An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

Size: px
Start display at page:

Download "An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking"

Transcription

1 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp An Integrated Approach for Monitoring Service Level Paraeters of Software-Defined Networking Hui Xu and Hongwei Chen School of Coputer Science, Hubei University of Technology, Wuhan, China uhui@ail.hbut.edu.cn Abstract Software-Defined Networking (SDN) is a new-generation network that decouples the control plane and the data plane, and an additional anageent plane still lacks a ature ipleentation solution. In this case, onitoring service level paraeters is of great significance to study issues related to service anageent for SDN. This paper then ais to apply the queuing theory and the etension theory to onitor service level paraeters of SDN and propose an integrated approach based on both two theories fro the foralization point of view. Siulation result and scenario analysis validate that, the proposed integrated approach prospects a feasible way of foralizing the solution to onitor service level paraeters of SDN. Keywords: Software-Defined Networking, service level paraeters, queuing theory, etension theory, integration 1. Introduction Copared to coputer networking, Software-Defined Networking (SDN) tries to decouple the control plane and the data plane, and an additional anageent plane for SDN sees to be in need, but this anageent plane still lacks a ature ipleentation solution [1]. In this case, SDN services are provided by SDN service providers to eet the requireents of SDN service users, and as for SDN service users and providers, the specification of services in SDN needs to be seriously considered by ters of a targeted service level. Service Level Agreeent (SLA) is then introduced to define specific perforance etrics and acceptable levels of network-provider perforance with respect to these etrics []. SLA consists of service level objectives, and one ain subject of service level objects is to onitor service level paraeters. Siilar to coputer networking, service level paraeters of SDN are used to describe the level of service provided by SDN service providers for SDN service users. Thus, onitoring service level paraeters is of great iportance to study issues related to service anageent for SDN. This paper then tries to propose an integrated approach based on both the queuing theory and the etension theory, in order to proote the foralization on onitoring service level paraeters of SDN. The reainder of this paper is organized as follows. Section considers the use of Manageent Inforation Base (MIB) for onitoring service level paraeters of SDN. Section 3 then proposes an integrated approach based on both the queuing theory and the etension theory to proote the foralization on onitoring service level paraeters of SDN. Section 4 provides siulation result and scenario analysis in order to validate the feasibility of proposed integrated approach for foralizing the solution to onitor service level paraeters of SDN. Section 5 concludes this paper. ISSN: IJFGCN Copyright c 15 SERSC

2 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15). Manageent Inforation Base for Monitoring Service Level Paraeters of SDN Open Networking Foundation (ONF) is an organization to proote SDN standardizations, and it proposes the OpenFlow anageent and configuration protocol (OF-CONFIG, the newest version is 1. up to now) [3] for SDN anageent. OF-CONFIG adopts NETCONF [4] as the transport protocol, and current version 1. of OF-CONFIG uses the copanion YANG odule to realize its data odel. As the new-generation anageent inforation specification language proposed by Internet Engineering Task Force (IETF), YANG [5] can be used to define MIB as the data odel for onitoring service level paraeters of SDN. Figure 1 shows an eaple of anageent inforation definition using YANG fro ietf-interfaces MIB as specified in RFC 73 [6]. Figure 1. An Eaple of Manageent Inforation Definition fro Ietf- Interfaces Mib As is indicated in Figure 1, when YANG is utilized to specify MIBs related to service level paraeters of SDN, soe lessons ay be learned fro eisting anageent inforation definitions using Structure of Manageent Inforation version (SMIv), and in this eaple, the referred one is ifadinstatus in the Interfaces Group MIB fro RFC Proposed Integrated Approach for Monitoring Service Level Paraeters of SDN As for onitoring service level paraeters of SDN, the queuing theory is in favor of studying the regularity of the queuing odel to onitor service level paraeters of SDN. And based on this, the etension theory is integrated to prospect a proising solution to the quantitative change in this contradictory proble for 198 Copyright c 15 SERSC

