DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

Size: px
Start display at page:

Download "DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS"

Transcription

1 DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, Errin W. Fulp Department of Computer Science Wake Foret Univerity Winton-Salem, NC, Patrick S. Wheeler Department of Computer Science Univerity of California at Davi Davi, CA, ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection Sytem (IDS). Thee packet inpection typically require coniderable delay often conuming more than 70% of the IDS proceing time. Unfortunately, thi delay become more ignificant a ecurity policie and network peed continue to increae. Thi paper introduce a new parallel IDS content matching technique that provide initial packet inpection with le delay. The technique ditribute portion of a packet payload acro an array of n proceor, each reponible for canning a maller amount of original payload. Given thi deign, each proceor ha le data to inpect thu reducing the overall delay. Unlike imilar parallel approache, our technique enure that ecurity i maintained (no fale negative). Furthermore, the propoed parallel technique i hown to reult in an initial match peed-up of approximately.25n uing Snort (an open ource IDS), actual IDS policie, and traffic trace a ignificant improvement over current parallel technique. KEYWORDS Aho-Coraick, Data Parallel, Intruion Detection, Packet, Parallel, Signature Matching, Snort, Wu-Manber INTRODUCTION Intruion Detection Sytem (IDS) inpect arriving packet for maliciou content (ignature) a defined by a ecurity policy. Unfortunately, comparing packet header and payload againt a policy can be complex and time-conuming. For example, it ha been found that content matching (canning for ignature) account for more than 70% of the packet proceing time [2], [7]. Therefore, given the riing number [5] and ophitication /07/$25.00 c 2007 IEEE of network threat, thee ytem will be forced to operate at much fater peed in the near future. One approach for reducing the content matching time i the ue of better earching algorithm. Three tring earching algorithm are commonly ued for IDS content matching, Aho-Coraick [], Boyer-Moore [4], and Wu-Manber [3]. The Aho-Coraick algorithm ue a finite tate machine for tring matching and provide the bet wort cae performance, but require a ignificant amount of memory for the tate machine. In contrat, Boyer-Moore provide the bet performance when earching for a ingle ignature [6], but cale poorly. The Wu-Manber algorithm can be viewed a a multi-pattern verion of Boyer-Moore, which require le memory than Aho-Coraick and provide a better average cae performance. Although the incluion of thee multi-pattern earch algorithm and the development of new IDS pecific earch algorithm have greatly improved performance, it may not be ufficient for the next generation of high peed network. Parallel content matching offer a calable method for inpecting packet in a high peed environment [3], [8], [4]. Thee ytem typically conit of an array of proceor that are ued to proce packet in parallel. For example, a imple parallel approach would ditribute the arriving packet evenly acro the array of proceor, each having a copy of the complete policy [8]. Uing terminology borrowed from parallel computing, thi i conidered a data parallel approach. While thi technique reduce the amount of packet per proceor, load balancing and maintaining tate (ending packet of one connection to the ame proceor) i difficult [8]. In contrat, another parallel approach divide the packet payload acro the array uch that each proceor inpect a maller piece of the original packet payload [3], [4]. Although potentially fater, if a ignature pan multiple proceor it will not be found [3]. Thi ecurity iue can be reolved if the data aigned to proceor of7

