Complexity Analysis In this paper, we also import two tehniques in our algorithm. Firstly, the mathing relation matrix is reated dynamially; we do not need any other saving spae to store the matrix table. Seondly, In the proedure of string mathing, we does not require all the elements of the original string and the target string equal, we just searh along the bottom right of the quasi-diagonal [15], the searh detail an be find on the algorithm pseudoode desription of definition of ol. Both the spae and time omplexity of this algorithm are far less than O (mn). 4. Example Analysis Assuming that the word " 法 轮 功 " as a keyword in the list of filtering keywords, we detet the reeived mail subjet 法 # 轮 % 功 法 * 律, with our algorithm designed in this paper. All the proess steps an be desribe as follows: firstly, the Chinese mathing relation matrix as show below: 36
7 Vol. 7, No. 3, May, 213 法 # 轮 # 功 法 % 律 Figure 1. Mathing relation matrix (1) When searh along the bottom right of the quasi-diagonal aording to mathing relation matrix 1, the entry at the row labeled 1 and the olumn labeled 1 is 1,we firstly get the string α = 法, there is no relevant mathing in the seond line, then go to the third line, obtain α = 法 轮 ; similarly and so on, we an get α = 法 轮 功 ; When the program running into the seventh line, the first olumn is 1, but it is not the last node of string α, so it reate a new string β. Here we annot determine whether the length of β is the same as the keywords, thus ontinue searh β= 法. When all the searhing proedure finished, we get final string α [8]. We an use the mathing auray algorithm to determine whether the keyword is a spam, and then arry out the orresponding treatment [16]. To illustrate the effetiveness of the proposed algorithm, the haraters mathing proess via the relation matrix shows in below [17]: Figure 2. Mathing relation matrix (2) First of all, we get a temporary string φ = B (node on φ 1 ). And in the right, we find a way, row 4 ontains two 1, we an selet the above one aordane to the rules of the algorithm for solving a 1, that is to selet the first row 1, instead of 1 in the seond row. Meanwhile, in the first row there are two 1, by Theorem 3, we selet the left of that one, i.e. the fourth olumn is a. In this ase, φ = BO. However, when the algorithm is running into the fourth row, φ = BOOK, K in the sixth olumn of the third line of the Bank in the first olumn, the left side of the road φ is the last node of K, then you must reate a new one road Ψ, beause we annot determine whether future there φ Ψ. When the algorithm is run to the sixth row, φ = BOOK Ψ = NEW φ = Ψ = 3, we will the S hain on to the road φ, obtained the longest lower right road φ = BOOKS φ = 5. Thus, it is possible to alulate the degree of mathing of the two strings [18]. 37
8 Vol. 7, No. 3, May, Conlusions In this paper, we proposed a keyword filtering methods to filter the spam whih is related as the approximate mathing of Chinese haraters. The basi idea of our design is based on the onept of the edit distane approximate string mathing. Edit distane is defined as number how muh times a string transform into a minimum number of edits needed another string. By alulating the edit distane matrix, we an draw ahieve the best math. Searh through the parallel simulation, you an speed up the running proess of the lassial algorithm; this method is espeially good for the short string [19]. If the bit omparing proess, we import the parallel priniple idea to the mathing funtion, a number of different values paked into a omputer word length w, these words an be proessed in a single operation or operator whih need several operations or operator to omplete the funtion in traditional methods. To judge a text string in a loation or the pattern strings is mathed or not, whih may math more easily than judgment. If the filtering algorithm annot suessfully math the region, and then ombined with the non-the filtering text searh algorithm, we an also ultimately ahieve fast string mathing [2]. This paper presents a set of mail keywords filtering methods to find the maximal independent set. We design and implement an adopted algorithm whih an effetively solve the problems inluding keywords split and ombine, as well as inserting speial symbols. We also design a behavior reognition tehnology, whih an detet and rejet the whih reeiving. The experimental result shows that both spae and time omplexity are far less than O (mn), the effiieny is also satisfatory. However, if the spammers hange the produe way and onstantly sending the spam, we will always in a passive position. In future, we will further study the anti-spam tehnology to hange our passive reation position to impassive deteting the spam. Aknowledgments This researh was supported by Sientifi Researh Projet of Higher Eduation of Inner Mongolia Autonomous Region, China (NJZY1352). Referenes [1] Z. Li and H. Shen, SOAP: A Soial network Aided Personalized and effetive spam filter to lean your e- mail box, INFOCOM, 211 Proeedings IEEE, (211), pp [2] M. T. B. Aun, B. -M. Goi and V. T. H. Kim, Cloud enabled spam filtering servies: Challenges and opportunities, Sustainable Utilization and Development in Engineering and Tehnology (STUDENT), 211 IEEE Conferene on, (211), pp [3] Q. Luo, B. Liu, J. Yan and Z. He, Design and Implement a Rule-Based Spam Filtering System Using Neural Network, Computational and Information Sienes (ICCIS), 211 Int l Conferene on, (211), pp [4] P. Graham, Better Bayesian Filtering, (23) January. [5] C. Dwork and M. Naor, Priing via proessing or ombatting junk mail, in Proeedings of the 12th Annual International Cryptology Conferene on Advanes in Cryptology, Springer-Verlag, (1993), pp [6] A. Li and H. Liu, Utilizing improved Bayesian algorithm to identify blog omment spam, Robotis and Appliations (ISRA), 212 IEEE Symposium, (212), pp [7] A. C. Yao, The Complexity of Pattern Mathing for a Random String, SIAM Journal on Computing, vol. 8, no. 3, (1979), pp [8] J. A. Bondy and U. S. R. Murty, Graph Theory with Appliations, The MaCmillan Press ltd, London and Basingstoke, (1976). 38
