Formal Languages and Analysis of Contract-Oriented Software

Size: px
Start display at page:

Download "Formal Languages and Analysis of Contract-Oriented Software"

Transcription

1 Antonio Brogi, Roberto Bruni, Gerardo Schneider (Ed.) Formal Language and Analyi of Contract-Oriented Software 4th International Workhop, FLACOS 2010 Pia, Italy, September 17 18, 2010 Electronic Proceeding

2 Table of Content On the formal repreentation of norm and contract... 1 Marek Sergot Contract-baed Slicing... 3 Daniela da Cruz, Pedro Henrique and Jorge Soua Pinto A Calculu of Contracting Procee Maimo Bartoletti and Roberto Zunino Contract-baed Reaoning about Progre: Application to Reource Sharing in a Network Imene Ben-Hafaiedh, Suanne Graf and Sophie Quinton Contract-Baed Dicovery and Adaptation of Web Service Luca Padovani A Survey of Formal Language for Contract Tom Hvitved On the Formal Specification of Buine Contract and Regulatory Compliance Amal Elgammal, Oktay Turetken, Willem-Jan van den Heuvel and Mike Papazoglou Formal Model for Buine-aware Tranaction Management Francoi Hantry, Mohand-Said Hacid and Mike Papazoglou Autonomou and yet Secure Evolution for Smart Card Application uing Self-Certification Olga Gadyatkaya and Fabio Maacci Synthei and Analyi of Adaptor through Security Contract Joé Antonio Martín and Erneto Pimentel Viual Specification of Formal e-contract Enrique Martínez, Gregorio Díaz and M. Emilia Cambronero A Trace-baed Model for Multi-party Contract Tom Hvitved Viual Behavioural Modelling with Contract Nuno Amálio and Pierre Kelen Controllability and Abtraction in Buine Procee Maria Grazia Bucemi and Hernán Melgratti Leveraging a Contract-baed Synchronization Framework for Deign and Analyi of Service Laura K. Dillon, Yi Huang and R.E.K. Stirewalt

3 ViualSpecificationofFormale-Contract Enrique Martínez Gregorio Díaz M. Emilia Cambronero Department of Computer Science Univerity of Catilla-La Mancha, Spain In thi work we preent a viual model called C-O Diagram for the pecification of e-contract. Thi model include pecification of obligation, permiion, prohibition, reparation and retriction ucharealtimecontraint.wealodefineaformalemanticoftheviualmodelintendedforthe analyi and verification of the modeled contract. 1 Introduction We conider e-contract a a et of claue that mut be atified by everal partie participating in a ytem. Thee claue regulate how participant hould behave, what are the penaltie in cae of mibehavior, and under which condition uch claue mut be enacted. We alo have that when a claue i violated, if the claue define a reparation (econdary claue that come into force when the main claue i not atified), and thi reparation i fulfilled, then the claue i eventually fulfilled. Recently ome work about pecifying e-contract in a formal manner have been releaed[2, 3, 10], but thee approache conit of formal language which are hard to tudy and manipulate by untrained final uer of thi technology, a buine proce developer. Thegoalofthiworkitointroduceanewapproachforthepecificationofe-contractinauer friendly way. E-contract may be complex, coniting of compoite claue making reference to other claue in the ame or in another contract. Furthermore, we conider contract with timed retriction and condition under which the contract claue mut be applied. Hence, our approach i baed on a viual model that we call Contract-Oriented Diagram or C-O Diagram for hort, ince it i wellknownthattheueofviual modelmakeeaiertheperception ofknowledge, andinthiway, the intuitive undertanding, reading and maintenance of complex problem[6]. Thi approach can be ueful in ervice-oriented architecture, component-baed ytem, requirement acquiition, oftware product line, etc. In the following ection we firt informally define the element and tructure of our viual model,nextweformallydefinetheyntaxofthediagram,andfinallywepreentafirtverionofthe formal emantic of thee diagram, baed on timed automaton. 2 Viual Model Inourviualmodelwedefineahierarchicaltreediagramuedtopecifythecontractclauethatwecall C-ODiagram. InFigure1wehowthebaicelement. Itcorrepondtoacontractclaueandwecall itbox. Thiboxconitoffourfield,allowingutopecifynormativeapectorimplenorm(P), reparation(r),condition(g)andtimeretriction(tr).eachboxhaanameandanagent.thenamei uefulbothtodecribetheclaueandtoreferencetheboxfromotherclaue,oitmutbeunique.the PartiallyupportedbytheSpanihgovernment(cofinancedbyFEDERfound)withtheprojectTIN C02-02 and the JCCLM regional project PEII The firt author i upported by the European Social Fund and the JCCLM. Preliminary Report. Final verion to appear in: FLACOS