2 overlap uch that each proceor can oberve the entire ignature [4]. However, a the overlapped data mut be canned more than once thi greatly increae the content earch time. Thi paper decribe a new parallel content matching approach, called Divided Data Parallel (DDP), that divide the payload of a packet acro an array of proceor a decribed in the preceding paragraph [3], [4]. However, the propoed method incorporate a lightweight ynchronization ytem that mitigate the impact of data overlap. The match-bit allow one proceor to quickly indicate to other proceor that a match ha been found for a given packet. Once the notification ha been received, the remaining proceor can tart inpecting another packet. Thi modification caue DDP to perform ignificantly better than other data parallel method. Experimental reult were taken uing Snort (an open ource IDS). Snort policie for web-traffic, and actual traffic trace indicate a traditional data parallel approach uing n proceor, for content matching, reduce the content matching time by approximately 0.75n. In contrat, the DDP algorithm reduce the content matching phae by.25n. The remainder of thi paper i organized a follow. The econd ection give a thorough overview of Network Intruion Detection Sytem (NIDS), Snort rule yntax, and Snort detection. The third ection cover previou parallel technique, while the fourth ection introduce the new DDP approach.the fifth ection how reult of the DDP algorithm compared to other algorithm, and the lat two ection ummarize the contribution of thi paper, and introduce the area of future reearch. NETWORK INTRUSION DETECTION USING SNORT A decribed in the introduction, the purpoe of a ignature-baed IDS i to detect maliciou behavior on a computer ytem or network. Thi i accomplihed by canning packet payload for known pattern or ignature. While thi type of IDS require ignature be know a priori, it remain an important component for ecuring computer ytem. Snort, one of the mot popular IDS, i an open-ource project developed and maintained by Sourcefire[9]. It i commonly ued by both reearch project and commercial product becaue of it eae of ue and veratility. Snort can perform realtime traffic analyi, content matching, and it can detect multiple type of attack. Figure diagram the five primary proceing tage in Snort. During the firt tage Snort receive packet via libpcap from either the network or a uer defined trace file. Once the packet are captured, they are ent through an immediate decoding proce, which fill a tructure baed off of the packet protocol. After packet are decoded they are ent through a preproceing tage, which perform packet analyi and reaembly. For example, if a TCP packet i captured but ha a malformed header, the preproceor can drop the packet from the ytem [0]. After preproceing, content normalization occur. For example, telnet and HTTP are two type of traffic that are normalized. Once normalization i complete, the data move to the mot time-conuming tage of Snort, the content matching tage. In thi tage Snort detection engine ue a robut tring earching algorithm (decribed in the introduction) to compare each packet payload with rule from a ignature file. The ignature file contain a lit of known maliciou ignature, and upon canning, if a ignature i matched the alert engine i notified. A Snort rule expree the action to perform on matching packet/tream. For example, conider the following rule in Figure 3. Each Snort rule conit of three component. The firt identifie the action that mut be taken if there i a match. The econd denote the primary match criterion. In Figure 3, the match criterion identifie any TCP packet detined for the 0...0/24 addre pace and port 222. The third component contain rule option and decribe any additional match criteria (for example, pattern in the payload) and parameter for executing the action. In Figure 3, Snort would earch for the hexadecimal pattern " aa" in the payload. If it i alo a match, the meage "rpcd requet" i generated. Snort allow the pecification of packet header and payload match criteria. It i important to note that the rule option may contain multiple pattern and/or pecification. Snort will firt earch for the longet pattern for each rule, called the initial match. If there i an initial match it i then verified by earching for any additional content and/or verifying pecification decribed by the rule option. If maliciou data i found in the payload the alert engine i notified. The multi-tage approach of Snort i effective in detecting maliciou packet and with parallel technique Snort can be ued on network with high line peed demand. 2of7