9 Vol. 7, No. 3, May, 213 [9] S. Ghemawat, H. Gobioff and S. Leung, The Google File System, SIGOPS Oper. Syst. Rev., vol. 37, no. 5, (23), pp [1] R. Drewes, An artifiial neural network spam lassifier, (22) August, [11] H. Yuan and D. Wang, The New Approah of Marking Ativity-Loops Based on the String Reahable Matrix, Communiations and Mobile Computing, 29, CMC '9, WRI International Conferene, (29), pp [12] E. Irshad, W. Noshairwan, M. Shafiq, S. Khurram, A. Irshad and M. Usman, Performane Evaluation Analysis of Group Mobility in Mobile Ad ho Networks, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 3, no. 3, (21), pp [13] J. -C. Lin and T. C. Huang, An effiient fault-ontaining self-stabilizing algorithm for finding a maximal independent set, Parallel and Distributed Systems, IEEE Transations, (23), pp [14] G. Vesztergombi, G. Odor, F. Rohrbah and G. Varga, Salable matrix multipliation algorithm for IRAM arhiteture mahine, Parallel and Distributed Proessing, 1998, PDP '98, Proeedings of the Sixth Euromiro Workshop, (1998), pp [15] C. -H. Lin, J. -C. Liu, C. -T. Kuo, M. -C. Chou and T. -C. Yang, Safeguard Intranet Using Embedded and Distributed Firewall System, International Journal of Future Generation Communiation and Networking (IJFGCN). Syst. Rev., vol. 2, no. 1, (29), pp [16] J. Xie, S. Yin, X. Ruan, Z. Ding, Y. Tian, J. Majors, A. Manzanares and X. Qin, Improving MapRedue performane through data plaement in heterogeneous Hadoop lusters, in: Parallel Distributed Proessing, Workshops and Phd Forum (IPDPSW), 21 IEEE International Symposium on, doi:1.119/ipdpsw, (21) April, 54788, pp [17] S. -C. Kim and J. -M. Chung, Message Complexity Analysis of Mobile Ad Ho Network Address Autoonfiguration Protools Mobile Computing, IEEE Transations, (28), pp [18] S. V. Viraktamath and G. V. Attimarad, Impat of Quantization Matrix on the Performane of JPEG, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 4, no. 3, (211), pp [19] M. Laoste, Arhiteting Adaptable Seurity Infrastrutures for Pervasive Networks through Components, International Journal of Future Generation Communiation and Networking (IJFGCN), Syst. Rev., vol. 3, no. 1, (21), pp [2] F. Marozzo, D. Talia and P. Trun-fio, A peer-to-peer framework for supporting mapredue appliations in dynami loud environments, in Nik Antonopoulos and Lee Gillam, editors, Cloud Computing, vol. of Computer Communiations and Networks, Springer London, (21), pp Authors Hailong Wang reeived the BS in omputer siene from North Jiaotong University, China, in 1998,and reeived the MS in omputer siene from Lanzhou Jiaotong University, China,in 27.Currently,he is an assistant professor in Computer & Information Engineering College at Inner Mongolia Normal University, China. His researh interests inlude embedded system and muti-ore proessors, and also fault tolerane and real-time database. Jiong Xie reeived the BS and MS degrees in omputer siene from BUAA (Beijing University of Aeronautis and Astronautis), China, in 24 and 28. He is urrently working toward the PhD degree at the Department of Computer Siene and Software Engineering, Auburn University. His researh interests inlude sheduling tehniques and parallel algorithms for lusters, and also multi-ore proessors and software tehniques for I/O-intensive appliations. 39
10 Vol. 7, No. 3, May,
A Holistic Method for Selecting Web Services in Design of Composite Applications
A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,
More informationImproved SOM-Based High-Dimensional Data Visualization Algorithm
Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang
More informationHierarchical Clustering and Sampling Techniques for Network Monitoring
S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are
More informationChannel Assignment Strategies for Cellular Phone Systems
Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious
More informationSebastián Bravo López
Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that
More information' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF
' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations
More informationAn integrated optimization model of a Closed- Loop Supply Chain under uncertainty
ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia
More informationStatic Fairness Criteria in Telecommunications
Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi
More informationOpen and Extensible Business Process Simulator
UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,
More informationBehavior Analysis-Based Learning Framework for Host Level Intrusion Detection
Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona
More informationComputer Networks Framing
Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial
More informationParametric model of IP-networks in the form of colored Petri net
Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri
More informationPerformance Analysis of IEEE 802.11 in Multi-hop Wireless Networks
Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19
More informationA Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems
A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition
More informationINCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS
Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online
More informationUnit 12: Installing, Configuring and Administering Microsoft Server
Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for
More informationUNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE
UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers
More informationA Context-Aware Preference Database System
J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia
More informationGranular Problem Solving and Software Engineering
Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada
More informationWeighting Methods in Survey Sampling
Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter
More informationINCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS
Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File
More informationAn Enhanced Critical Path Method for Multiple Resource Constraints
An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities
More informationState of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts
State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions
More informationFIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero
FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University
More informationChapter 1 Microeconomics of Consumer Theory
Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some
More informationAgent-Based Grid Load Balancing Using Performance-Driven Task Scheduling
Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,
More informationNeural network-based Load Balancing and Reactive Power Control by Static VAR Compensator
nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti
More informationHenley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)
MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:
More informationA Comparison of Service Quality between Private and Public Hospitals in Thailand
International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor
More informationBig Data Analysis and Reporting with Decision Tree Induction
Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,
More informationThe Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera
(IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti
More informationDiscovering Trends in Large Datasets Using Neural Networks
Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge
More informationOpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1
OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements
More informationGABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS
HENRI COANDA AIR FORCE ACADEMY ROMANIA INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 015 Brasov, 8-30 May 015 GENERAL M.R. STEFANIK ARMED FORCES ACADEMY SLOVAK REPUBLIC GABOR AND WEBER LOCAL DESCRIPTORS
More informationHow To Fator
CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems
More informationSLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments
2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar
More informationInterpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms
Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism
More informationBENEFICIARY CHANGE REQUEST
Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address
More informationTECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS
TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,
More informationWireless Transmission Systems. Instructor
Teleommuniation Engineering Tehnology, Texas A&M University Wireless Transmission Systems Leture Notes - Copyright Jeff M. MDougall 2 Wireless Transmission Systems Teleommuniation Engineering Tehnology,
More informationGreen Cloud Computing
International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud
More informationImpedance Method for Leak Detection in Zigzag Pipelines
10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria
More informationModeling and analyzing interference signal in a complex electromagnetic environment
Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong
More informationImproved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules
Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu
More informationSupply chain coordination; A Game Theory approach
aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université
More informationA novel active mass damper for vibration control of bridges
IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural
More informationClassical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk
Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples
More informationLearning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services
T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,
More informationDeadline-based Escalation in Process-Aware Information Systems
Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands
More informationAn Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism
An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.
