Research on Privacy Protection Approach for Cloud Computing Environments
|
|
- Cathleen Thomas
- 8 years ago
- Views:
Transcription
1 , pp Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton Engneer, Laonng Unversty of Technology Jnzhou, Laonng, , Chna 2 Computer Scence and Technology, Bejng Unversty of Technology, Bejng , Chna 3 Jnzhou Force, Jnzhou, Laonng , Chna lxaohu@emals.bjut.edu.cn,lhxlxh@163.com Abstract Cloud computng s a convenent and cost effcent way that refers to the runnng of software over a network, as on a local computer. But, what s cheap and easy, sn t always safe. Storng mportant data on cloud means that you gve up a certan control of prvacy. Prvacy protecton s a very mportant ssue n cloud computng. In ths paper,we focus on the need of cloud users managed servces and propose an approach for data protecton based trust mechansm, whch usng adaptve mappng resources based on trust to ensure the user data protecton ntatve, and data securty. The analyss shows that the cloud user can ndependently controls the content and manner of servces by usng the approach, whch can acheve the free deployment of resources and the balance of user data protecton and servce provded. Keywords: Cloud computng, prvacy, securty, trust 1. Introducton Cloud computng can be well postoned to meet the needs of the users anytme, anywhere access to resources and transacton processng, n ths computng archtecture, and ts essence s to make the data more and more exposed to the hazardous envronment. Storng mportant programs and fles on the cloud means that you gve up a certan level of control and your prvacy. Platform can be updated, perhaps you would be forced to fgure them out all over agan, or worse, cooperaton between the cloud platform would mean unlawful access by the former. The user n cloud computng requrements at any tme, any place can be carred out safely data access, Cloud has brought us unprecedented servce experence at the same tme, as the shadow of the user data securty ssues. The soluton to get the balance of user prvacy protecton and servces n cloud computng s the key to promote ts applcaton. Trust as an mportant mean of securty technology, whch takes on an ntegral role from the begnnng to the transmsson of the moble user nformaton nteracton. Authorzaton, access control and other securty mechansms are often accompaned by the provson of user prvacy nformaton n the cloud computng envronments, users do not know ther own nteractve objects utmost promnence of securty concerns. How to buld trust between the user and the servce provder, and to reconcle the balance between user prvacy and servce access? Approachs based on trust n prvacy protecton servce-orented technology wll characterze user prvacy trust granularty, and accordng to ts varablty and dynamc establsh mappng relato n- ISSN: IJSIA Copyrght c 2015 SERSC
2 shp; based access control approach accordng to the securty polcy set to control access to prvacy nformaton, dynamc adjustment and settng of user prvacy nformaton and access granularty. The above studes focus consderng the securty threats posed by the malcous acts by the servce requestng party and do not consder the securty threats posed by the servce provder. Trust between enttes n the cloud computng envronment assumptons no longer exst, from the pont of vew of the protecton of user prvacy, the above approaches are not applcable. In ths artcle, we focus on user data protecton ssues n cloud computng, propose a trust-based approach to data protecton, whle dynamcally generate trust relatonshp to release ts own data to acheve balance of prvacy protecton and servces provded. The rest of ths paper s organzed as follows. In Secton 2, we descrbe some related work. In Secton 3, we explan our approach for prvacy protecton n two aspects: one s to relevant defntons and the other s algorthm descrpton. We also gve an applcaton scenaro for better llustraton of our approach. Fnally, we conclude ths paper n Secton RELATED WORK In the commodty market model, resource owners specfy ther servce prce and charge users accordng to the amount of resource they consume. Servces are prced n such a way that supply-and-demand equlbrum s mantaned. Whch has two actors: The resource broker (workng for the user) s denoted by B, Whch can carry out the followng steps for executng applcatons: 1. the broker dentfes servce provders; 2. t dentfes sutable resources and establshes ther prces; 3. t selects resources that meet ts utlty functon and objectves; 4. t uses resource servces for job processng and ssues payments as agreed; In the model, resource consumer only can depend on the specfed prce of resource provder as a parameter, barganng s not permtted. Nash