3 packet capture pre-proce content normalization ignature matching alert tate info Figure. High-level proceing tage of Snort IDS. alert udp any any -> 0...0/ (content:" aa "; mg:"rpcd requet";) action primary match rule option Figure 2. An example Snort rule that conit of three part: action, primary match, and rule option. PARALLEL SIGNATURE MATCHING TECHNIQUES The ignature matching tage of Snort account for more than 70% of the proceing time [2], [7]. The ue of fater earching algorithm ha reduced the ignature matching delay; however thee olution are not ufficient for the increaing number of policy rule and network peed. One calable olution for reducing the ignature matching delay i the ue of parallelization. A parallel IDS conit of an array of n proceor (thi may be an array of computer, proceor, or proceor core). Uing concept developed for parallel computing, the array can be configured two way, function parallel or data parallel. In a function-parallel ytem the policy rule are ditributed acro the array of proceor, therefore each proceor ha a maller local policy. The data (packet payload) i then duplicated acro the array of proceor and every proceor earche the data for a maller number of ignature (defined by the local policy). Thi approach typically reduce the delay ince all the proceor are ued to proce the data. However a decribed in [2], thi form of parallelim doe not reduce the ignature matching delay. Thi i primarily due to the ue of the multi-pattern earch algorithm, uch a Wu-Manber and Aho-Coraick. The performance of thee algorithm i ub-linear with repect to the number of pattern. The earch delay for 00 pattern i not ubtantially more than the delay for 0 pattern [2]. Therefore, ditributing the rule acro each proceor only minimally reduce proceing delay. In a data parallel configuration, each proceor in the array ha the ame policy (ame ignature). The data i then ent to one proceor, uch that each proceor ha n of the original load (load balancing i the objective) []. A peed-up of.94 for 2 proceor and 3.48 for 4 proceor wa oberved uing a imple data parallel ignature matching technique [], [2]. However, the previou experiment ditributed packet in a round robin fahion, which i difficult to perform in real-time at high peed becaue the tate information required per packet flow. Although the actual peed-up may be maller than oberved experimentally, thee reult indicate that a imple data parallel approach can improve ytem peed in a calable fahion. Divided Data Parallel Signature Matching Another form of data parallelim divide the payload of each packet acro the array of proceor. Each proceor inpect a different portion, or fragment, of the ame packet, but collectively the entire packet payload i inpected [3], [4]. There are everal advantage to thi approach. Firt, many of the earching algorithm, uch a Aho-Coraick, are bounded by the amount of data to be inpected. Therefore, reducing the amount of data per proceor hould reduce the inpection time. Another important advantage of the divided data parallel method i the ability to maintain tate. Since a packet i inpected by every proceor, tate information can reide on any proceor. Uing thee technique, the performance i potentially better than the previou data parallel deign. Unfortunately, ignature can be found only if they completely exit within a packet fragment. If a ignature pan multiple fragment then it will not be found, reulting in a fale negative [3]. A een in Figure 3, thi can be avoided by duplicating data acro the proceor, called overlap, uch that a proceor can oberve the ignature [4]. Let T be the packet payload coniting of an array of m byte (or character). Furthermore, let p be the number of byte in the larget pattern, or ignature, to earch for in T. Each proceor i aigned byte to earch in T, where p ince each proceor mut be able to oberve the larget ignature. How the fragment overlap i critical to the performance and ha not been directly addreed by previou work [3], [4]. Given the larget pattern ize i p, then conecutive fragment mut overlap by, or have in 3of7

4 f ragment0 f ragment2 (p ) (p ) (p ) f ragment Figure 3. Packet payload coniting of 8 byte (m = 8), fragment ize of 6 byte ( = 6), and maximum pattern length of 3 byte (p = 3). Uing Equation, the minimum number of proceor required to proce the packet in time unit i 4. f ragment3 common, (p ) byte. Given the value of and p, the firt fragment conit of byte T 0 through T, while the econd fragment would conit of byte T (p ) through T 2+p. The econd fragment tart at byte T (p ) ince the lat byte of the pattern may be located at + ; therefore, thi preent the need of a (p ) byte overlap with the previou fragment. Thi i depicted in Figure 3, which conit of an 8 byte packet, a fragment ize of 6 byte, and maximum pattern of 3 byte. If the ignature (p = 3) tart at byte 3 then it will be found in fragment 0; however, if the ignature tart at byte 4 it will be found in fragment. Therefore the (p ) overlap enure the ignature can be detected anywhere between conecutive fragment. In general, the i th fragment conit of byte T i( (p )) through T i( (p ))+. It i poible that the lat fragment i horter than the other. If it i horter than p, then thee remaining byte are added to the previou fragment. A imple analyi of the amount of time required to proce a packet payload can be done with the following aumption. Aume that every fragment contain byte and each byte require one time unit to proce. Furthermore, aume all proceor mut inpect every byte of their fragment and all proceor mut tart at the ame time. Given thee aumption the total amount of time required to proce the entire packet payload i. Given m byte in the packet payload then the minimum number of proceor required to proce the packet in unit of time i n = + m (p ) () A een in Figure 3, the lat fragment i not overlapped. The remaining m byte of the packet are divided acro other proceor uch that each proceor ha (p ) unique (non-overlapped) byte a compared to it leftmot neighboring fragment. Thi equation can be olved for to determine the appropriate fragment ize given a fixed number of proceor which typically the cae. A een in Equation, the amount of time required to proce the packet payload decreae a decreae which alo require more proceor. The hortet amount of time required to proce the packet occur when = p. Therefore the minimum number of proceor required to proce the packet payload in the hortet amount of time i n p = +(m p) (2) Note when = p every byte, except for the firt and lat, i inpected by more than proceor ince it i contained in more than one fragment. Having more proceor than defined by equation or 2 will not decreae the proceing time. A explained in the next ection, if there are more proceor than required it i poible to ue them to inpect other packet. Although overlapping doe eliminate fale negative, it alo increae the earch time. For example an 8 proceor ytem only decreaed the earch time by 60% a compared to a ingle proceor machine [4]. Overlap portion of the payload are inpected multiple time, while a ingle proceor would only inpect each byte of the payload once. A a reult the imple data parallel approach decribed in [], [2] provide better gain than the current divided data parallel method. ANEW DIVIDED DATA PARALLEL SIGNATURE MATCHING APPROACH A previouly decribed, the divided data parallel technique ha everal advantage but the earch time i increaed when overlap i ued. Thi ection introduce a new divided data parallel approach that ignificantly reduce earch time while till eliminating fale negative. A een in Figure 4, the new propoed divided data parallel ytem conit of an array of n proceor, each implementing the ame policy. A decribed in the previou ection, the payload of an arriving packet i 4of7