3 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) onitoring service level paraeters of SDN. An integrated approach based on both two theories above is then proposed fro the foralization point of view Application of the Queuing Theory When applying the queuing theory [7], the assuptions are that SDN assigns anageent processes independent of each other for job requests fro SDN service users, and both job requests and anageent processes are supposed to be negative eponential distribution, epressed as Definition 1. Definition 1 Assue that is a rando variable and its probability density function is f t e, t, t t, then it indicates that follows the negative eponential distribution, with its distribution function as (1) F t 1 e, t, t t () If follows the negative eponential distribution as Definition 1, the atheatical 1 epectation of is, and the variance of is. As for the case of onitoring service level paraeters of SDN, job requests fro SDN users are supposed to be negative eponential distribution of paraeter, and anageent processes fro SDN service providers independent of each other are supposed to be negative eponential distribution of paraeter. Thus fro the viewpoint of the queuing theory, onitoring service level paraeters of SDN can be seen as the M / M / / FCFS queuing odel, in which M eans eponential distribution, is the assued nuber of anageent processes independent of each other assigned by SDN for job requests fro SDN service users, and FCFS indicates the First Coe First Serve principle. In this queuing odel for onitoring service level paraeters of SDN, p P X,1,,... is introduced to define the possibility distribution for the nuber of SDN service users naed as X. And since there are anageent processes assigned by SDN for job requests fro SDN service users, then 1,,1,,... (3),1 1, (4) Suppose and, when 1, according to the queuing theory, the possibility of idle state for anageent processes is p 1!! 1 1 (5) Copyright c 15 SERSC 199

4 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) Based on Forula (5), p can be calculated as p p!!,1 1 p, As is indicated in Forula (6), when, the net job request fro SDN service users ust wait, thus the Erlang waiting Forula then provides the possibility of the request waiting for anageent processes assigned by SDN as w, p (6) (7)! 1 The average queue length for this queuing odel to onitor service level paraeters of SDN can then be defined as L q p! 1 w, 1 Based on Forula (8), the average length for this queuing odel to onitor service level paraeters of SDN can be defined as L L q According to Little Forula, the average waiting tie T w tie T s can then be calculated as (8) (9) and the average staying L q T (1) w L T (11) s 3.. Integration with the Etension Theory Based on the proposed queuing odel for onitoring service level paraeters of SDN, the quantitative change in this contradictory proble ust be seriously considered fro the viewpoint of foralization. Thus in this case, the etension theory etends the concept of distance to the concept of etension distance [8], and the etension distance uses the negative value to indicate the distance between the point in a section and the section itself. Definition and Definition 3 respectively epress the etension distance between a detected value fro onitoring the service level paraeter of SDN and one value doain or two value doains. Definition Assue that V, y is the acceptable value doain of a service level paraeter of SDN in the real field, and v is a detected value fro onitoring this service level paraeter, then the etension distance between v and V is defined as d v, V v (1) y y Copyright c 15 SERSC

5 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) Definition 3 Assue that V, y and V, y are respectively the acceptable value doain and the coplete value doain of a service level paraeter of SDN in the real field, V V and v is a detected value fro onitoring this service level paraeter, then the etension distance between v and these two related value doains V and V is defined as D v, V, V d v, V d v V (13), Based on the etension distance forally specified by Definition and Definition 3, the dependent function is then introduced by the etension theory to describe the degree of which things have a certain property according to historical data or professional standards [8]. As for the case of onitoring service level paraeters of SDN, the dependent function is utilized to avoid subjective judgent, and with the use of the acceptable value doain and the coplete value doain, the association degree can be confired by the dependent function, epressed as Definition 4. Definition 4 Assue that V, y and V, y are respectively the acceptable value doain and the coplete value doain of a service level paraeter of SDN in the real field, and v is a detected value fro onitoring this service level paraeter, then the dependent function between v and these two related doains V and V is defined as v d v, V, D v, V, V, v V D, V, V, D v, V, V, v V, v V a v d v, V 1, D v, V, V, v V (14) As is indicated in Definition 4, the dependent function is utilized to ipleent the quantitative description of the association degree for the detected value fro onitoring the specific service level paraeter of SDN with its acceptable value doain and its coplete value doain. If a v, it eans that the detected value satisfies the acceptable value doain of this service level paraeter, and if a v, it reveals that the detected value is not related to the acceptable value doain of this service level paraeter. However, when 1 a v, this unrelated situation can be iproved by eans of etension transforations based on the etension theory for the value of this service level paraeter relating to its acceptable value doain. 4. Validation In order to validate the feasibility of proposed integrated approach for prooting the foralization on onitoring service level paraeters of SDN, this section first siulates a queuing odel to onitor a specific service level paraeter that is the waiting tie, and then based on this, analyzes the corresponding scenario integrated with the etension theory. Copyright c 15 SERSC 1