4 agent name Figure 1: Box tructure Claue Claue Claue Seq-refinement SubClaue1 SubClaue2 SubClaue1 SubClaue2 SubClaue1 SubClaue2 Figure 2: AND/OR/SEQ refinement agentindicatewhoitheperformeroftheaction(whichcanbeaervice,acomponentoromething ele, depending on the field where we are applying C-O Diagram). Ontheleft-handideoftheboxwepecifytheconditionandretriction.Theguardgpecifiethe condition under which the contract claue mut be taken into account. The time retriction tr pecifie the time frame in which the contract claue mut be atified. Thepropoitional content P,onthecenter, ithemainfieldofthebox,anditiuedtopecify normative apect(obligation, permiion and prohibition) that are applied over action, and/or the action themelve. The lat field of thee boxe, on the right-hand ide, i the reparation R. Thi reparation, if pecified bythecontractclaue,ianothercontractthatmutbeatifiedincaethemainnorminotatified, conidering the claue eventually atified if thi reparation i atified. Thee baic element of a C-O Diagram can be refined by uing AND/OR/SEQ refinement, a hown in Figure 2. The aim of thee refinement i to capture the hierarchical claue tructure followed by mot contract. An AND-refinement mean that all the ubclaue mut be atified in order to atify the parent claue. An OR-refinement mean that it i only neceary to atify one of the ubclaue in order to atify the parent claue. A SEQ-refinement mean that the norm pecified in the target box (SubClaue2 in Figure 2) mut be fulfilled after atifying the norm pecified in the ource box (SubClaue1inFigure2). Inthiway,wecanbuildahierarchicaltreewiththeclauedefinedbythe contract, where the leaf claue correpond to the atomic claue, that i, to the claue that cannot be divided into ubclaue. There i another tructure that can be ued to model repetition. Thi tructure irepreentedaanarrowgoingfromaubclauetooneofitancetorclaue(ortoitelf),meaning the repetitive application of all the ubclaue of the target claue after atifying the ource ubclaue. In thi work, we follow an ought-to-do approach, i.e., the normative apect of obligation, permiion and prohibition, a defined in deontic logic[9], are applied over action performed by the participantinthecontract. WeonlyallowthepecificationofatomicactioninthePfieldoftheleaf claueofourdiagram.theeactionaredenotedbylowercaelatinletter( a, b, c,...).weue adah( - )todenotethatthereinoactionpecifiedinthenoleafclaue.thecompoitionofaction canbeachievedbymeanofthedifferentkindofrefinement. Inthiway,anAND-refinementcanbe uedtomodelconcurrency & betweenaction,anor-refinementcanbeuedtomodelachoice + betweenaction,andaseq-refinementcanbeuedtomodelequence ; ofaction. InFigure3we can ee an example about how to model thee compound action through refinement, given two atomic actionaandb. 56

