Stackelberg Security Games for Security. Fernando Ordóñez Universidad de Chile
|
|
|
- Julian Richardson
- 10 years ago
- Views:
Transcription
1 Stackelberg Security Games for Security Fernando Ordóñez Universidad de Chile
2 Stackelberg Games for Security Fernando Ordóñez Universidad de Chile
3 Stackelberg Games for Security Fernando Ordóñez Milind Tambe, P. Paruchuri, C. Kiekintveld, B. An, J. Pita, M. Jain, J. Tsai, R. Yang, A. Jiang, M. Brown, E. Shieh and others
4 Stackelberg Security Game 4
5 Stackelberg Security Game 5
6 Stackelberg Security Game Monday Tuesday 6
7 Stackelberg Security Game Wednesday 7
8 Outline Stackelberg Games Deployed Applications Challenges in Stackelberg Security Games Problem Size Uncertainty/rationality Model Inputs (data, game definition) Ongoing work
9 Game Theory: Stackelberg Game Stackelberg: defender goes first, attacker second Non zero sum utilities A mixed strategy is optimal for the leader Adversary Police Target #1 Target #2 Patrol #1 7, -4-2, 3 Patrol #2-7, 7 4, -3
10 Game Theory: Stackelberg Game
11 Deployed Security Game Applications ARMOR: LAX (27) IRIS: FAMS (29) GUARDS: TSA (21) PROTECT: USCG (211)
12 Optimization Model (Rational Adversary) max x,a s.t d U ik ik ( x, q) x Total_Resources (1) x= A a A ( 2) i i T Constraint on x to enforce a feasible marginal coverage on targets j A a j j k j 1 a j 1, j (3) feasible assignment A j qk 1 qk,1 q arg max q ik U ika ( x, q ) ( 4) (5) ( 6) (7 )
13 USCG Patrols Port of Boston (Not actual areas)
14 Challenges in SSG Problem Size Uncertainty/rationality Model Inputs (data, game definition) Evaluation
15 Federal Air Marshals (FAMS) Strategy 1 Strategy 2 Strategy 3 Strategy 1 Strategy 2 Strategy 3 Strategy 4 Strategy 5 Strategy 6 Strategy 1 Strategy 1 Strategy 2 Strategy 3 Strategy 4 Strategy 5 Strategy 6 Strategy 2 Strategy 3
16 Multiple Defense Resources Pure strategies are joint schedules: Each air marshal assigned to a tour 4 Flights 2 Air Marshals 6 Schedules 1 Flights 1 Air Marshals 17,,,, Schedules
17 Speedup: Compact Representation ARMOR: 1 tours, 3 defenders ARMOR Actions Tour combos Prob ,2,3 1,2,4 1,2,5 8,9,1 x1 x2 x3 x12 Compact Action Tour Prob y1 y2 y3 y1 Payoff duplicates: Depends on target covered 1,2,3 1,2,4 1,3,5 Attack 1 Attack 2 Attack Attack 6 5,-1 5,-1 5,-1-2,9-2,9-2,9 4,-8 4,-8 4,-8 MILP similar to ARMOR 1 instead of 12 variables y1+y2+y3 +y1 = 3
18 Algorithm Development Tight formulations Decomposition Methods Column generation Constraint generation Heuristic Methods
19 Uncertainty/Rationality
20 Uncertainty/Rationality
21 Optimization Model (Partially Rational Adversary) Fractional and Non-Convex F ( x ) i max x,a s.t e U ia ( x ) k e d U i ( x) U a ( x ) k x Total_Resources (1) x= A a A ( 2) i T i j A a j j j j 1 a j 1, (3) feasible assignment A j ( 4)
22 Playing against Human Adversaries
23 Experimental Results PT = Prospect theory QRE = Quantal Response Equilibrium
24 Model Inputs
25 Steps to build SSG Gather representative data Define targets to protect Define time periods to protect Types of Attackers Defender and Attacker utilities