More informationi_~f e 1 then e 2 else e 3
A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms
More informationCapacity at Unsignalized Two-Stage Priority Intersections
Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways
More informationInformation Security 201
FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted
More informationElectrician'sMathand BasicElectricalFormulas
Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial
More informationPrice-based versus quantity-based approaches for stimulating the development of renewable electricity: new insights in an old debate
Prie-based versus -based approahes for stimulating the development of renewable eletriity: new insights in an old debate uthors: Dominique FINON, Philippe MENNTEU, Marie-Laure LMY, Institut d Eonomie et
More informationIntelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds
Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.
More informationJEFFREY ALLAN ROBBINS. Bachelor of Science. Blacksburg, Virginia
A PROGRAM FOR SOLUtiON OF LARGE SCALE VEHICLE ROUTING PROBLEMS By JEFFREY ALLAN ROBBINS Bahelor of Siene Virginia Polytehni Institute and State University Blaksburg, Virginia 1974 II Submitted to the Faulty
More informationRetirement Option Election Form with Partial Lump Sum Payment
Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option
More informationComputational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings
Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,
More informationTable of Contents. Appendix II Application Checklist. Export Finance Program Working Capital Financing...7
Export Finane Program Guidelines Table of Contents Setion I General...........................................................1 A. Introdution............................................................1
More informationAutomated Test Generation from Vulnerability Signatures
Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu
More informationAUDITING COST OVERRUN CLAIMS *
AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing
More informationPattern Recognition Techniques in Microarray Data Analysis
Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu
More informationNOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES
The 9 th International Days of Statistis and Eonomis, Prague, September 10-1, 015 NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES Zdeněk Šul Hana Řezanková
More informationHenley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)
MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date
More informationprotection p1ann1ng report
f1re~~ protetion p1ann1ng report BUILDING CONSTRUCTION INFORMATION FROM THE CONCRETE AND MASONRY INDUSTRIES Signifiane of Fire Ratings for Building Constrution NO. 3 OF A SERIES The use of fire-resistive
More informationIn order to be able to design beams, we need both moments and shears. 1. Moment a) From direct design method or equivalent frame method
BEAM DESIGN In order to be able to design beams, we need both moments and shears. 1. Moment a) From diret design method or equivalent frame method b) From loads applied diretly to beams inluding beam weight
More informationPicture This: Molecular Maya Puts Life in Life Science Animations
Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,
More informationTHE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING. NURS 6390-004 Introduction to Genetics and Genomics SYLLABUS
THE UNIVERSITY OF TEXAS AT ARLINGTON COLLEGE OF NURSING NURS 6390-004 Introdution to Genetis and Genomis SYLLABUS Summer Interession 2011 Classroom #: TBA and 119 (lab) The University of Texas at Arlington
More informationarxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA
LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory
More informationCriminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data
Criminal Georaphial rofilin: Usin FCA for Visualization and Analysis of Crime Data Quist-Aphetsi Kester, MIEEE Leturer, Faulty of Informatis Ghana Tehnoloy University Collee Ara, Ghana Email: kquist-aphetsi@tu.edu.h
More informationCustomer Reporting for SaaS Applications. Domain Basics. Managing my Domain
Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you
More informationChapter 1: Introduction
Chapter 1: Introdution 1.1 Pratial olumn base details in steel strutures 1.1.1 Pratial olumn base details Every struture must transfer vertial and lateral loads to the supports. In some ases, beams or
More informationSoft-Edge Flip-flops for Improved Timing Yield: Design and Optimization
Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of
More informationcomputer science Program Educational Objectives
omputer siene bahelor of siene minor ertifiates: managing information on the world wide web master of siene in omputer siene master of siene in software engineering advaned ertifiate programs: bioinformatis
More informationRobust Classification and Tracking of Vehicles in Traffic Video Streams
Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams
More informationUser s Guide VISFIT: a computer tool for the measurement of intrinsic viscosities
File:UserVisfit_2.do User s Guide VISFIT: a omputer tool for the measurement of intrinsi visosities Version 2.a, September 2003 From: Multiple Linear Least-Squares Fits with a Common Interept: Determination
More informationMarker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System
Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae
More informationIEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401
IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,
More informationRecovering Articulated Motion with a Hierarchical Factorization Method
Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu
More informationChapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112
More informationAnnual Return/Report of Employee Benefit Plan
Form 5500 Department of the Treasury Internal Revenue Servie Department of Labor Employee Benefits Seurity Administration Pension Benefit Guaranty Corporation Annual Return/Report of Employee Benefit Plan
More informationUsing Live Chat in your Call Centre
Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now
More informationSolving the Game of Awari using Parallel Retrograde Analysis
Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands
More informationA Design Environment for Migrating Relational to Object Oriented Database Systems
To appear in: 1996 International Conferene on Software Maintenane (ICSM 96); IEEE Computer Soiety, 1996 A Design Environment for Migrating Relational to Objet Oriented Database Systems Jens Jahnke, Wilhelm
More informationBoard Building Recruiting and Developing Effective Board Members for Not-for-Profit Organizations
Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit Organizations Board Development Board Building Reruiting and Developing Effetive Board Members for Not-for-Profit
More information) ( )( ) ( ) ( )( ) ( ) ( ) (1)
OPEN CHANNEL FLOW Open hannel flow is haraterized by a surfae in ontat with a gas phase, allowing the fluid to take on shapes and undergo behavior that is impossible in a pipe or other filled onduit. Examples
More informationMATE: MPLS Adaptive Traffic Engineering
MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,
More informationBandwidth Allocation and Session Scheduling using SIP
JOURAL OF COUICAIS, VOL., O. 5, AUGUS 006 7 Bandwidth Alloation and Session Sheduling using SIP Hassan HASSA, Jean-arie GARCIA and Olivier BRU LAAS-CRS, oulouse, Frane Email: {hhassan}@laas.fr Abstrat
More information1.3 Complex Numbers; Quadratic Equations in the Complex Number System*
04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x
More informationCARRIER VOICE NETWORK MANAGEMENT
CARRIER VOICE NETWORK MANAGEMENT Elvis N. Ngah Supervised by: Dr. Sandjai Bhulai Department of Mathematis Vrije Universiteit Amsterdam The Netherlands Deryk Cole Network Operations Center Telesonique Global
More informationTHE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES
Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess
More informationA DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD
International Journal of Computer Siene & Information Tehnology (IJCSIT) Vol 6, No 6, Deemer 2014 A DESIGN OF A FAST PARALLEL-PIPELINED IMPLEMENTATION OF AES: ADVANCED ENCRYPTION STANDARD Ghada F.Elkaany,
More informationInternational Journal of Supply and Operations Management. Mathematical modeling for EOQ inventory system with advance payment and fuzzy Parameters
nternational Journal of Supply and Operations Management JSOM November 0, Volume, ssue 3, pp. 60-78 SSN-Print: 383-359 SSN-Online: 383-55 www.ijsom.om Mathematial modeling for EOQ inventory system with
More informationDesign Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis
Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,
More informationDeduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)
23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking
More informationA Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods
Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual
More informationSocial Network Analysis Based on BSP Clustering Algorithm
Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum ABSRAC Soial network analysis is a new researh field in data mining. he lustering
More informationRanking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning
Ranking Community Answers by Modeling Question-Answer Relationships via Analogial Reasoning Xin-Jing Wang Mirosoft Researh Asia 4F Sigma, 49 Zhihun Road Beijing, P.R.China xjwang@mirosoft.om Xudong Tu,Dan
More informationLondon Metropolitan Business School
North Campus London Metropolitan Business Shool Publi Relations Single Honours Degree Course Handbook For admission to Certifiate Level in 2011-2012 PBR4N Undergraduate Aademi Year 2011-2012 AUTUMN SEMESTER
More information