Equlbrum Theory does not requre the asumpton of ndvdual ratonalty and noncooperaton wth the three elements: partcpants collecton O, strategy space R and the utlty functon T, ts process n chronologcal order provdes as follows: 1 In accordance wth the probablty dstrbuton o( t ) for the sender S type, whch was establshed for each and select t from the type of a vable space; 2 Clent observed t,select a transmsson 3 Server observe the m j m ; j, and select an acton a from the feasble acton set; k 4 The revenue of the two sdes, respectvely, xcvv and q ( s, l, y ). r j k Wheren the requrements of the B for each of the m j gven posteror nference wth probablty dstrbuton p(t /m j ), the recpent's a k to maxmze revenue, empathy for the transmsson sgnal S, for a gven polcy, ts value s the optmal. 3. Data Protecton Model based on Trust 3.1 Approach Descrpton In the cloud computng envronment, servce provders and cloud user nformaton closely related to ther prvate nformaton, the user accordng to the degree of trust n the servce, and hope to get the safe use, therefore access to nformaton competton between servce provders. Assume that prvate nformaton of the servce provded by the user to provde the correspond- 114 Copyrght c 2015 SERSC
3 ng servce, but the user can not drectly determne the true qualty of the servce and to ntally approxmate nference can only be made n accordance wth the commtment of the servce provder. In other words, from the pont of vew of the protecton of user securty consderatons, users enjoy nformaton superorty recpent R, and servce provders n the asymmetrc nformaton dsadvantage, as the sender S. There s certan mappng between prvacy nformaton release and servce obtaned the release, whch s to be addressed n ths artcle. Cloud users based on attrbutes of ther own resources or statstcal nformaton on the hstory of servce selecton behavor, develop approprate tme factors and spatal factors to quantfy prvacy degree rules table. Cloud users based resource propertes wll be dvded nto n prvacy perods, for each prvacy nterzone develop approprate Servce demand nterval, the mplcaton s that cloud users at tme of servce, f, then randomly generates the tme factor to quantfy the value of trust. For each tme perod, the tme perod when the hstory of a certan number of servce provders, the statstcs of the tme perod and the total number of tmes to provde a number of fraud, the probablty of obtanng fraudulent perod. Accordng to prvacy degree to provde servces, mappng relatonshp as shown n Table 1: Prvacy degree Servce demand nterval Servce fraud probablty Table 1. Prvacy and Servce Mappng Table t, ) t, ) t, )..., t ] [ t 0 1 [ T 0 1 [ t 1 2 [ t 2 3 [ t n 1 n T, ) T, ) T, )..., T ] [ T 1 2 [ T 2 3 [ T n 1 n p p p 0... p 1 2 n 1 Collecton of the program partcpants {servce provder, the user}, servce provders to provde servces, qualty of servce s hgh (G) and (D) two types, and the selected sgnal s the trust X ranges from 0 to 1 {x: 0 x 1}, ther specfc trust value s based on the drect trust (X z ) and feedback trust (X f ), X = W 1 X z + W 2 X f, where W 1 andw 2 sad X z and X f of the rght weght; users decde ther own prvacy nformaton the release of granularty Y- C(δ,x) sad servces provded type, C (δ, x) table type for δ the servces provded by the trust for the cost of the case, ts value depends on the correspondence relatonshp of confdence and the servce type; H (δ, x) ndcates the type of servce provded by the user are provded servce gans; servce provder's revenue as Y-C (δ, x), the gans of the servce users for H (δ, x) Y. Sgnal theory-based research n cloud computng adverse selecton between servce users and provders, wth ncomplete nformaton based on the expected return of the moble user prvacy (n favor of the securty of the servce provder) servce provders to take the ntatve to abandon malcous decepton motvaton; moble user can get the qualty of servce expectatons and trust-based release prvacy nformaton, enablng moble user's prvacy protecton. 3.2 Program Structure Interactve servce provders and moble users' prvacy nformaton release decsons, accordng to the a pror probablty dstrbuton for the sgnal sender S type can be selected from the lne-type space, whch type of collecton T = {t d, t g } ndcates that the servce qualty low and hgh; then S from the sgnal set M = {m d,.., m g } select a transmt sgnal, whch sgnal set m d, m g respectvely, apply for a low level of prvacy nformaton and the applcaton of a hgh level of Copyrght c 2015 SERSC 115