5 packet divider packet 3 packet 2 packet 2 packet 2 packet 3 fragment 0 fragment fragment 0 packet packet packet packet fragment 0 fragment fragment 2 packet 0 packet 0 packet 0 packet 0 fragment 0 fragment fragment 2 proceor 0 proceor proceor 2 Figure 4. A new propoed divided data parallel ytem where a packet i divided into fragment then forwarded to an array of proceor. A i aociated with each fragment to indicate weather a match ha been found and allow the proceor operate independently. divided acro the proceor uch that each proceor inpect only a maller portion, or fragment, of the original payload. Note, the fragment do contain overlap data to enure a ignature can be detected at any location within the packet. Fragment are queued at the proceor where they are independently inpected for ignature. Thu thi new deign allow proceor to inpect different packet fragment imultaneouly, which improve performance ince the proceor need not be ynchronized. For example, in Figure 4 proceor 0 and may inpect fragment from packet 2, while proceor 3 i inpecting a fragment from packet 3. Thi form of pipelining ignificantly improve performance. If an initial match i only conidered, a done in previou divided data parallel technique, then the performance can be further improved by allowing fragment to be ignored if an initial match ha already been found. To provide thi functionality, a i aociated with each packet and i teted by the proceor before it fragment i inpected. Initially et to fale, a match-bit for a packet i et to true if a proceor find a pattern match with an aociated fragment. If the match-bit aociated with a packet i true, then the proceor can ignore any fragment aociated with that packet. Thi alo help the proceor to operate more aynchronouly ince they can quickly ignore certain fragment. Fragment ditribution alo impact the ytem performance. Conider a imple round robin approach, where each i th portion of a packet i aigned to the i th proceor. Since packet have different length, the number of fragment may be le than the number of proceor. A imple round robin ditribution enure the firt proceor will alway have a fragment while the lat proceor may not; therefore ome form of load balancing i needed. Aigning a fragment to the next unued proceor provide load balancing, but experimental reult indicate a random ditribution provide imilar performance with minimal overhead. The propoed improvement, aynchronou earch and firt match notification, provide ignificantly fater inpection time while eliminating fale negative. EXPERIMENTS AND RESULTS The performance of the parallel content-matching approache were evaluated experimentally uing an eight core, hared memory, Linux-baed computer. The packet ignature match component of Snort wa changed to perform either a data parallel or a divided data parallel earch, and wa changed to meaure the earch time. The number of proceor ued for the divided data parallel method were determined uing Equation. A done in the previou divided data parallel reearch, all experiment (data parallel and divided data parallel) only performed an initial match, which earche for the longet pattern in each rule. Each experiment ued the web and HTTP content rule upplied at the Snort web-ite, which conited of 344 rule total. The maximum pattern length, p, wa 80 byte. The packet ued for inpection conited of 3 day of actual web-traffic ent to a web-erver located at a major reearch univerity. Experiment meaured the peed-up a compared to a ingle proceor machine. In addition, the reult of the inpection were compared to a ingle proceor to enure no fale poitive or negative occurred. The performance of different match algorithm for the parallel approache wa meaured a well a the impact of different packet ize. The firt experiment compared the performance of the divided data parallel approach uing: no overlap 5of7