5 - - - Seq-refinement a a + b b a b a b a & b a ; b Figure 3: Compoition of action in C-O Diagram Seq-refinement O a O b O a O b O a O b O(a) O(b) O(a) O(b) O(a) ; O(b) Figure 4: Compoition of deontic norm in C-O Diagram The deontic norm(obligation, permiion and prohibition) that are applied over thee action canbepecifiedinanyclaueofourc-odiagram,affectingalltheactionintheleafclauethatare ubclaueofthiclaue,butatleatoneandonlyonedeonticnormmutbepecifiedineachoneof thebrancheofourdiagram.ifitithecaethattheclauewherewepecifythedeonticnormialeaf claue,thenormonlyaffecttheatomicactionwehaveinthiclaue.weueanuppercae O todenote anobligation,anuppercae P todenoteapermiion,andanuppercae F todenoteaprohibition (forbidden).theeletterarewritteninthetopleftcorneroffieldp.thecompoitionofdeonticnormi alo achieved by mean of the different refinement we have in C-O Diagram. Thu, an AND-refinement correpond to the conjunction operator between norm, an OR-refinement correpond to the choice operator + between norm, and a SEQ-refinement correpond to the equence operator ; between norm. For example, we can imagine having a leaf claue pecifying the obligation of performing an action a, written a O(a), and another leaf claue pecifying the obligation of performing an action b, written a O(b). Thee two norm can be combined in the three different way mentioned before through the different kind of refinement(figure 4). ThefieldRionlyallowedintheboxeofourdiagramwherewepecifyadeonticnormofobligationorprohibitioninfieldP,beingalwayemptyintheotherboxe. Thireparationianewcontract thatcanbejutanobligationoveranatomicaction,butitcanalobeamorecomplexdiagram,including theirownreparation. Inthiway,weareabletopecifynetedreparationinourC-ODiagram. Let uconideraimplecontractctatingthatwehavetheobligationofperforminganatomicactionaand the prohibition of performing an atomic action b. However, if we do not perform the obligatory action a, wecancompenateitbyfulfillinganothercontract(modeledbyanotherdiagram)calledc 1,coniting ofperforminganactioncoranactiond,andifweperformtheforbiddenactionb,wecancompenateit jutbyperforminganactione.thiituationcanbemodeledinourdiagramahowninfigure5. Whenwepecifyaguardgand/oratimeretriction trinaclauethatinotaleafclaue, they affect all the ubclaue, i.e., all the ubclaue neceary to atify the parent claue mut fulfilled the condition and time retriction pecified in thi parent claue. Otherwie, the parent claue i unfulfilled. 1 1 AmoredetaildecriptionofC-ODiagramcanbefoundin[8],includingacaetudyhowinghowtopecifyaconcrete e-contract and a evaluation of the model. 57

