Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Size: px
Start display at page:

Download "Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection"

Transcription

1 Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona Tuson, Arizona, USA {haiyanq, jpeng, feng, Abstrat Mahine learning has great utility within the ontext of network intrusion detetion systems. In this paper, a behavior analysis-based learning framework for host level network intrusion detetion is proposed, onsisting of two parts, anomaly detetion and alert verifiation. The anomaly detetion module proesses unlabeled data using a lustering algorithm to detet abnormal behaviors. The alert verifiation module adopts a novel rule learning based mehanism whih analyzes the hange of system behavior aused by an intrusion to determine whether an attak sueeded and therefore lower the number of false alarms. In this framework, the host behavior is not represented by a single user or program ativity; instead, it is represented by a set of fators, alled behavior set, so that the host behavior an be desribed more aurately and ompletely. 1. Introdution With the growing number of network attaks, intrusion detetion systems (IDSs) are beoming an integral part of any omplete seurity pakage of a modern network system. The IDSs perform surveillane and seurity monitoring of the network infrastruture. A number of different intrusion detetion systems have been developed for partiular domains (e.g., hosts or networks), in speifi environments (e.g., Windows NT or Solaris), and at different levels of abstrations (e.g., kernel-level tools or appliation level tools). However, omputer systems and networks still suffer from an inreased threat of intrusions. The existing IDSs are far from perfet and may generate false positive and nonrelevant positive alerts [1]. The most widely deployed and ommerially available methods for intrusion detetion employ signature-based tehnique, where the signatures or patterns of well-known attaks are provided by human experts. The system or network traffi is sanned for attaks using well-known vulnerabilities and any instanes that math the signatures are deteted as intrusions. The advantage of this method is a low rate of false positives. The disadvantage is that the signature database has to be revised manually and the system is vulnerable to new types of attak until the revision is done. This limitation leads to ative researh on intrusion detetion tehniques based on data mining. Data mining based network intrusion detetion tehniques are generally lassified into two ategories: misuse detetion and anomaly detetion [2]. In misuse detetion, eah instane in the training data set is labeled as either normal or intrusion. A mahine learning algorithm is trained over the labeled data and then the trained model is applied to lassify new data. Misuse intrusion detetion is fast, requires little state information, and has a low false-positive rate. With different input data inluding new types of attaks, the intrusion detetion modules are retrained automatially without the manual intervention. However, misuse detetion annot detet novel, previously unseen attaks. Anomaly detetion, on the other hand, builds models of normal data to measure a "baseline" of suh stats as CPU utilization, disk ativity, user logins, file ativity, and so on. When there is a deviation from this baseline, an alert is triggered. Currently, almost all ommerial intrusion detetion systems use misuse detetion tehniques. Yet, anomaly detetion is getting more attention beause of its apability to detet novel or unforeseen attaks. Essentially, anomaly detetion is the mahine learning problem of modeling a normal network or system behavior. Although anomaly detetion is beoming an ative researh topi, widespread adoption of this method faes numerous obstales, inluding omplexity and high false positive rate. In order to redue false and irrelevant alerts, alert verifiation has to be a part of IDS. Alert verifiation is