4 prvacy nformaton; moble user observatons feasble acton set prvacy nformaton and refused to provde prvacy nformaton; choose a behavor and calculate the two sdes revenue. In ths scheme, the cloud user based on the servces provded by the trust to determne the release of prvacy nformaton granularty, from the ntroducton of sgnal theory, the servce provders to maxmze ther own nterests, needs to take the ntatve to provde honest servces model servce revenue management, servce delvery, trust evaluaton, trust, decson-makng, prvacy and nformaton provded module, specfc structure shown n Fgure 1. Implementaton processes of the program are as follows: (1) the user U accordng to the probablty dstrbuton sgnal selecton and make the approprate servces accordng to ther own abltes t; (2) the servce provder S observed t from the correspondng set P, G l, sg G R, R, upd sk select send a m and gven ntal trust; (3) the recpent R observed m correspondng servce provdes assessment, ncludng trust update M,, l evaluaton, trust, decson-makng and feasble acton set, to select the approprate acton trust, sends t to the CSP; (4) Enforcement acton space A servce revenue for ratonal decson-makng cloud users, untl both maxmze the return on the end of the game process. The probablty of assumng n cloud servces to provde the level of qualty receves the request; replaces the block and outputs F ; replaces wth ; (5) responds the user wth an evdence for ths operaton, where n wth s for the verfcaton of n.the dp, sad users of the server to provde a hgh level of prvacy, g p expressed low levels of prvacy nformaton; g provde hgh-qualty servce users gan d sad to provde low-qualty servce user gans; p (g/g p ), p (d/g p ) denote the condtonal probablty of servces for hgh prvacy level of qualty of servce, users select the release of the prvacy of revenue. 3.3 Algorthm Descrpton Depends on the servce to apply for a balance between the cloud user prvacy protecton and access to prvacy, the level of qualty of servce, the relatonshp between both sdes revenue. Bayesan equlbrum pont s that the partes to smply observe the behavor of others to modfy ther subjectve probablty of the latter characterstcs, and thus choose ther own actons, thus provng that cloud servce provders correspondng combnaton and decson-makng consttutes a perfect Bayesan equlbrum, the analyss process s as follows: Frst analyss of the moble user's decson-makng, the ntal trust servce provders take the ntatve to provde moble users sgnal prvate nformaton to provde the moble user receves the sgnal selected acton, specfc actons, ncludng servce qualty evaluaton and correcton pror probablty. If the servce provder applcaton to the hgh-level prvacy nformaton, the moble user to select the expected revenue ssued E p = p (H/Y) I (H, Y) + (1-P (H/ Y)) Z (E, Y), E p = ( g -p g )> 0; Smlarly, f the servce to apply for low prvacy quantty, the cloud user to select payment expected revenue for E p = ( d -p d )> 0;. 116 Copyrght c 2015 SERSC
5 Fgure 1. The Amount of Informaton Released wth Optmal Trust Fgure 2. Servce Permsson Change And analyss of the decsons of the servce provder, the servce provder revenue maxmzaton condtons for max [H (δ, x)-c (δ, x)], the hgh qualty of servce to apply the proceeds of the hgh level of prvacy p g p d ; low servce qualty to provde the requested hgh-level prvacy gans, Z (F)-D (F x (E))> Z(H)-D (F-, x (H)), that ths decson s not sutable for only the applcaton of the low-level prvacy nformaton n order to acheve optmal. Suppose two partcpants n the ncomplete nformaton case the optmal trust shown n Fgure 1, where the horzontal axs represents the degree of the sender R's trust, the vertcal axs represents the release of the prvacy of the recpent S partcle sze, can be seen partcpatng under balanced Strategc correcton pror probablty, and accordng to a gven probablty dstrbuton on the set of nformaton and others nvolved n the follow-up strategy to mantan optmal acton, follow the above strategy Bayes rule to meet the needs of path nformaton on the balanced and ratonal sequence satsfy the refned Tony Yates balancng requrements. Wegh trust and securty, servce provders and get the two sdes wll acheve perfect Bayesan equlbrum, that the servces of a hgh qualty of servce wll requre hgh prvacy, low qualty level of servce wll conscously apply for a low level of prvacy, and moble prvacy, users must release servce applcaton level of servce to apply the amount of prvacy can completely reflect the true qualty of servce. 4. Concluson Copyrght c 2015 SERSC 117