6 AND OR Figure 5: Reparation in C-O Diagram 3 Formal Grammar InthiectionweformallydefinetheyntaxofC-ODiagraminordertomakethemuceptible to formal analyi. Definition 1 (C-O Diagram Syntax) We conider a finite et of real-valued variable C tanding for clock, a finite et of non-negative integer-valued variable V, a finite alphabet Σ for atomic action, a finite et of identifier A for agent, andafiniteetofidentifier N forname.thegreekletter εmeanthatanexpreioniempty. WeueCtodenotethecontractmodeledbyaC-ODiagram.Thediagramyntaxidefinedbythe following EBNF grammar: C := (agent,name,g,tr,o(c 2 ),R) (agent,name,g,tr,p(c 2 ),ε) (agent,name,g,tr,f(c 2 ),R) (ε,name,g,tr,c 1,ε) C 1 := C(AndC) + C(OrC) + C(SeqC) + C 2 := a C 3 (AndC 3 ) + C 3 (OrC 3 ) + C 3 (SeqC 3 ) + C 3 := (ε,name,g,tr,c 2,ε) R := C ε wherea Σ,agent A andname N.Guardgi εoraconjunctiveformulaofatomiccontraintof theform: v norv w n,forv,w V, {,<,=,>, }andn IN,whereatimedretriction tr i ε oraconjunctive formulaofatomiccontraint oftheform: x norx y n, forx,y C, {,<,=,>, }andn IN. O, PandF arethedeontic operator correponding toobligation, permiion andprohibition, repectively, whereo(c 2 )tate theobligation ofperformingc 2, F(C 2 ) tateprohibition ofperformingc 2,andP(C 2 )tatethepermiionofperformingc 2. And,Orand Seq are the operator correponding to the refinement we have in C-O Diagram, AND-refinement, OR-refinement and SEQ-refinement, repectively. ThemotimplecontractwecanhaveinC-ODiagramithatcompoedofonlyoneboxincluding theelementagent andname. Optionally,wecanpecifyaguardgandatimeretrictiontr. Wealo have adeontic operator (O, PorF)applied overan atomicaction a, and inthecae ofobligation and prohibition it i poible to pecify another general contract C a a reparation. For example, C:= (Buyer,Example1,ε,ε,O(pay),C )iavery implecontract pecifying forabuyer the obligation of paying,otherwiecontractc comeintoeffect. WeueC 1 todefineamorecomplexcontractwherewecombinedifferentdeonticnormbymean ofanyofthedifferentrefinementwehaveinc-odiagram.intheboxwherewehavetherefinement 58

7 intoc 1 wecannotpecifyanagentnorareparationbecauetheeelementarealwayrelatedtoaingle deonticnorm,butwetillcanpecifyaguardgandatimeretrictiontrthataffectallthedeonticnorm wecombine. Forintance,C:= (ε,example2,ε,x <5,C OrC,ε)iacompoedcontractpecifying thatcontractc orcontractc mutbeatifiedinordertoatifycbeforeclockxreachthevalue5. Once wewrite adeontic operator in abox ofour diagram, wehave twopoibilitie awecan eeinthepecification ofc 2 : wecanjutwriteaimpleactionainthebox, beingthedeontic operator applied only over it, or we can refine thi box in order to apply the deontic operator over a compound action. Inthicaewehavethattheubboxe (C 3 )cannotdefineanewdeontic operator a it ha already been defined in the parent box (affecting all the ubboxe). Then, thee ubboxe cannotpecifyanagentnorareparation, butitipoibletopecifyaguardgandatimeretriction tr affecting only the action in the ubbox or the action compoed in it refinement. For example, C:= (Buyer,Example3,ε,ε,O(C OrC ),ε), where wehave thatc := (ε,option1,ε,ε,paycah,ε) andc :=(ε,option2,ε,ε,paycard,ε),iacontractpecifyingforabuyertheobligationofpayingby cahorbycreditcard. 4 Formal Semantic The C-O Diagram formal emantic i given by mean of a atifaction function. To define thi atifaction function we follow the C-O Diagram yntax given in Definition 1. The atifiability of a contract i defined baed on the tate of a timed labelled tranition ytem aociated to a timed automaton. Baically,atimedautomaton(TA)[1]iatuple (N,n 0,E,I),whereNiafiniteetoflocation(node), n 0 Nitheinitiallocation,Eitheetofedge,andIiafunctionthataigninvariantcondition (whichcouldbeempty)tolocation. Wewriten g,a,r n todenote (n,g,a,,r,n ) E,wheren,n N, giaguard,aianaction,riaetofclockwewanttoreet,andiaetofvariableaignment. Theemanticofatimedautomatonidefinedaatimedlabelledtranitionytem (Q,q 0, ),whereq iaetoftate,q 0 Qitheinitialtate,and itheetoftranition.duetothelackofpace,refer to[4] for a complete definition of timed automaton and it emantic. Definition 2 (C-O Diagram Semantic) Let A = (N,n 0,E,I)beatimedautomaton, withtheaociated timedlabelled tranition ytem (Q,q 0, )and q Q. GivenaC-ODiagramC, one can define (A,q) =C (A in tate qatifie contract C) a follow: (1) (A,q) =(agent,name,g,tr,o(a),r)iff q 1 q 2... q j forq=q1 : a Themainclauehold,thati, i [1,j 1]uchthatq i q i+1 with n i g,a,r n i+1 where (g tr) g andagent(a) Themainclauedoenotholdbutreparationhold,thati,R εand (A,q i+1 ) =Rfor thefirti [1,j 1]uchthatq i d q i+1 with d (n i,u) (n i,u+d)and (u+d) tr (2) (A,q) =(agent,name,g,tr,p(a),ε)iff q 1 q 2... q j forq=q1 wherethemain a g,a,r clauehold,thati, i [1,j 1]uchthatq i q i+1 withn i n i+1 where (g tr) g and agent(a) 59