2 a proess to determine whether an attak has been suessful or not. This information is passed to IDS to help differentiate the type of alerts [16]: 1) The sensor has orretly identified a suessful attak; 2) The sensor has orretly identified an attak but the attak failed to meet its objetives; and 3) The sensor inorretly identified an event as an attak. Alert verifiation effetively lowers the number of false alarms that an administrator or the deision support system has to deal with. In this paper, a behavior analysis-based learning framework for host based intrusion detetion is proposed, whih inludes anomaly detetion and alert verifiation. The framework has two harateristis. First, it is learning-based. In the anomaly detetion module, a luster-based outlier detetion algorithm detets anomalous data. In the alert verifiation module, a rule-learning algorithm is applied to learn the behavior hanges of the targeted mahine. The rules developed serve as an index of alert verifiation. Seond, the framework is behavior analysis oriented. Instead of using a single ativity as the indiator of the host behavior, a set of indiators, also alled behavior set, is defined and applied to desribe the host behavior. The intrusions are deteted and verified based on the analysis of the behavior set. Compared to other researh work in host-based anomaly detetion, this method does not need high-dimension data sine the host baseline is represented by a refined behavior set and eah element in the behavior set is of low dimensionality. Thus, stateof-the-art data normalization is not required when outlier detetion is applied to detet anomalous data. In setion 2, host based anomaly detetion is reviewed. In setion 3, the behavior analysis-based learning framework is presented and disussed. In setion 4, the experimental results are given. Finally, onlusions and future work are summarized in Setion Related Work In host based anomaly detetion researh, various features are used to model the system behavior baseline, e.g., keystroke harateristis, user ommand data, system all sequenes, file ativities, et. Generally these features fall into three ategories: user profile, program profile, and system resoure aess. Denning [3] first attempted to build anomaly detetion by omparing previous user profiles to urrent user ativity. Sequeira and Zaki [4] designed and implemented a user-profile dependent and temporal sequene lustering-based intrusion detetion system by olleting and proessing UNIX shell ommand data. Although analysis of user ativity is a natural approah to detet intrusions, experiene shows that it is far from aurate. This is beause user behavior typially laks strit patterns. User dynamis allowed more refletion on the features that define host behavior. All ations arried out by users involve using programs. Programs obtain the required servies by exeuting the speifi system all that provides the needed funtion. Sine the ode of a given appliation should not hange, the sequene of system alls exeuted by a program should be regular and preditive. Most existing researh on anomaly detetion uses system alls to model system behavior. A number of approahes based on system alls are proposed. Forrest et al. [5] established an analogy between the human immune system and intrusion detetion. Lee et al [6] applied a rule learning program to study a sample of system all data. Wagner and Dean [7] proposed to statially generate a non-deterministi finite automaton (NDFA) from the global ontrol-flow graph of the program and simulated NDFA on observed system all trae. Ghosh et al. [10] utilized return address information extrated from the all stak to generate the exeution path of a program for anomaly detetion. Liao and Vemuri [9] used the k-nearest Neighbor lassifier to lassify program behavior represented by frequenies of system alls instead of system all sequene. Eskin et al. [11] applied outlier detetion algorithms to anomaly detetion using system all data, where the system all data has to be mapped into feature spae and the hoie of feature spae is appliation speifi. Beause the system-all level data is fine grained, it inreases overhead and dereases system performane. Thus, some researhers study anomaly detetion by modeling files ativities. Stolfo et al. [13] studied anomaly detetion by learning file system aess patterns. Apa et al. [12] notied that in Windows OS almost all system ativities interat with the registry, so they analyzed anomaly detetion through modeling normal registry aess. In reality, an attak is usually unpreditable, and it is diffiult to know whih aspet of the system behavior is assoiated with the attak. For this reason, modeling system behavior based on only a single ategory is unreliable, no matter whether the ategory is user profile, program profile, or system resoure aess. In what follows, we try to model behavior from all three ategories to inrease the reliability of system behavior modeling, and thus to inrease the auray of anomaly detetion. 3. Behavior Analysist-Basd Learning Framework A system onsists of both the user and the host mahine. It is appropriate to desribe the system behaviors using a set of fators of user profile, program