6 In ths paper, we proposed a user data protecton approach n cloud computng envronment n whch we defne trust metrcs as a dynamc and flexble process that offers a new perspectve for decson-makng. The analyss shows that the performance of our approach s obvous and t can help acheve less prvacy loss and more benefts. That the hgh fraud costs make the servces and prvacy provded both sdes to get the maxmum beneft, ths approach can effectvely protect users' prvacy and contanment malcous servce sde, from another pont of vew, t s also benefcal to the securty of the servce sde. The approach proposed n ths paper exposes us to a number of possble research drectons n the future. One drecton that we wll mplement the approach to study the performance ssues. We wll take s to refne our approach to support mult-servces and to help us further optmze the approach. Acknowledgments The work n ths paper has been supported by Natonal Natural Scence Foundaton of Chna (Grant No ). Bejng Natural Scence Foundaton ( ). Pre-launch of Bejng Cty Government Major Tasks and Dstrct Government Emergency Projects (Z ) References [1] M. A. Moharrum and M. Eltowessy, A Study of Statc Versus Dynamc Keyng Schemes n Sensor Networks, Proc. of the 2nd ACM Int l Workshop on Performance Evaluaton of Wreless Ad Hoc, Sensor, and Ubqutous Networks. New York, USA: ACM Press, (2005), pp [2] L. Sweeney, Achevng k-anonymty Prvacy Protecton Usng Generalzato n and Suppresso n, Internatonal Journal of Uncer tanty, Fuzzness and Knowledge Based Systems, vol. 10, no. 5, (2002), pp [3] L. Ibram, M. Petkovc, S. Nkova, P. Hartel and W. Jonker, Cphertext-Polcy attrbute-based threshold decrypton wth flexble delegaton and revocaton of user attrbutes, Techncal Report, Centre for Telematcs and Informaton Technology, Unversty of Twente, (2009). [4] D. Nurm, R. Wolsk and C. Grzegorczyk, Eucalyptus: A Techncal Report on an Elastc Utlty Computng Archetcture Lnkng Your Programs to Useful Systems Tech., Rep , Unversty of Calforna, Santa Barbara, (2008) October. [5] C. Castelfranch, R. Falcone and G. Pezzulo, Integratng trustfulness and decson usng fuzzy cogntve maps, Trust Management, LNCS, vol. 2692, (2003), pp [6] D. D. Salber and G. Abowd, A Conceptual Framework and a Toolkt for Supportng the Rapd Prototypng of Context-Aware Applcatons, Specal ssue on Context-Aware Computng n the Human-Computer Interacton (HCI) Journal, vol. 16, no. 2-4, (2001), pp [7] B. J. Jansen, A. Spnk and T. Saracevc, Real Lfe, Real Users, and Real Needs: A Study and Analyss of User Queres on the Web, Informaton Processng and Management, vol. 36, no. 2, (2000), pp [8] A. N. Ramjattan and P. A. Gross, A Kalman flter model for an ntegrated land vehcle navgaton system, The Journal of Navgaton, vol. 48, no. 2, (1995), pp [9] R. Gbbons, An Introducton To Applcable Game Theory, Journal of Economc Perspectves, vol. 11, no. 1, (1997), pp [10] M. Blaze, J. Fegenbaum and J. Lacy, Decentralzed Trust Management, Proceedngs of the 17th Symposum on Securty and Prvacy, (1996), pp [11] P. B. Ardagnad, "Adaptve servce composton n flexble processes", IEEE Transactons on Software Engneerng, vol. 33, no. 6, (2007), pp [12] M. Spence, Job Market Sgnalng, The Quarterly Journal of Economcs, vol. 87, no. 3, (1973), pp Author 118 Copyrght c 2015 SERSC
7 Xaohu L s currently a lecturer of the college of Electrcal and Informaton Engneer at Laonng Unversty of Technology and a Ph.D. canddate n the College of Computer Scence and Technology at Bejng Unversty of Technology. Her research nterests nclude network securty and trust management. Emal: lxaohu@emals.bjut.edu.cn Copyrght c 2015 SERSC 119
8 120 Copyrght c 2015 SERSC
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationMultiple-Period Attribution: Residuals and Compounding
Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationA New Service Pricing Mechanism based on Coalition Game Theory in
A New Servce Prcng Mechansm based on Coalton Game Theory n Cloud Servce A New Servce Prcng Mechansm based on Coalton Game Theory n Cloud Servce 1 Luyun Xu, 2 Yunsheng Zhang *1, Frst Author, Correspondng
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationComplex Service Provisioning in Collaborative Cloud Markets
Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationA GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS
A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationA DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationOptimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
More informationLIFETIME INCOME OPTIONS
LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationTowards a Global Online Reputation
Hu L Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN 6N5 Canada + (63) 562 5800, 8834 Hl03@uottawa.ca Towards a Global Onlne Reputaton Morad Benyoucef Unversty of Ottawa 55 Laurer Ave E Ottawa, ON KN
More informationModeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making
Int. J. on Recent Trends n Engneerng and Technology, Vol. 11, No. 1, July 2014 Modelng and Smulaton of Mult-Agent System of Chna's Real Estate Market Based on Bayesan Network Decson-Makng Yang Shen, Shan