6 (which reult in fale negative) [3], overlap [4], and overlap with the match-bit (the new approach propoed in thi paper). The Aho-Coraick algorithm wa ued for content matching in each experiment. Figure 5 how the peed-up a the number of proceor increaed for the three different divided data parallel approache. When neither the match-bit or overlap were ued the reult are lightly better than a normal data parallel approach. Unfortunately a previouly dicued, thi approach reult in fale negative (number of matche were fewer than when uing a ingle proceor). A een in the figure, the performance drop when overlap i ued to eliminate fale negative. At 4 proceor the peed-up i only 3., while at 8 the peed-up i 4.9. Therefore the incluion of overlap had a negative impact on performance. The ue of overlap and the match-bit provided the bet performance. Thi divided data parallel approach reulted in a 2.66 peed-up with 2 proceor and 0.65 with 8 proceor. On average thi correpond to a.25n peed-up, where n i the number of proceor. The peed-up i greater than n becaue of pipelining, ince proceor can inpect fragment from different packet in parallel. Thi additional form of parallelim provide a ignificant increae in performance. Speed Up Speed Up a Number of Proceor Increae DDP Initial Match with overlap and match bit DDP Initial Match no overlap DDP Initial Match with overlap Data Parallel Initial Match Number of Proceor Figure 5. Speed-up of the different parallel approache, each uing the Aho-Coraick content matching algorithm. The next experiment compared the performance of different earch algorithm (Wu-Manber and Aho-Coraick) uing the propoed divided data parallel approach (overlap and ) and tandard data parallel. In general, Wu-Manber provide reaonably fat content matching with a mall memory requirement, while Aho-Coraick provide fater earch time but require more memory to tore neceary data tructure. Both are available in the current verion of Snort. A hown Figure 6, data parallel uing the Wu-Manber algorithm ha a peed gain of 4.48 time when 8 proceor are ued while DDP uing Wu-Manber ha a peed gain of 9.05 when 8 proceor are ued. Data parallel uing Aho-Coraick ha a peed gain of 3.4 with 8 proceor while DDP uing Aho-Coraick ha a peed gain of Thee reult indicate the new propoed divided data parallel method outperform data parallel uing any ignature matching algorithm. In addition, like the traditional data parallel method, the performance of the propoed divided data parallel method i independent of the ignature matching algorithm. Thi i expected ince the data parallel paradigm divide the data tream to be proceed, not the proceing method for the data tream. Figure 6. Speed Up Speed Up a Number of Proceor Increae DDP Initial Match uing Aho Coraick DDP Initial Match uing Wu Manber DP Initial Match uing Wu Manber DP Initial Match uing Aho Coraick Number of Proceor Graph howing the peed-up of the parallel algorithm The lat experiment meaured the effect of different packet ize on the divided data parallel approach. The larget pattern length wa 20 byte and the packet payload were 360, 680, 340, and 70 byte. Thee payload amount give equal length fragment. Note that for each doubling in packet ize the number of packet ued i halved. Thi i to maintain a conitent amount of data throughout the experiment. Auming every byte of data mut be proceed, the total amount of byte inpected per group of proceor i computed by uing the following equation, where m i the packet ize in byte, n i the number of proceor, p i the ize of the larget pattern in byte, and k i the total number of packet. (m +(n ) (p )) k (3) Figure 7 i a graph of the peed-up a the packet ize change; note that thee peed-up rate mirror the value computed uing Equation 3. The larger packet perform the bet, becaue a maller portion of the packet i overlap, wherea mall packet perform wort becaue they contain a larger portion of overlap. 6of7