3 profile, and system resoure usage. We all the set of fators the behavior set. In this setion, a learning framework of intrusion detetion is proposed based on analysis of the behavior set, as shown in Fig. 1. This framework inludes three modules: anomaly detetion, alert fusion, and alert verifiation. The input of the framework is an event, modeled as a triple { subjet verb objet} for user/program behavior, and the output is alerts with features of alert ID, alert type, timestamp, priority level, onfidene fator, verifiation status. In the anomaly detetion module, the normal behavior baseline is modeled adaptively and stored in the database. When a new event omes, it is lassified as normal or intrusion by the module. If an alert is triggered, the alert is fused with other existing alerts to derease the number of alerts with the same ause. Then the fused alerts are sent to the alert verifiation module to exlude false or unrelated alerts. In this paper, we disuss only the learning related modules: anomaly detetion and alert verifiation. To model normal system behavior, both supervised and unsupervised learning algorithms an be applied. We hoose unsupervised learning over supervised learning. The main reason is that unsupervised learning does not need labeled (normal/abnormal) data, whih is not readily available in reality. Labeled data is generally obtained by simulation or experiments. If labeled data is obtained by simulated intrusions, we are limited to the set of known attaks that we simulated. New types of attaks are not refleted in the training data set. If labeled data is obtained by experiments, then we must fae the diffiulties in manually lassifying large volume of audit data. In addition, if the experimental data labeled normal have buried intrusions, then future instanes of those intrusions will not be deteted beause they are assumed normal in the training set. Unsupervised learning algorithms take as input a set of unlabeled data and attempt to find noise and intrusions buried within the data. If anomalies are rare, unsupervised learning an be treated as a variant of the outlier detetion problem. Outlier based anomaly detetions luster the data based on ertain metris and the data loated in sparse regions are laimed as intrusions. Not all intrusions an be deteted using outlier based anomaly detetion. For example, syn-flood DOS annot be deteted using outlier detetion sine they are not rare in data distribution. Only when system behavior deviates signifiantly from average behavior are outlier detetions appliable Outlier detetion algorithm The outlier detetion algorithm we propose is given in Table I. The algorithm is an improvement of fixedwidth luster estimation [11]. For eah point, the algorithm approximates the density of points near the given point. The algorithm makes this approximation by ounting the number of points that are within a sphere of radius w around the point. Points that are in a dense region of the feature spae and ontain many points within the irle or ball are onsidered normal. Points that are in a sparse region of the feature spae and ontain few points within the irle or ball are onsidered anomalies. In the original fixed-width luster estimation, data that does not belong to any existing lusters is assigned to a new luster and works as the entral point. So the entral point of a luster is sensitive to the sequene of data to be lustered and new data might not be assigned to the losest luster. In the improved fixed width lustering algorithm, the entral point of a luster is adjusted as new data is added so data are always assigned to the losest luster. The idea of updating the entral point of a luster is lose to K-means lustering, one of the most popular statistial lustering algorithms. Unlike K-means lustering, the improved fixed-width luster estimation speifies luster width instead of fixing the number of lusters a priori. Thus the results are sensitive to the value of luster width. However, this problem an be easily solved by interation with the lustering results through GUI. Sine the lustering is performed offline, it is easy to adjust the width adaptively based on the visual lustering results when the lustering data is of low dimension. Using outlier detetion, it is preferable that the training data be of low dimensionality for the following reasons. First, when distanes are measured in all dimensions, it is more diffiult to detet outliers effetively beause of the average behavior of the noisy and irrelevant dimensions. Seond, it is not easy to intuitively explain and understand the lustering results with high dimensions. Third, in high dimensional spae, the data is sparse and the notion of proximity fails to retain its meaningfulness. Finally, with inreasing dimensionality, it beomes inreasingly diffiult and inaurate to estimate the multidimensional distribution of the data points. Atually, in the learning framework we propose, we do not need to use high dimensionality to represent the feature spae of the system behavior. Beause the system behavior is desribed by a set of fators instead of a single omplex indiator, all the elements in the behavior set are ensured to be represented by low dimensional data, e.g., the login time, aess frequenies of the files, et.

4 Figure 1. Behavior analysis-based learning framework for host-based intrusion detetion 3.2. Behavior analysis-based intrusion detetion Anomaly detetion an only detet intrusions that make the host behave differently from normal. Thus, before we attempt to model normal behavior, the key question is how to define host behavior. As analyzed at the beginning of the setion, we use behavior set to desribe system behavior in order to aurately and ompletely reflet the system harateristis. The behavior set is speified as a set {user login time, frequeny of appliations launhed, I/O ativities, frequeny of files aess, network ativities stats, CPU usage pattern over time, memory usage pattern, data bandwidth, network onnetion speed}. In the set, user login time helps to loate normal login time intervals; frequeny of appliation launhed loates the most and the least used appliations; frequeny of files an loate the most and the least aessed files; I/O ativities indiates the average bytes written to the files; network ativities stats loate normal sequene, frequeny, time interval, and other indexes of various network ativities, e.g., web browsing, ftp et.; CPU and memory usages et. are related to system performane. To desribe the host behavior, we need metadata. A relational database is onstruted to store system profiling metadata. The database onstruted with WAMP is shown in Fig. 2. In the database, the table features are well designed to reveal the information defined in the behavior set. For example, the table USER has features of userid, user name, login time, remote/loal login, logoff time. The table PROCESS has features of proess Id, proess name, owner of the proess, memory usage of the proess, CPU usage of the proess, time. To maintain data in real time, the data is updated periodially. The time interval to ollet data an be modified by the user via a sliding bar in the GUI as shown in Fig. 2. In addition, the user an easily selet a table and look at the data through the database interfae. When the reord size overflows, the new reord overwrites the oldest reord. With the profiling database, the outlier detetion algorithm is applied to eah single fator in the behavior set if appliable. For instane, the user login time is trained to get the normal login time intervals, e.g., [8:00 9:00] and [13:00 14:00]. The CPU usage pattern is learned to model the normal distribution pattern, e.g. peak time at [9:00 11:00] and [14:00 16:00]. Typially, only a few indiators of the behavior set are deteted as abnormal. So the signifiane of the host s deviation from normal behavior has to be measured in some way. In this framework, we adopt the idea of the weighted sum. First, the deviation of eah behavior indiator is alulated using the outlier detetion algorithm. Then we ompute the overall deviation from the host baseline model: ( m m 1 2 m w d + w d + + w d ) /( w + w + + w ), Where m is size of behavior set, wi is predefined weight of indiator i in the behavior set, and dm is binary value 0 or 1, i.e., normal or abnormal. When the total deviation is beyond a threshold, an alert is generated. The values of w i ( i = 1,2, m) an be ustomized based on the host funtion and the user type. For example, a software developer and an administrator will have very different file ativities. If we know the user of the host is a software