More informationA Novel Auction Mechanism for Selling Time-Sensitive E-Services
A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,
More information1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More informationCross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing
Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationBUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr
Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationThe Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationOptimization of Resource Allocation in Wireless Systems Based on Game Theory
Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationOpen Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,
More informationPricing Model of Cloud Computing Service with Partial Multihoming
Prcng Model of Cloud Computng Servce wth Partal Multhomng Zhang Ru 1 Tang Bng-yong 1 1.Glorous Sun School of Busness and Managment Donghua Unversty Shangha 251 Chna E-mal:ru528369@mal.dhu.edu.cn Abstract
More informationiavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationA DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS
Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationOverview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More informationAD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT
1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationSet. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index
ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan
More informationCooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
More informationLoad Balancing Algorithm of Switched Dynamic Iteration
Send Orders for Reprnts to reprnts@benthamscence.ae 236 The Open Cybernetcs Systemcs Journal, 2015, 9, 236-242 Load Balancng Algorthm of Swtched Dynamc Iteraton Open Access Chen Yansheng 1,3,* Wu Zhongkun
More informationIn some supply chains, materials are ordered periodically according to local information. This paper investigates
MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationA New Task Scheduling Algorithm Based on Improved Genetic Algorithm
A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationAutomated information technology for ionosphere monitoring of low-orbit navigation satellite signals
Automated nformaton technology for onosphere montorng of low-orbt navgaton satellte sgnals Alexander Romanov, Sergey Trusov and Alexey Romanov Federal State Untary Enterprse Russan Insttute of Space Devce
More informationDistributed Multi-Target Tracking In A Self-Configuring Camera Network
Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationA DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
More informationTRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
DOI: 10.2298/CSIS110303056C TRM-IoT: A Trust Management Model Based on Fuzzy Reputaton for Internet of Thngs Dong Chen 1, Guran Chang 2, Dawe Sun 1, Jaa L 1, Je Ja 1, and Xngwe Wang 1 1 College of Informaton
More informationSurvey on Virtual Machine Placement Techniques in Cloud Computing Environment
Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center
More informationNumber of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationA Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationEvaluation of Coordination Strategies for Heterogeneous Sensor Networks Aiming at Surveillance Applications
Evaluaton of Coordnaton Strateges for Heterogeneous Sensor Networs Amng at Survellance Applcatons Edson Pgnaton de Fretas, *, Tales Hemfarth*, Carlos Eduardo Perera*, Armando Morado Ferrera, Flávo Rech
More informationResource Scheduling Based on Dynamic Dependence Injection in Virtualization-based Simulation Grid
Proceedngs of the 200 4th Internatonal Conference on Computer Supported Cooperatve Work n Desgn Resource Schedulng Based on Dynamc Dependence Injecton n Vrtualzaton-based Smulaton Grd Hanbng Lu,Hongy Su,
More informationAd-Hoc Games and Packet Forwardng Networks
On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationAn Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
More informationA Self-Organized, Fault-Tolerant and Scalable Replication Scheme for Cloud Storage
A Self-Organzed, Fault-Tolerant and Scalable Replcaton Scheme for Cloud Storage Ncolas Bonvn, Thanass G. Papaoannou and Karl Aberer School of Computer and Communcaton Scences École Polytechnque Fédérale
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationQoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
More informationMaster s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks
Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014
More information