26 1: Relevant Data 2 year crime event data Horizon: annual averages of crime No daily variation No seasons Baseline patrol strategy
27 2: Targets Clustering, nodes with > 1 events in 2 meters
28 3/4: Periods/Attacker types 8 attacker types (clustering crime data) 7 Periods (cross police shifts with crime types) Prob. de un tipo de atacante en un periodo Cluster Total S1 S2 S3 S4 S5 S6 S7,234,78,32,253,23,381,516,57,18,91,27,291,624,48,18,63,22,225,142,47,26,79,48,63,49,12,66,33,238,562,79,27,93,16,223,395,97,5,15,24, Total
29 5: Utilities Crime events have a value information Cluster Promedio de Utilidad Días Reclusión Cluster Avalúo ($) $ $ $ $ $ $ $ $ $ Tasa Descuento Costo ($) % 4% 4% 4% 4% 4% 4% 4% % 38219
30 Results A frequency with which each node should be protected to maximize utilities
31 Evaluation Computer Anectdote Tests on field
32 Robustness Results: Observation Noise -,2 -,4 -,6 PASAQ(λ=1.5) -,8 DOBSS(λ= ) -1 PASAQ(noise high) -1,2 DOBSS(noise high) -1,4-1,6,5 1 1,5 2 2,5 3 3,5 4 4,5 5 5,5 6 Defender's Expected Utility Attacker λ value
33 Patrol Schedules before/after PROTECT From the Port of Boston Count Pre-PROTECT 1 5 Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day Count Post-PROTECT Base Patrol Area Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7
34 Adversarial Perspective Team (APT) Conduct pre- and post-protect assessment Effectiveness (tactical deterrence) increased from pre- to postprotect observations
35 On going work: protecting the border
36 Sampled patrols from optimal solution
37 Research Questions Efficient algorithms to solve real instances (patrolling on a network) Automatically determine payoff values Multiple types of security resources Validation
Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond
AAAI Technical Report SS-12-03 Game Theory for Security, Sustainability and Health Game Theory for Security: A Real-World Challenge Problem for Multiagent Systems and Beyond Milind Tambe, Bo An Computer
Stackelberg Security Games (SSG) Basics and Application Overview
Stackelberg Security Games (SSG) Basics and Application Overview Bo An School of Computer Engineering Nanyang Technological University Singapore, 639798 [email protected] Milind Tambe, Arunesh Sinha Computer
Analyzing the Effectiveness of Adversary Modeling in Security Games
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence Analyzing the Effectiveness of Adversary Modeling in Security Games Thanh H. Nguyen 1, Rong Yang 1, Amos Azaria 2, Sarit Kraus
Computing Game-Theoretic Solutions and Applications to Security
Computing Game-Theoretic Solutions and Applications to Security Vincent Conitzer Departments of Computer Science and Economics Duke University Durham, NC 27708, USA [email protected] Abstract The multiagent
Human Adversaries in Opportunistic Crime Security Games: How Past success (or failure) affects future behavior
Abstract There are a growing number of automated decision aids based on game-theoretic algorithms in daily use by security agencies to assist in allocating or scheduling their limited security resources.