5 developer and the mahine is mainly used for software development, we an put more weight on deviations of frequeny of appliations launhed, I/O ativities, and frequeny of file aess. Inputs: TABLE I. Cluster width w ANOMALY DETECITON ALGORITHM The unlabeled data set D with n dimension Initialization: Set of lusters S is empty Loop until D is empty For eah data d in data set D: If S is empty reate a luster C with one element d, add C the luster to SC S S, and set d as entroid x, ) of C. ( 0 y0 Otherwise find the losest luster C in S suh that for any luster C in S, dist(c, d) dist(c, d), where dist(c, d) is Eulidean distane from d to the entroid of luster C. If dist(c, d) w insert d into luster C. adjust the old entroid x, ) to ( ', ' x ), where ( y y0 ' ' x0 = ( m x0 + m) /( m + 1), y 0 = ( m y0 + m) /( m + m = C -1. Otherwise a new luster C d with d as entroid is reated, S { Cd } S. D { d} D Find outliers: Sort the lusters based on sizes in asending sequene, Ci C 2 Cl, where l is the number of lusters. Let C + C + + C. i 2 l = p For i = 1to l If C i < ( p / l) 20%, set the luster Ci as abnormal, i++ Otherwise, set any luster C j 1),, j i as normal, break When a new servie is installed or the user s behavior hanges suddenly, false alerts are triggered. In this ase, the fuse module will fuse alerts generated for the same reason. When new data instanes are treated as intrusion by the anomaly detetion module at the beginning of a pattern hange, the new data are not disarded. As the data forming new pattern inreases, the host profiling database is updated, and the lustering algorithm is retrained over the new set of data for modeling the emerging new pattern Figure 2. System performane database When the behavior set is modified, the learning algorithm remains the same, but the database has to be modified or reonstruted Behavior analysis-based alert verifiation Conventional alert verifiation approahes inlude ative and passive mehanisms [1]. Passive alert verifiation mehanisms ompare the onfiguration of the vitim mahine to the requirements of a suessful attak, e.g., a vulnerable version of the Mirosoft IIS server. It gathers onfiguration data before an attak ours and determines whether the target mahine is vulnerable to the attak. Ative mehanisms model the expeted outome of attaks, heking the visible and hekable traes that a ertain attak leaves at a host, e.g., a temporary file or an outgoing network onnetion. They gather onfiguration data or forensi traes after an alert ours. Neither approah an detet unknown attaks. They assume that either the system vulnerability required by an attak or the outome of an attak is known in advane. If this is true, the attak an be prevented by installing a new servie pak. Then there is no need to detet the attak. In the proposed learning framework, we fous on the verifiation of unknown and new types of attaks based on host behavior analysis. The after-attak performane measured in quantity might be different in different systems. However, the variane between prior-attak behavior and post-attak behavior is onsistent on various mahines. For example, an attak auses the network onnetion to be 50% slower no matter what type of CPU and bandwidth the mahine has. Therefore, the basi idea of the alert