6 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) 4.1. Siulation Result As for proposed queuing odel to onitor the validated service level paraeter that is waiting tie, Node no. represents as an integrated anageent controller in SDN, and Node no. 1-1 are used for the purpose of distributed anageent in SDN. If at least one of Node no. 1-1 is changed in the service rate, it ay play a great influence on onitoring the waiting tie. Here, take Node no. 8 for eaple, and the nuber of jobs is set to 6. When the service rate for Node no. 8 varies fro.1 to 1., the waiting tie for Node no. will change accordingly, as deonstrated in Figure. Figure. Waiting Tie for Node No. with the Changing Service Rate For Node No Scenario Analysis Based on the siulation result above, this part discusses validation of proposed approach integrated with the etension theory. Consider the scenario of the waiting tie for Node no. above. Assue that, the acceptable value doain and the coplete value doain of the waiting tie for Node no. are respectively V,4 andv,1, and current detected value of the waiting tie for Node no. fro onitoring SDN is v a) According to Forula (1), d v, V 6 and 1 1 d v, V 6 6. b) In this scenario v V, then according to Forula (13), v V, V d v, V d v, V 6 8 D., c) In this scenario D v, V, V, v V, hence according to Forula (14), d v, V 1 a v, which reveals that current detected value is not D v, V, V 8 4 related to the acceptable value doain of the waiting tie for Node no.. However, Copyright c 15 SERSC

7 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) 1 since 1 a v, this unrelated situation can be iproved by eans of 4 etension transforations based on the etension theory for the value of the waiting tie for Node no. relating to its acceptable value doain. 5. Conclusions The ain contribution of this paper is to study issues related to service anageent for SDN fro the viewpoint of onitoring service level paraeters, and to propose an integrated approach based on both the queuing theory and the etension theory, so as to proote the foralization on onitoring service level paraeters of SDN. Siulation result and scenario analysis validate the feasibility of proposed integrated approach for foralizing the solution to onitor service level paraeters of SDN. Acknowledgents This work has been supported by the Eergency Manageent Progra for National Natural Science Foundation of China (No ), the Provincial Teaching Refor Research Project of Education Departent of Hubei Province in China (No. 173), the Doctoral Scientific Research Fund fro Hubei University of Technology (No. BSQD19), the National Natural Science Foundation of China for Young Scholars (No. 6187, No ) and the General Progra for National Natural Science Foundation of China (No ). The authors would like to thank all project partners for their valuable contributions and feedbacks. References [1] S. Kuklinski and P. Cheouil, Network Manageent Challenges in Software-Defined Networks, IEICE Transactions on Counications, vol. E97-B, no. 1, (14), pp. -9. [] G. Huston, Interconnection, Peering, and Settleents-Part I The Internet Protocol Journal, vol., no. 1, (1999), pp [3] Open Networking Foundation, OpenFlow Manageent and Configuration Protocol 1. (OF-CONFIG 1.), Available: (15). [4] R. Enns, M. Bjorklund, J. Schoenwaelder and A. Bieran, eds, Network Configuration Protocol (NETCONF), RFC641, (11). [5] M. Bjorklund ed, YANG-A Data Modeling Language for the Network Configuration Protocol (NETCONF), RFC6, (1). [6] M. Bjorklund and A. Yang, Data Model for Interface Manageent, RFC73, (14). [7] D. Gross, J.F. Shortle, J.M. Thopson and C.M. Harris, Fundaental of Queuing Theory (Fourth Edition), Wiley Press, (8). [8] C. Y. Yang and W. Cai, Recent Research Progress in Dependent Functions in Etension Sets, Journal of Guangdong University of Technology, vol. 9, no., (1), pp Authors Hui Xu, she received a bachelor's degree in Coputer Science and Technology fro Huazhong Noral University, Wuhan, China in 5, a aster's degree in Coputer Application Technology fro Huazhong Noral University, Wuhan, China in 8, and a doctor's degree in Radio Physics fro Huazhong Noral University, Wuhan, China in 1. Since 6, she has been a certified coputer syste analyst in China. Now, she is an Associate Professor at the School of Coputer Science in Hubei University of Technology, Wuhan, China. Copyright c 15 SERSC 3