Scaling-Up Urban Network Security Games with Graph Contraction
Scaling-Up Urban Network Security Games with Graph Contraction Hiroaki Iwashita Kotaro Ohori Hirokazu Anai Fujitsu Laboratories Ltd. Kawasaki 211-8588, Japan {iwashita.hiroak,ohori.kotaro,anai}@jp.fujitsu.com
Game Theory Meets Information Security Management
Game Theory Meets Information Security Management Andrew Fielder 1, Emmanouil Panaousis 2, Pasquale Malacaria 2, Chris Hankin 1, and Fabrizio Smeraldi 2 1 Imperial College London {andrew.fielder,c.hankin}@imperial.ac.uk
How To Develop A Security System From Game Theory
An Overview of Recent Application Trends at the AAMAS conference: Security, Sustainability and Safety Manish Jain, Bo An, Milind Tambe {manish.jain, boa, tambe}@usc.edu University of Southern California,
Demand Response of Data Centers: A Real-time Pricing Game between Utilities in Smart Grid
1 / 18 Demand Response of Data Centers: A Real-time Pricing Game between Utilities in Smart Grid Nguyen H. Tran ([email protected]) Kyung Hee University Usenix Feedback Computing 2014 2 / 18 1 Introduction
Bo An. Research Appointments. Chinese Academy of Sciences. Institute of Computing Technology
Bo An Institute of Computing Technology Phone: (010) 62601343 Chinese Academy of Sciences Fax: (010) 62601343 No.6 Kexueyuan South Road, Rm 1343 E-mail: [email protected] Haidian District Beijing, China 100190
Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints
Efficient and Robust Allocation Algorithms in Clouds under Memory Constraints Olivier Beaumont,, Paul Renaud-Goud Inria & University of Bordeaux Bordeaux, France 9th Scheduling for Large Scale Systems
Computing the Electricity Market Equilibrium: Uses of market equilibrium models
Computing the Electricity Market Equilibrium: Uses of market equilibrium models Ross Baldick Department of Electrical and Computer Engineering The University of Texas at Austin April 2007 Abstract We discuss
Individual security and network design
Individual security and network design Diego Cerdeiro Marcin Dziubiński Sanjeev Goyal FIT 2015 Motivation Networks often face external threats in form of strategic or random attacks The attacks can be
Game Theory 1. Introduction
Game Theory 1. Introduction Dmitry Potapov CERN What is Game Theory? Game theory is about interactions among agents that are self-interested I ll use agent and player synonymously Self-interested: Each
Enhancing Wireless Security with Physical Layer Network Cooperation
Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory
Equilibrium computation: Part 1
Equilibrium computation: Part 1 Nicola Gatti 1 Troels Bjerre Sorensen 2 1 Politecnico di Milano, Italy 2 Duke University, USA Nicola Gatti and Troels Bjerre Sørensen ( Politecnico di Milano, Italy, Equilibrium
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem
A Branch and Bound Algorithm for Solving the Binary Bi-level Linear Programming Problem John Karlof and Peter Hocking Mathematics and Statistics Department University of North Carolina Wilmington Wilmington,
Adversarial Risk Analysis Models for
Adversarial Risk Analysis Models for Urban Security Resource Allocation David Ríos Insua, Royal Academy Cesar Gil, U. Rey Juan Carlos Jesús Ríos, IBM Research YH COST Smart Cities Wshop Paris, September
Economics of Insurance
Economics of Insurance In this last lecture, we cover most topics of Economics of Information within a single application. Through this, you will see how the differential informational assumptions allow
LECTURE - 3 RESOURCE AND WORKFORCE SCHEDULING IN SERVICES
LECTURE - 3 RESOURCE AND WORKFORCE SCHEDULING IN SERVICES Learning objective To explain various work shift scheduling methods for service sector. 8.9 Workforce Management Workforce management deals in
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games
6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses
14.74 Lecture 12 Inside the household: Is the household an efficient unit?
14.74 Lecture 12 Inside the household: Is the household an efficient unit? Prof. Esther Duflo March 17, 2004 Last lecture, we saw that if we test the unitary model against a slightly more general model
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Special cases in Transportation Problems
Unit 1 Lecture 18 Special cases in Transportation Problems Learning Objectives: Special cases in Transportation Problems Multiple Optimum Solution Unbalanced Transportation Problem Degeneracy in the Transportation
An Adversarial Risk Analysis Approach to Fraud Detection
An Adversarial Risk Analysis Approach to Fraud Detection J. Cano 1 D. Ríos Insua 2 1 URJC 2 ICMAT-CSIC, Spain 20th IFORS. Barcelona. July 15, 2014 Outline A framework for risk analysis A framework for
Choice under Uncertainty
Choice under Uncertainty Part 1: Expected Utility Function, Attitudes towards Risk, Demand for Insurance Slide 1 Choice under Uncertainty We ll analyze the underlying assumptions of expected utility theory
A Game Theoretical Framework for Adversarial Learning
A Game Theoretical Framework for Adversarial Learning Murat Kantarcioglu University of Texas at Dallas Richardson, TX 75083, USA muratk@utdallas Chris Clifton Purdue University West Lafayette, IN 47907,
Probability Using Dice
Using Dice One Page Overview By Robert B. Brown, The Ohio State University Topics: Levels:, Statistics Grades 5 8 Problem: What are the probabilities of rolling various sums with two dice? How can you
Airline Schedule Development
Airline Schedule Development 16.75J/1.234J Airline Management Dr. Peter Belobaba February 22, 2006 Airline Schedule Development 1. Schedule Development Process Airline supply terminology Sequential approach
Classifying Large Data Sets Using SVMs with Hierarchical Clusters. Presented by :Limou Wang
Classifying Large Data Sets Using SVMs with Hierarchical Clusters Presented by :Limou Wang Overview SVM Overview Motivation Hierarchical micro-clustering algorithm Clustering-Based SVM (CB-SVM) Experimental
1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.
Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S
Integer Programming Formulation
Integer Programming Formulation 1 Integer Programming Introduction When we introduced linear programs in Chapter 1, we mentioned divisibility as one of the LP assumptions. Divisibility allowed us to consider
U.S. Army Research, Development and Engineering Command. Cyber Security CRA Overview
U.S. Army Research, Development and Engineering Command Cyber Security CRA Overview Dr. Ananthram Swami, ST Network Science 18FEB 2014 Cyber Security Collaborative Research Alliance A Collaborative Venture
Mechanisms for Fair Attribution
Mechanisms for Fair Attribution Eric Balkanski Yaron Singer Abstract We propose a new framework for optimization under fairness constraints. The problems we consider model procurement where the goal is
MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management
MassMutual Cyber Security University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management Position Title: Threat Intelligence Intern Job Location: Boston, MA Timeframe:
Humayun Bakht School of Computing and Mathematical Sciences Liverpool John Moores University Email:[email protected]
Applications of mobile ad-hoc networks my article applications of mobile ad-hoc networks at http://www.computingunplugged.com/issues/issue2004 09/00001371001.html Humayun Bakht School of Computing and
DEPARTMENT OF HOMELAND SECURITY
DEPARTMENT OF HOMELAND SECURITY Funding Highlights: Provides $43.2 billion, an increase of $309 million above the 2010 enacted level. Increases were made in core homeland security functions such as border
21. Unverifiable Investment, Hold Up, Options and Ownership
21. Unverifiable Investment, Hold Up, Options and Ownership This chapter applies the tools of games with joint decisions and negotiation equilibrium to study the hold up problem in economics. We first
Compact Representations and Approximations for Compuation in Games
Compact Representations and Approximations for Compuation in Games Kevin Swersky April 23, 2008 Abstract Compact representations have recently been developed as a way of both encoding the strategic interactions
Chapter 11 Monte Carlo Simulation
Chapter 11 Monte Carlo Simulation 11.1 Introduction The basic idea of simulation is to build an experimental device, or simulator, that will act like (simulate) the system of interest in certain important
LAW, PUBLIC SAFETY AND SECURITY
LAW, PUBLIC SAFETY AND SECURITY Cluster Description This cluster prepares students for careers in planning, managing and providing legal, public safety, protective services and homeland security. Employment
IEOR 4404 Homework #2 Intro OR: Deterministic Models February 14, 2011 Prof. Jay Sethuraman Page 1 of 5. Homework #2
IEOR 4404 Homework # Intro OR: Deterministic Models February 14, 011 Prof. Jay Sethuraman Page 1 of 5 Homework #.1 (a) What is the optimal solution of this problem? Let us consider that x 1, x and x 3
Electric Company Portfolio Optimization Under Interval Stochastic Dominance Constraints
4th International Symposium on Imprecise Probabilities and Their Applications, Pittsburgh, Pennsylvania, 2005 Electric Company Portfolio Optimization Under Interval Stochastic Dominance Constraints D.