6 verifiation module is to learn the behavior features assoiated with an attak and hek the hange of the value of those features. It is appliable to the attaks that ause system behavior hange. In the training phase, one an alert is verified manually by system administration, the system behavior both before and after the attak ours are sampled from the system performane database and stored in a separate system metadata database. Sine eah alert has a timestamp t, we just need to probe the system performane database and get the reords at time t and the last sample time t-1. For eah system performane-related feature in the reords, we alulate the hange of feature values: feature = ( feature ( t) feature ( t 1) / feature ( t 1) i i i i. of length 4 will give a dimension of the feature spae 26 4, lose to 500,000. To implement the learning framework proposed, we started with system metadata olletion. Based on the behavior set we defined, as desribed in setion 3, we onstruted the WAMP database server and wrote C++ ode to ollet the system performane data from a host and store the data into the database. The data will be used as a training set to model the normal behavior of the system. The data is olleted in real time and the database is updated dynamially. The data sampling rate is predefined and an be modified through a sliding bar on the GUI as shown in Fig. 2. Fig. 3 shows one of the tables in the system profiling database -- CPU usage data olleted from the host. The system performane features inlude CPU usage, memory usage, I/O usage, network stats et. A reord in the form of { l alertid, alerttype, feature1, feature2,, feature } is added to the onfiguration hange baseline database, where l is the number of total features, featurei is the relative value hange of feature i. When the onfiguration hange baseline database is onstruted, the rule learning algorithm RIPPER [14] will be applied to the database. When applying RIPPER, we get rules for different types of alerts separately. To extrat rules for alert type i using RIPPER, all the reords with that alert type are treated as positive data, all the other reords are treated as negative data. RIPPER takes the positive and negative data sets as input, and outputs a rule set represented as a onjuntion of onditions in the form of A n = v, A θ, or A θ, where An is a nominal attribute and v is a legal value for A n, and A is a ontinuous variable and θ is some value for A. Figure 3. CPU usage data olleted from host 4. Experimental Results There are some benhmark data available for network intrusion detetion researh. For host-based intrusion detetion, one data set is from the 1999 DARPA intrusion detetion evaluation data whih onsists of BSM (Basi Seurity Module) data of all proesses run on Solaris mahines. Another set of data, obtained from Stephanie Forrest s group at the University of New Mexio [15], ontains normal traes for ertain programs as well as intrusion traes of system alls for several proesses. In our study, these benhmark data are not appliable. First, beause we use a novel onept, behavior set, to desribe system behavior instead of using system all traes, and seond, beause all behavior elements are of low dimension data for the auray of lustering. System all data annot be used for lustering diretly and the preproessing of data is expensive. Eskin et al. [11] adopted spetrum kernels to map the system all data into feature spae. However, the feature spae orresponding to system alls is in large dimension, e.g., 26 possible system alls and sub-sequenes Figure 4. Experimental result of lustering The unsupervised anomaly detetion algorithm is implemented in Java. Given the training data set and luster

7 width, the luster-based outlier detetion algorithm is applied and the simulation result is shown in Fig. 4. Using this algorithm, data instanes in sparse regions are treated as noise and intrusions buried in the training data, and data instanes in dense regions are treated as normal data. When a new data instane omes, whether it is labeled as normal or intrusion depends on whih region it is loated in. The algorithm needs to speify luster width instead of the number of lusters. Beause the lustering is performed offline, the luster width an be adjusted easily through the GUI for aurate results. The onnetion with the database server is implemented with Java JDBC and the anomaly detetion algorithm is also applied to real data from the database. The initial experimental results on a few fators in the behavior set, e.g., the user login time and CPU usage distribution over time, are satisfatory. Further experiments need to be arried out. To adapt to system behavior pattern hanges, the database is updated periodially and the algorithm is applied over the new input data to update the lusters that represent normal behavior. 5. Conlusion In this paper, behavior analysis-based intrusion detetion at the host level has been disussed and a learning frame has been proposed. Two parts in the frame, anomaly detetion and alert verifiation, have been designed using mahine learning tehniques. The behavior analysis-based framework has the following advantages: 1) the host behavior is desribed more aurately and omprehensively with a set of indiators, i.e., user profile, program profile, and system resoure aess; 2) the anomaly detetion module does not need labeled data, whih are diffiult to obtain; 3) eah indiator in the behavior set is represented by the data in low dimensionality sine the host behavior is refined into a set of indiators; 4) with these low dimension data, the lustering algorithm an be applied over the data without normalization, whih is data-dependent and appliation speifi; 5) the lustering algorithm does not need to predefine the number of lusters, and the width of lusters an be adjusted visually offline; and 6) a novel alert verifiation approah an hek the hanges in the host behavior aused by an attak and learn rules assoiated with the attak. Currently, the anomaly detetion module has been simulated and the host profiling database has been onstruted. In the future, the anomaly detetion module will be tested on data from a real-world database and the testing results will be arefully examined. In addition, we will implement the alert verifiation mehanism. Referenes [2] S. Axelsson. Intrusion detetion systems: A survey and taxonomy. Tehnial Report 99-15, Department of Computer Engineering, Chalmers University, Marh [3] D. E. Denning, "An intrusion-detetion model." IEEE Transations on Software Engineering, Vol. SE-13(No. 2): , Feb [4] K. Sequeira, M. Zaki, ADMIT: Anomaly-based Data Mining for Intrusions, Proeedings of the 8th ACM SIGKDD International Conferene on Knowledge Disovery and Data Mining, Edmonton, July [5] S. Forrest, S.A. Hofmeyr, and A. Somayaji. Computer immunology. Communiations of the ACM, 40(10):88-96, Otober [6] W. Lee, S. Stolfo, and P.K. Chan. Learning patterns from unix proess exeution traes for intrusion detetion. In Proeedings of AAAI97 Workshop on AI Methods in Fraud and Risk Management, [7] D. Wagner and D. Dean, Intrusion Detetion via Stati Analysis, IEEE Symposium on Seurity and Privay, Oakland, CA, 2001 [8] Henry Hanping Feng, Oleg M. Kolesnikov, Prahlad Fogla, Wenke Lee, and Weibo Gong. Anomaly Detetion Using Call Stak Information [9] Yihua Liao, V. Rao Vemuri. Use of K-Nearest Neighbor lassifier for intrusion detetion. Computer and Seurity. Volume 21, Issue 5, 1 Otober 2002, pages [10] A. K. Ghosh, A. Shwartzbard, and M. Shatz. Learning program behavior profiles for intrusion detetion. In Proeedings of the 1st USENIX Workshop on Intrusion Detetion and Network Monitoring. USENIX Assoiation, April [11] Eskin, E, A Arnold, M Prerau, L Portnoy, SJ Stolfo. A geometri framework for unsupervised anomaly detetion: deteting intrusions in unlabeled data. In Data Mining for Seurity Appliations, [12] Apap, F., A. Honig, S. Hershkop, E. Eskin and S. Stolfo. Deteting Maliious Software by Monitoring Anomalous Windows Registry Aesses. Fifth International Symposium on Reent Advanes in Intrusion Detetion, RAID Zurih, Switzerland, [13] Stolfo, S. J., L. Bui, Shlomo. Hershkop. Unsupervised Anomaly Detetion in Computer Seurity and an Appliation to File System Aess. Pro. ISMIS, pp , [14] Cohen, W. W. Fast effetive rule indution. In Proeedings of the 12th International Conferene on Mahine Learning. Lake Tahoe, CA, [15] Warrender, C., S. Forrest, and B. Pearlmutter. Deteting intrusions using system alls: alternative data models. In 1999 IEEE Symposium on Seurity and Privay, pages IEEE Computer Soiety, 1999 [16] C. Kruegel and W. Robertson, Alert Verifiation: Determining the Suess of Intrusion Attempts, Pro. First Workshop the Detetion of Intrusions and Malware and Vulnerability Assessment (DIMVA 2004), July [1] F. Valeur, G. Vigna, C. Kruegel, R. A. Kemmerer. A omprehensive approah to intrusion detetion alert orrelation. 2004