8 (3) (A,q) =(agent,name,g,tr,f(a),r)iff q 1 q 2... q j forq=q1 : Themainclauehold,thati, i [1,j 1]uchthatq i a q i+1 with g,a,r n i n i+1 where (g tr) g andagent(a), Themainclauedoenotholdbutreparationhold,thati,R εand (A,q i+1 ) =Rfor a g,a,r thefirti [1,j 1]uchthatq i q i+1 withn i n i+1 where(g tr) g andagent(a) (4) (A,q) =(agent,name,g,tr,d((ε,name 1,g 1,tr 1,C 1,ε)RE (ε,name 2,g 2,tr 2,C 2,ε)RE...RE (ε,name k,g k,tr k,c k,ε)),r)iff (A,q) =(ε,name,g,tr,(agent,name 1,g 1,tr 1,D(C 1 ),R)RE (agent,name 2,g 2,tr 2,D(C 2 ),R)RE...RE (agent,name k,g k,tr k,d(c k ),R),ε) (5) (A,q) =(ε,name,g,tr,(agent 1,name 1,g 1,tr 1,C 1,R 1 )RE (agent 2,name 2,g 2,tr 2,C 2,R 2 )RE...RE (agent k,name k,g k,tr k,c k,r k ),ε)iff (A,q) =(agent 1,name 1,g g 1,tr tr 1,C 1,R 1 ) (A,q) =(agent 2,name 2,g g 2,tr tr 2,C 2,R 2 )... (A,q) =(agent k,name k,g g k,tr tr k,c k,r k ) Line(1) (3) correpond to the emantic of applying an obligation, a permiion or a prohibition overanatomicactiona. Inthecaeofobligation,forallthepoiblepathinourautomatonwemut have the performance of a by the pecified agent(denoted by agent(a)) and fulfilling alo any condition ortimeretrictionwehavepecified(denotedby (g tr) g ).Iftheobligedactioninotperformedin the expected time frame, we have the alternative poibility of atifying reparation R from the moment at whichtimedretrictioninotfulfilledanymore(denotedby(u+d) tr).inpermiionweconiderthat the performance of a i only neceary in one of the path. Thi interpretation of permiion i becaue we think that an automaton atifying a contract mut offer the poibility of performing a permitted actioninatleatoneofitpath. Prohibitionitheoppoiteofpermiion,owecannothaveapath whereweperformtheforbiddenactiona,butincaeweperformtheactionwetillhavethepoibility of atifying reparation R after that. Inline(4) (5)wehavethat D {O,P,F}, RE {And,Or}and {, }.Line(4)correpond to the emantic of applying a deontic norm over an AND-refinement or an OR-refinement. For all the deontic operator we jut propagate them into each one of the ubcontract, a well a reparation R and agent, and the atifaction of the main contract conit of the atifaction of the refinement RE of thee new ubcontract. Line(5) correpond to the emantic of thee refinement when no deontic operator i applied over them(they will be pecified in the ubcontract). In thee cae, the atifaction of the main contract conit of the conjunction( for AND-refinement) or dijunction( for OR-refinement) of the atifaction of each one of the ubcontract, propagating any condition or time retriction in the maincontractintotheeubcontract(denotedbyg g k andtr tr k ). In thi C-O Diagram emantic we deliberately omit SEQ-refinement. The emantic of thi refinementimorecomplexbecauewehavetoguaranteethattheubcontractnotonlyarefulfilledbutthey arealofulfilledinthecorrectorder. Forthatpurpoewearenowworkingonnewemanticruleto apply ditributivity of SEQ-refinement over the other refinement, o we can finally have equence of deonticnormappliedoveratomicaction. Inthiway,wecandetermineifinthelocationwereach after atifying the firt element of the equence the remaining equence i fulfilled. 60