8 International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15) Currently, her ajor field of study is network and service anageent. Dr. Xu becae a Meber of Institute of Electrical and Electronics Engineers (IEEE) in 7, a Meber of Association for Coputing Machinery (ACM) in 7 and a Meber of China Coputer Federation (CCF) in 8. She has authored or coauthored 1 book and book chapters in the field of network anageent, about 1 papers published by Chinese journals, ore than 1 papers published by international journals, and ore than papers published by international conferences. In April 8, she was awarded by International Association of Engineers (IAENG) for her firstauthored paper presented to 8 IAENG International Conference on Counication Systes and Applications. Additionally, she was a Session Co-Chair or a Paper Reviewer for nd&3rd&7th&8th International Conference on Coputer Science and Education (ICCSE 7&8&1&13), a Session Chair for 1st International Syposiu on Electronic Coerce and Security (ISECS 8), a Paper Reviewer for 4th IEEE Conference on Industrial Electronics and Applications (ICIEA 9), a Paper Reviewer for 3rd International Conference on Coputer and Network Technology (ICCNT 11), a Paper Reviewer for 3nd Chinese Control Conference (CCC 13), and a Paper Reviewer for Security and Counication Networks, an international journal published by Wiley Press. Hongwei Chen, he is a Professor at the School of Coputer Science in Hubei University of Technology, Wuhan, China. Currently, his ajor field of study is distributed anageent. 4 Copyright c 15 SERSC

Learning Concept Hierarchy from YANG for Management of Software-Defined Networking based on Theory of Concept Lattices

Learning Concept Hierarchy from YANG for Management of Software-Defined Networking based on Theory of Concept Lattices , pp.223-232 http://dx.doi.org/0.4257/ijgdc.205.8.5.22 Learning Concept Hierarchy from YANG for Management of Software-Defined Networking based on Theory of Concept Lattices Hui Xu, Chunzhi Wang and Hongwei

More information

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services

NETCONF-based Integrated Management for Internet of Things using RESTful Web Services NETCONF-based Integrated Management for Internet of Things using RESTful Web Services Hui Xu, Chunzhi Wang, Wei Liu and Hongwei Chen School of Computer Science, Hubei University of Technology, Wuhan, China

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus

Mathematical Model for Glucose-Insulin Regulatory System of Diabetes Mellitus Advances in Applied Matheatical Biosciences. ISSN 8-998 Volue, Nuber (0), pp. 9- International Research Publication House http://www.irphouse.co Matheatical Model for Glucose-Insulin Regulatory Syste of

More information

A Hybrid Grey-Game-MCDM Method for ERP Selecting Based on BSC. M. H. Kamfiroozi, 2 A. BonyadiNaeini

A Hybrid Grey-Game-MCDM Method for ERP Selecting Based on BSC. M. H. Kamfiroozi, 2 A. BonyadiNaeini Int. J. Manag. Bus. Res., 3 (1), 13-20, Winter 2013 IAU A Hybrid Grey-Gae-MCDM Method for ERP Selecting Based on BSC 1 M. H. Kafiroozi, 2 A. BonyadiNaeini 1,2 Departent of Industrial Engineering, Iran

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Towards P2P-based Computer Network Management *

Towards P2P-based Computer Network Management * Towards P2P-based Computer Network Management * Hui Xu, and Debao Xiao Department of Computer Science, Huazhong Normal University Wuhan, P.R. China, 430079 xuhui_1004@hotmail.com Abstract Nowadays, the

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks

Sensors as a Service Oriented Architecture: Middleware for Sensor Networks Sensors as a Service Oriented Architecture: Middleware for Sensor Networks John Ibbotson, Christopher Gibson, Joel Wright, Peter Waggett, IBM U.K Ltd, Petros Zerfos, IBM Research, Boleslaw K. Szyanski,

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers

LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning programme for frontline healthcare managers Course Code: L024 LEAN FOR FRONTLINE MANAGERS IN HEALTHCARE An action learning prograe for frontline healthcare anagers 6 days Green Belt equivalent Are you ready to challenge the status quo and transfor

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Gaussian Processes for Regression: A Quick Introduction

Gaussian Processes for Regression: A Quick Introduction Gaussian Processes for Regression A Quick Introduction M Ebden, August 28 Coents to arkebden@engoacuk MOTIVATION Figure illustrates a typical eaple of a prediction proble given soe noisy observations of

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Research on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number

Research on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number Researc on Risk Assessent of PFI Projects Based on Grid-fuzzy Borda Nuber LI Hailing 1, SHI Bensan 2 1. Scool of Arcitecture and Civil Engineering, Xiua University, Cina, 610039 2. Scool of Econoics and

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Roland Berger Strategy Consultants. content. Fresh thinking for decision makers

Roland Berger Strategy Consultants. content. Fresh thinking for decision makers Roland Berger Strategy Consultants content Fresh thinking for decision akers Opportunities for obile telephone operators in rural areas Custoers in the countryside are different They need unique offerings