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore.

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: wliu5@ie.uhk.edu.hk 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Unit 12: Installing, Configuring and Administering Microsoft Server

Unit 12: Installing, Configuring and Administering Microsoft Server Unit 12: Installing, Configuring and Administering Mirosoft Server Learning Outomes A andidate following a programme of learning leading to this unit will be able to: Selet a suitable NOS to install for

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS

GABOR AND WEBER LOCAL DESCRIPTORS PERFORMANCE IN MULTISPECTRAL EARTH OBSERVATION IMAGE DATA ANALYSIS HENRI COANDA AIR FORCE ACADEMY ROMANIA INTERNATIONAL CONFERENCE of SCIENTIFIC PAPER AFASES 015 Brasov, 8-30 May 015 GENERAL M.R. STEFANIK ARMED FORCES ACADEMY SLOVAK REPUBLIC GABOR AND WEBER LOCAL DESCRIPTORS

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES

NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES The 9 th International Days of Statistis and Eonomis, Prague, September 10-1, 015 NOMCLUST: AN R PACKAGE FOR HIERARCHICAL CLUSTERING OF OBJECTS CHARACTERIZED BY NOMINAL VARIABLES Zdeněk Šul Hana Řezanková

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. mony@reaform3d.om Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY pperner@ibai-institut.de,

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 07/14 * Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online

More information

Electrician'sMathand BasicElectricalFormulas

Electrician'sMathand BasicElectricalFormulas Eletriian'sMathand BasiEletrialFormulas MikeHoltEnterprises,In. 1.888.NEC.CODE www.mikeholt.om Introdution Introdution This PDF is a free resoure from Mike Holt Enterprises, In. It s Unit 1 from the Eletrial

More information

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain

Customer Reporting for SaaS Applications. Domain Basics. Managing my Domain Produtivity Marketpla e Software as a Servie Invoiing Ordering Domains Customer Reporting for SaaS Appliations Domain Basis Managing my Domain Managing Domains Helpful Resoures Managing my Domain If you

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS

INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS Virginia Department of Taxation INCOME TAX WITHHOLDING GUIDE FOR EMPLOYERS www.tax.virginia.gov 2614086 Rev. 01/16 Table of Contents Introdution... 1 Important... 1 Where to Get Assistane... 1 Online File

More information

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS

TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS TECHNOLOGY-ENHANCED LEARNING FOR MUSIC WITH I-MAESTRO FRAMEWORK AND TOOLS ICSRiM - University of Leeds Shool of Computing & Shool of Musi Leeds LS2 9JT, UK +44-113-343-2583 kia@i-maestro.org www.i-maestro.org,