A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM:
A MODEL TO SOLVE EN ROUTE AIR TRAFFIC FLOW MANAGEMENT PROBLEM: A TEMPORAL AND SPATIAL CASE V. Tosic, O. Babic, M. Cangalovic and Dj. Hohlacov Faculty of Transport and Traffic Engineering, University of
Part 2: Community Detection
Chapter 8: Graph Data Part 2: Community Detection Based on Leskovec, Rajaraman, Ullman 2014: Mining of Massive Datasets Big Data Management and Analytics Outline Community Detection - Social networks -
Oligopoly: Cournot/Bertrand/Stackelberg
Outline Alternative Market Models Wirtschaftswissenschaften Humboldt Universität zu Berlin March 5, 2006 Outline 1 Introduction Introduction Alternative Market Models 2 Game, Reaction Functions, Solution
CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING
60 CHAPTER 3 SECURITY CONSTRAINED OPTIMAL SHORT-TERM HYDROTHERMAL SCHEDULING 3.1 INTRODUCTION Optimal short-term hydrothermal scheduling of power systems aims at determining optimal hydro and thermal generations
Cost Models for Vehicle Routing Problems. 8850 Stanford Boulevard, Suite 260 R. H. Smith School of Business
0-7695-1435-9/02 $17.00 (c) 2002 IEEE 1 Cost Models for Vehicle Routing Problems John Sniezek Lawerence Bodin RouteSmart Technologies Decision and Information Technologies 8850 Stanford Boulevard, Suite
Why use Cross-ice or Small-area games in practice?
Small-Area Games Why use Cross-ice or Small-area games in practice? It should not have escaped anyone s attention that over the past 10-15 years, Europeans have come to dominate the game of ice hockey
Alok Gupta. Dmitry Zhdanov
RESEARCH ARTICLE GROWTH AND SUSTAINABILITY OF MANAGED SECURITY SERVICES NETWORKS: AN ECONOMIC PERSPECTIVE Alok Gupta Department of Information and Decision Sciences, Carlson School of Management, University
Introduction to Support Vector Machines. Colin Campbell, Bristol University
Introduction to Support Vector Machines Colin Campbell, Bristol University 1 Outline of talk. Part 1. An Introduction to SVMs 1.1. SVMs for binary classification. 1.2. Soft margins and multi-class classification.
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Social Media Mining. Data Mining Essentials
Introduction Data production rate has been increased dramatically (Big Data) and we are able store much more data than before E.g., purchase data, social media data, mobile phone data Businesses and customers
A public good is often defined to be a good that is both nonrivalrous and nonexcludable in consumption.
Theory of Public Goods A public good is often defined to be a good that is both nonrivalrous and nonexcludable in consumption. The nonrivalrous property holds when use of a unit of the good by one consumer
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Hearing before the House Permanent Select Committee on Intelligence. Homeland Security and Intelligence: Next Steps in Evolving the Mission
Hearing before the House Permanent Select Committee on Intelligence Homeland Security and Intelligence: Next Steps in Evolving the Mission 18 January 2012 American expectations of how their government
Nonlinear Optimization: Algorithms 3: Interior-point methods
Nonlinear Optimization: Algorithms 3: Interior-point methods INSEAD, Spring 2006 Jean-Philippe Vert Ecole des Mines de Paris [email protected] Nonlinear optimization c 2006 Jean-Philippe Vert,
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams
Scheduling Home Health Care with Separating Benders Cuts in Decision Diagrams André Ciré University of Toronto John Hooker Carnegie Mellon University INFORMS 2014 Home Health Care Home health care delivery
Egmont Group Plenary St Petersburg July 2012 Anti money laundering in new payment technologies
Egmont Group Plenary St Petersburg July 2012 Anti money laundering in new payment technologies Mr Marcus Killick Chief Executive Officer Gibraltar Financial Services Commission 1 Coverage Gibraltar background
Chapter 5: Completing Pages Four and Five of the Closing Disclosure... 35 Summary... 42
Table of Contents The Integrated Disclosure Rule... 4 Chapter 1: Introduction to the Integrated Disclosure Rule... 5 Consolidated Disclosures... 5 Chapter 2: Delivery of the Loan Estimate and Closing Disclosure...