9 5 Concluion and Future Work In thi paper we have preented C-O Diagram, a new viual formalim for electronic contract. To thebetofourknowledge, thereinotanyotherviualmodelpecially createdforthedefinitionof e-contract. There are everal work in the literature that define a meta-model for the pecification of e-contract baed on ome already exiting viual pecification like UML or entity-relationhip diagram [5,7],buttheyalllackofomeofthecapabilitie wehaveinc-odiagram(realtimecontraint, reparation,...). A future work, apart from complete C-O Diagram emantic, we are planning to apply thi model to different cae tudie in order to evaluate it uefulne in different field. We alo enviage the poibility of pecifying a different C-O Diagram for each one of the partie involved in an e-contract intead of having a global C-O Diagram with multiple agent. Thi compoitional approach can be ueful if we define a compoition operator, pecifying when two of thee new C-O Diagram can be compoed and the reult of the compoition. Reference [1] R. Alur& D.L. Dill(1990): Automata For Modeling Real-Time Sytem. Proceeding of 17th International Colloquium on Automata, Language, and Programming, pp [2] M. Bravetti& G. Zavattaro(2007): Toward a unifying theory for choreography conformance and contract compliance. Proceeding of the Sixth International Sympoium on Software Compoition, pp [3] M.G. Bucemi& U. Montanari(2008): Cc-Pi: A Contraint-Baed Language for Contract with Service Level Agreement. Proceeding of Second International Workhop on Formal Language and Analyi of Contract-Oriented Software, pp [4] M.E. Cambronero, G. Díaz, V. Valero& E. Martínez(2010): Validation and Verification of Web Service Choreographie by Uing Timed Automata. Article in Pre, Corrected Proof. [5] D. Cambronero, S. Cheung& S. Till(2003): A Three-Layer Architecture for E-Contract Enforcement in an E-Service Environment. Proceeding of the 36th Hawaii International Conference on Sytem Science (HICSS-36), pp [6] D. Harel(1988): On Viual Formalim. Communication of the ACM 31(5), pp [7] P.R. Krihna, K. Karlapalem& A.R. Dani(2005): From Contract to E-Contract: Modeling and Enactment. Information Technology and Management 6(4), pp [8] E. Martínez, G. Díaz, M.E. Cambronero& G. Schneider(2010): A Formal Model for Viual Specification of e-contract. The 7th IEEE 2010 International Conference on Service Computing(SCC 2010). To appear. Available at [9] P. McNamara(2006): Deontic Logic. Gabbay, D.M., Wood, J., ed.: Handbook of the Hitory of Logic 7, pp North-Holland Publihing. [10] C. Priacariu& G. Schneider(2007): A formal language for electronic contract. Proceeding of 9th IFIP International Conference on Formal Method for Open Object-Baed Ditributed Sytem, pp

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Thank you for attending the MDM for the Enterprise Seminar Series!