More information

Using Live Chat in your Call Centre

Using Live Chat in your Call Centre Using Live Chat in your Call Centre Otober Key Highlights Yesterday's all entres have beome today's ontat entres where agents deal with multiple queries from multiple hannels. Live Chat hat is one now

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman bowman@vt.edu Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

Robust Classification and Tracking of Vehicles in Traffic Video Streams

Robust Classification and Tracking of Vehicles in Traffic Video Streams Proeedings of the IEEE ITSC 2006 2006 IEEE Intelligent Transportation Systems Conferene Toronto, Canada, September 17-20, 2006 TC1.4 Robust Classifiation and Traking of Vehiles in Traffi Video Streams

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk

Classical Electromagnetic Doppler Effect Redefined. Copyright 2014 Joseph A. Rybczyk Classial Eletromagneti Doppler Effet Redefined Copyright 04 Joseph A. Rybzyk Abstrat The lassial Doppler Effet formula for eletromagneti waves is redefined to agree with the fundamental sientifi priniples

More information

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Pre-Experience Postgraduate Programmes Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management For students entering in 2012/3 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date of speifiation:

More information

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1

OpenScape 4000 CSTA V7 Connectivity Adapter - CSTA III, Part 2, Version 4.1. Developer s Guide A31003-G9310-I200-1-76D1 OpenSape 4000 CSTA V7 Connetivity Adapter - CSTA III, Part 2, Version 4.1 Developer s Guide A31003-G9310-I200-1-76 Our Quality and Environmental Management Systems are implemented aording to the requirements

More information

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE

UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE UNIVERSITY AND WORK-STUDY EMPLOYERS WEB SITE USER S GUIDE September 8, 2009 Table of Contents 1 Home 2 University 3 Your 4 Add 5 Managing 6 How 7 Viewing 8 Closing 9 Reposting Page 1 and Work-Study Employers

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

BENEFICIARY CHANGE REQUEST

BENEFICIARY CHANGE REQUEST Poliy/Certifiate Number(s) BENEFICIARY CHANGE REQUEST *L2402* *L2402* Setion 1: Insured First Name Middle Name Last Name Permanent Address: City, State, Zip Code Please hek if you would like the address

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Agile ALM White Paper: Redefining ALM with Five Key Practices

Agile ALM White Paper: Redefining ALM with Five Key Practices Agile ALM White Paper: Redefining ALM with Five Key Praties by Ethan Teng, Cyndi Mithell and Chad Wathington 2011 ThoughtWorks ln. All rights reserved www.studios.thoughtworks.om Introdution The pervasiveness

More information

i_~f e 1 then e 2 else e 3

i_~f e 1 then e 2 else e 3 A PROCEDURE MECHANISM FOR BACKTRACK PROGRAMMING* David R. HANSON + Department o Computer Siene, The University of Arizona Tuson, Arizona 85721 One of the diffiulties in using nondeterministi algorithms

More information

Automated Test Generation from Vulnerability Signatures

Automated Test Generation from Vulnerability Signatures Automated Test Generation from Vulneraility Signatures Adulaki Aydin, Muath Alkhalaf, and Tevfik Bultan Computer Siene Department University of California, Santa Barara Email: {aki,muath,ultan}@s.us.edu

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, kstef@s.uoi.gr Evaggelia

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

MEMBER. Application for election MEMBER, NEW GRADUATE. psychology.org.au. April 2015

MEMBER. Application for election MEMBER, NEW GRADUATE. psychology.org.au. April 2015 MEMBER Appliation for eletion MEMBER, NEW GRADUATE April 2015 psyhology.org.au MEMBER Belonging to the Australian Psyhologial Soiety (APS) means you are part of an ative, progressive organisation whih

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA faramarz@sienes.sdsu.edu

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling

Agent-Based Grid Load Balancing Using Performance-Driven Task Scheduling Agent-Based Grid Load Balaning Using Performane-Driven Task Sheduling Junwei Cao *1, Daniel P. Spooner, Stephen A. Jarvis, Subhash Saini and Graham R. Nudd * C&C Researh Laboratories, NEC Europe Ltd.,

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html

Programming Basics - FORTRAN 77 http://www.physics.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html CWCS Workshop May 2005 Programming Basis - FORTRAN 77 http://www.physis.nau.edu/~bowman/phy520/f77tutor/tutorial_77.html Program Organization A FORTRAN program is just a sequene of lines of plain text.