Coordinated Scan Detection
Coordinated Scan Detection Carrie Gates CA Labs, Islandia, NY [email protected] Abstract Coordinated attacks, where the tasks involved in an attack are distributed amongst multiple sources, can be used
How To Solve The Cluster Algorithm
Cluster Algorithms Adriano Cruz [email protected] 28 de outubro de 2013 Adriano Cruz [email protected] () Cluster Algorithms 28 de outubro de 2013 1 / 80 Summary 1 K-Means Adriano Cruz [email protected]
EDA ad hoc B program. CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC
EDA ad hoc B program CORASMA project COgnitive RAdio for dynamic Spectrum MAnagement Contract N B-781-IAP4-GC Learning algorithms for power and frequency allocation in clustered ad hoc networks Luca ROSE,
HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE
HYBRID GENETIC ALGORITHMS FOR SCHEDULING ADVERTISEMENTS ON A WEB PAGE Subodha Kumar University of Washington [email protected] Varghese S. Jacob University of Texas at Dallas [email protected]
Predictive Act-R (PACT-R)
Predictive Act-R (PACT-R) Using A Physics Engine and Simulation for Physical Prediction in a Cognitive Architecture David Pentecost¹, Charlotte Sennersten², Robert Ollington¹, Craig A. Lindley², Byeong
BUSINESS RULES FOR CHAPTER VII DAILY IMBALANCE CHARGES
BUSINESS RULES FOR CHAPTER VII DAILY IMBALANCE CHARGES 1. General 1.1. The TSO shall publish its imbalance charge methodology and update it accordingly as any changes are made. This methodology must contain:
Do not open this exam until told to do so.
Do not open this exam until told to do so. Department of Economics College of Social and Applied Human Sciences K. Annen, Winter 004 Final (Version ): Intermediate Microeconomics (ECON30) Solutions Final
A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL 4, NO 2, JUNE 2009 165 A Game Theoretical Framework on Intrusion Detection in Heterogeneous Networks Lin Chen, Member, IEEE, and Jean Leneutre
The Bellevue Center for Obesity & Weight Management. Program Director: Manish Parikh, MD WEIGHT LOSS SURGERY INFORMATION SEMINAR
Wednesday, January 7, 2015 Wednesday, February 4, 2015 Wednesday, March 4, 2015 Wednesday, April 1, 2015 Wednesday, May 13, 2015 Wednesday, June 3, 2015 Wednesday, July 1, 2015 Wednesday, August 5, 2015
WEIGHT LOSS SURGERY INFORMATION SEMINAR
Wednesday, January 6, 2016 Wednesday, February 3, 2016 Wednesday, March 2, 2016 Wednesday, April 6, 2016 Wednesday, May 4, 2016 Wednesday, June 1, 2016 Wednesday, July 6, 2016 Wednesday, August 3, 2016
Flexible Distributed Capacity Allocation and Load Redirect Algorithms for Cloud Systems
Flexible Distributed Capacity Allocation and Load Redirect Algorithms for Cloud Systems Danilo Ardagna 1, Sara Casolari 2, Barbara Panicucci 1 1 Politecnico di Milano,, Italy 2 Universita` di Modena e
Multiple Optimization Using the JMP Statistical Software Kodak Research Conference May 9, 2005
Multiple Optimization Using the JMP Statistical Software Kodak Research Conference May 9, 2005 Philip J. Ramsey, Ph.D., Mia L. Stephens, MS, Marie Gaudard, Ph.D. North Haven Group, http://www.northhavengroup.com/
Introduction to Strategic Supply Chain Network Design Perspectives and Methodologies to Tackle the Most Challenging Supply Chain Network Dilemmas
Introduction to Strategic Supply Chain Network Design Perspectives and Methodologies to Tackle the Most Challenging Supply Chain Network Dilemmas D E L I V E R I N G S U P P L Y C H A I N E X C E L L E
Least-Squares Intersection of Lines
Least-Squares Intersection of Lines Johannes Traa - UIUC 2013 This write-up derives the least-squares solution for the intersection of lines. In the general case, a set of lines will not intersect at a
INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
Quality Ladders, Competition and Endogenous Growth Michele Boldrin and David K. Levine
Quality Ladders, Competition and Endogenous Growth Michele Boldrin and David K. Levine 1 The Standard Schumpeterian Competition Monopolistic Competition innovation modeled as endogenous rate of movement