Thank you for attending the MDM for the Enterprise Seminar Series! Thank you for attending the MDM for the Enterprie Seminar Serie! Pleae do not ditribute thi preentation without permiion from the peaker (ee contact information within.) Thi i jut intended a an additional

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation

Benchmarking Bottom-Up and Top-Down Strategies for SPARQL-to-SQL Query Translation Benchmarking Bottom-Up and Top-Down Strategie for SPARQL-to-SQL Query Tranlation Kahlev a, Chebotko b,c, John Abraham b, Pearl Brazier b, and Shiyong Lu a a Department of Computer Science, Wayne State

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S

SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S SRA SOLOMON : MUC-4 TEST RESULTS AND ANALYSI S Chinatu Aone, Doug McKee, Sandy Shinn, Hatte Bleje r Sytem Reearch and Application (SRA ) 2000 15th Street North Arlington, VA 2220 1 [email protected] INTRODUCTION

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

Proofs for Traffic Safety

Proofs for Traffic Safety Carl von Oietzky Univerität Oldenburg Fakultät II Informatik, Wirtchaft- und Rechtwienchaften Department für Informatik Proof for Traffic Safety Combining Diagram and Logic Diertation zur Erlangung de

More information

Linear Momentum and Collisions

Linear Momentum and Collisions Chapter 7 Linear Momentum and Colliion 7.1 The Important Stuff 7.1.1 Linear Momentum The linear momentum of a particle with ma m moving with velocity v i defined a p = mv (7.1) Linear momentum i a vector.

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

A Novel Web-Based Student Academic Records Information System

A Novel Web-Based Student Academic Records Information System A Novel Web-Baed Student Record Information Sytem Nmaju Obai, E. O. Nwachukwu, and C. Ugwu Department of Computer Science, Univerity of Port Harcourt, Port Harcourt, River State, Nigeria [email protected],

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

The Cash Flow Statement: Problems with the Current Rules

The Cash Flow Statement: Problems with the Current Rules A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Graph Analyi I Network Meaure of the Networked Adaptive Agents

Graph Analyi I Network Meaure of the Networked Adaptive Agents Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom [email protected] ABSTRACT Experimental analyi of

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 [email protected] Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Differences and Common Aspects of POG and EMR Energy-Based Graphical Techniques

Differences and Common Aspects of POG and EMR Energy-Based Graphical Techniques Difference and Common Apect of POG and EMR -Baed Graphical echnique Roerto Zanai Dement of Information Engineering Univerity of Modena and Reggio Emilia Modena, Italy Email: [email protected] Federica

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS

THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK ABSTRACT KEYWORDS THE IMPACT OF MULTIFACTORIAL GENETIC DISORDERS ON CRITICAL ILLNESS INSURANCE: A SIMULATION STUDY BASED ON UK BIOBANK BY ANGUS MACDONALD, DELME PRITCHARD AND PRADIP TAPADAR ABSTRACT The UK Biobank project

More information

TRID Technology Implementation

TRID Technology Implementation TRID Technology Implementation Jaime Koofky, Managing Attorney, Brady & Koofky PA Cecelia Raine, Co-Chair, Cloing Inight Adviory Board, RealEC Technologie Richard Triplett, CMB, Vice Preident, Director

More information

Linking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter

Linking Example-Based and Rule-Based Machine Translation. Michael Carl, Catherine Pease and Oliver Streiter Linking Example-Baed and Rule-Baed Machine Tranlation Michael Carl, Catherine Peae and Oliver Streiter Intitut fur Angewandte Informationforchung, Martin-Luther Str. 14 (carl,cath,oliver)@iai.uni-b.de

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

Development Progress

Development Progress H T U SO CA'S I R F A : Y R STO ial c o ca i r f A South ytem: e g ity ecur ing covera ing d it Expan t and lim lity a n u a r q g e f n o ni i e n increa orga ny M nke n-za e g a eth ca H Jei harle M

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

Forest Lake Local Plan

Forest Lake Local Plan 1 Introduction Thi Local Plan contain pecific additional local planning requirement. Where it conflict with the requirement of the City Plan, thi Local Plan prevail. In uing thi Local Plan, reference hould

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information