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Account Contract for Card Acceptance

Account Contract for Card Acceptance Aount Contrat for Card Aeptane This is an Aount Contrat for the aeptane of debit ards and redit ards via payment terminals, on the website and/or by telephone, mail or fax. You enter into this ontrat with

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

Optimal Sales Force Compensation

Optimal Sales Force Compensation Optimal Sales Fore Compensation Matthias Kräkel Anja Shöttner Abstrat We analyze a dynami moral-hazard model to derive optimal sales fore ompensation plans without imposing any ad ho restritions on the

More information

Retirement Option Election Form with Partial Lump Sum Payment

Retirement Option Election Form with Partial Lump Sum Payment Offie of the New York State Comptroller New York State and Loal Retirement System Employees Retirement System Polie and Fire Retirement System 110 State Street, Albany, New York 12244-0001 Retirement Option

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

CIS570 Lecture 4 Introduction to Data-flow Analysis 3

CIS570 Lecture 4 Introduction to Data-flow Analysis 3 Introdution to Data-flow Analysis Last Time Control flow analysis BT disussion Today Introdue iterative data-flow analysis Liveness analysis Introdue other useful onepts CIS570 Leture 4 Introdution to

More information

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning Ranking Community Answers by Modeling Question-Answer Relationships via Analogial Reasoning Xin-Jing Wang Mirosoft Researh Asia 4F Sigma, 49 Zhihun Road Beijing, P.R.China xjwang@mirosoft.om Xudong Tu,Dan

More information

Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production L

Masters Thesis- Criticality Alarm System Design Guide with Accompanying Alarm System Development for the Radioisotope Production L PNNL-18348 Prepared for the U.S. Department of Energy under Contrat DE-AC05-76RL01830 Masters Thesis- Critiality Alarm System Design Guide with Aompanying Alarm System Development for the Radioisotope

More information

BUILDING A SPAM FILTER USING NAÏVE BAYES. CIS 391- Intro to AI 1

BUILDING A SPAM FILTER USING NAÏVE BAYES. CIS 391- Intro to AI 1 BUILDING A SPAM FILTER USING NAÏVE BAYES 1 Spam or not Spam: that is the question. From: "" Subjet: real estate is the only way... gem oalvgkay Anyone an buy real estate with no

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

IT Essentials II: Network Operating Systems

IT Essentials II: Network Operating Systems Unit 13: IT Essentials II: Network Operating Systems Learning Outomes: A andidate following a programme of learning leading to this unit will be able to: demonstrate understanding of network operating

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois RISK-BASED IN SITU BIOREMEDIATION DESIGN BY JENNINGS BRYAN SMALLEY A.B., Washington University, 1992 THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Siene in Environmental

More information

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm,

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data Criminal Georaphial rofilin: Usin FCA for Visualization and Analysis of Crime Data Quist-Aphetsi Kester, MIEEE Leturer, Faulty of Informatis Ghana Tehnoloy University Collee Ara, Ghana Email: kquist-aphetsi@tu.edu.h

More information

Picture This: Molecular Maya Puts Life in Life Science Animations

Picture This: Molecular Maya Puts Life in Life Science Animations Piture This: Moleular Maya Puts Life in Life Siene Animations [ Data Visualization ] Based on the Autodesk platform, Digizyme plug-in proves aestheti and eduational effetiveness. BY KEVIN DAVIES In 2010,

More information

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD)

Henley Business School at Univ of Reading. Chartered Institute of Personnel and Development (CIPD) MS in International Human Resoure Management (full-time) For students entering in 2015/6 Awarding Institution: Teahing Institution: Relevant QAA subjet Benhmarking group(s): Faulty: Programme length: Date

More information

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

NASDAQ Commodity Index Methodology

NASDAQ Commodity Index Methodology NASDAQ Commodity Index Methodology January 2016 1 P a g e 1. Introdution... 5 1.1 Index Types... 5 1.2 Index History... 5 1.3 Index Curreny... 5 1.4 Index Family... 6 1.5 NQCI Index Setors... 6 2. Definitions...

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS

university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS university of illinois library AT URBANA-CHAMPAIGN BOOKSTACKS CENTRAL CIRCULATION BOOKSTACKS The person harging this material is responsible for its renewal or its return to the library from whih it was

More information

Health Savings Account Application

Health Savings Account Application Health Savings Aount Appliation FOR BANK USE ONLY: ACCOUNT # CUSTOMER # Health Savings Aount (HSA) Appliation ALL FIELDS MUST BE COMPLETED. Missing fields may delay the aount opening proess and possibly

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential)

The D.C. Long Term Disability Insurance Plan Exclusively for NBAC members Issued by The Prudential Insurance Company of America (Prudential) Plan Basis The D.C. Long Term Disability Insurane Plan Exlusively for NBAC members Issued by The Prudential Insurane Company of Ameria (Prudential) What does it over? The D.C. Long Term Disability Insurane

More information