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE

IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE IT SOURCING PORTFOLIO MANAGEMENT FOR IT SERVICES PROVIDERS - A RISK/COST PERSPECTIVE Copleted Research Paper Steffen Zierann Arne Katzarzik Dennis Kundisch Abstract Utilizing a global IT sourcing strategy

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

A short-term, pattern-based model for water-demand forecasting

A short-term, pattern-based model for water-demand forecasting 39 Q IWA Publishing 2007 Journal of Hydroinforatics 09.1 2007 A short-ter, pattern-based odel for water-deand forecasting Stefano Alvisi, Marco Franchini and Alberto Marinelli ABSTRACT The short-ter, deand-forecasting

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

AUC Optimization vs. Error Rate Minimization

AUC Optimization vs. Error Rate Minimization AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC

More information

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web

Entity Search Engine: Towards Agile Best-Effort Information Integration over the Web Entity Search Engine: Towards Agile Best-Effort Inforation Integration over the Web Tao Cheng, Kevin Chen-Chuan Chang University of Illinois at Urbana-Chapaign {tcheng3, kcchang}@cs.uiuc.edu. INTRODUCTION

More information

IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT PROCESS.

IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT PROCESS. Ipleenting Virtual Design and Construction (VDC) in Veidekke Using Siple Metrics to Iprove IMPLEMENTING VIRTUAL DESIGN AND CONSTRUCTION (VDC) IN VEIDEKKE USING SIMPLE METRICS TO IMPROVE THE DESIGN MANAGEMENT

More information

Workflow Management in Cloud Computing

Workflow Management in Cloud Computing Workflow Manageent in Cloud Coputing Monika Bharti M.E. student Coputer Science and Engineering Departent Thapar University, Patiala Anju Bala Assistant Professor Coputer Science and Engineering Departent

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Enrolment into Higher Education and Changes in Repayment Obligations of Student Aid Microeconometric Evidence for Germany

Enrolment into Higher Education and Changes in Repayment Obligations of Student Aid Microeconometric Evidence for Germany Enrolent into Higher Education and Changes in Repayent Obligations of Student Aid Microeconoetric Evidence for Gerany Hans J. Baugartner *) Viktor Steiner **) *) DIW Berlin **) Free University of Berlin,

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

A Soft Real-time Scheduling Server on the Windows NT

A Soft Real-time Scheduling Server on the Windows NT A Soft Real-tie Scheduling Server on the Windows NT Chih-han Lin, Hao-hua Chu, Klara Nahrstedt Departent of Coputer Science University of Illinois at Urbana Chapaign clin2, h-chu3, klara@cs.uiuc.edu Abstract

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

New for 2016! Get Licensed

New for 2016! Get Licensed Financial Manageent 2016 HS There s only one place you need to go for all your professional developent needs. The Power to Know. NEW Experience a different school of learning! New for 2016! Online courses

More information

An improved TF-IDF approach for text classification *

An improved TF-IDF approach for text classification * Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification

More information

A SOA-Based Architecture Framework

A SOA-Based Architecture Framework A SOA-Based Architecture Fraework Wil M. P. van der Aalst, Michael Beisiegel 2, Kees M. van Hee, Dieter König 3, and Christian Stahl Departent of Matheatics and Coputer Science Eindhoven University of

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

The Model of Lines for Option Pricing with Jumps

The Model of Lines for Option Pricing with Jumps The Model of Lines for Option Pricing with Jups Claudio Albanese, Sebastian Jaiungal and Ditri H Rubisov January 17, 21 Departent of Matheatics, University of Toronto Abstract This article reviews a pricing

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

Pricing Asian Options using Monte Carlo Methods

Pricing Asian Options using Monte Carlo Methods U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University

More information

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism

The Benefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelism The enefit of SMT in the Multi-Core Era: Flexibility towards Degrees of Thread-Level Parallelis Stijn Eyeran Lieven Eeckhout Ghent University, elgiu Stijn.Eyeran@elis.UGent.be, Lieven.Eeckhout@elis.UGent.be

More information

Botnets Detection Based on IRC-Community

Botnets Detection Based on IRC-Community Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, ghorbani}@unb.ca

More information

Monte Carlo Analysis of Real-Time Electricity Pricing for Industrial Loads By Dr. Carl J. Spezia

Monte Carlo Analysis of Real-Time Electricity Pricing for Industrial Loads By Dr. Carl J. Spezia Volue 25, uber 3 - July 29 through Septeber 29 Monte Carlo Analysis of Real-Tie Electricity Pricing for Inustrial oas By Dr. Carl J. Spezia Peer-Referee Applie Papers Keywor Search Electricity Energy Research

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information