7 Speed Up Figure Speed Up a Number of Proceor Increae Number of Proceor Time to proce packet a packet ize change CONCLUSIONS Thi paper introduced a new divided data parallel method that build upon the work in [3], [4] and how peed gain greater than data parallel [], [2]. The new method till divide the packet payload into fragment and ue overlapping to prevent fale negative. However, unlike other divided data parallel approache thee fragment can be proceed independently. The new method aociate a with each packet. Initially et to fale, the indicate if a match ha been found in the packet. If a proceor find a match, then the aociated i et to true. Before a proceor inpect a fragment the i checked, if it i already true then the fragment i not inpected and the proceor move to the next fragment in it queue. Thi allow proceor to operate independently ince certain fragment can be ignored. A a reult the ytem permit pipelining ince proceor may proce fragment from different packet. Experimental reult uing Snort (an open ource IDS) and actual traffic trace indicate the new divided data parallel method reult in a peed-up of approximately.25n where n i the number of proceor; wherea previou work wa only able to achieve a peed-up of 0.75n. Furthermore, the new approach i independent of the content matching algorithm. The new divided data parallel method i a calable technique that perform better than current method. FUTURE WORK Although the new divided data parallel method ha hown great promie, there are everal area for future work. One area important for all divided parallel technique i the upport of match verification. To provide thi functionality a two tiered ytem could be ued, where the divided data parallel ytem end all initial matche to a econdary IDS for verification. Further, a dynamic metric for determining the packet plit at runtime can be developed. The packet can be plit in varying way baed upon the packet ize and the maximum pattern length. Thi reearch focued on the content matching phae, future reearch can focu on the entire ytem a a whole. The cot of fragmentation and ditribution will affect the peed of the ytem, reearch need to determine how detrimental thi cot i. ACKNOWLEDGMENTS Thi work wa upported by GreatWall Sytem Inc. and the U.S. Department of Energy STTR program (grant DE-FG02-06ER86274). The view and concluion contained herein are thoe of the author and hould not be interpreted a necearily repreenting the official policie or endorement, either expreed or implied, of GreatWall Sytem, the DOE or the U.S. Government. REFERENCES [] Alfred V. Aho and Margaret J. Coraick. Efficient tring matching: An aid to bibliographic earch. Communication of the ACM, 8(6), June 975. [2] S. Antonato K.G. Anagnotaki and E. P. Markato. Generating realitic workload for network intruion detection ytem. In Proceeding ACM Workhop on Software and Performance., [3] Herbert Bo and Kaiming Huang. A network intruion detection ytem on ixp200 network proceor with upport for large rule et. [4] Robert S. Boyer and J. Strother Moore. A fat tring earching algorithm. Commun. ACM, 20(0): , 977. [5] Cert. Cert/cc tatitic [6] Richard Cole. Tight bound on the complexity of the boyermoore tring matching algorithm. Sympoium on Dicrete Algorithm, page , 99. [7] Mike Fik and George Varghee. Fat content-baed packet handling for intruion detection. Technical report, Univerity of California at San Diego, 200. [8] C. Kruegel, F. Valeur, G. Vigna, and R. Kemmerer. Stateful intruion detection for high-peed network, [9] Sourcefire. Sourcefire network ecurity. [0] Sourcefire. Snort Uer Manual, December [] Patrick Wheeler and Errin W. Fulp. A taxonomy of parallel technique for intruion detection. ACMSE 2007, [2] Patrick Stuart Wheeler. Technique for improving the performance of ignature baed intruion detection ytem. Mater thei, Univerity of California Davi, [3] Sun Wu and Udi Manber. A fat algorithm for multi-pattern earching. Technical report, Univerity of Arizona, May 994. [4] Jianming Yu and Jun Li. A parallel nid pattern matching engine and it implementation on network proceor. In 2005 International Conference on Security and Management (SAM 2005), of7

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology

Abstract parsing: static analysis of dynamically generated string output using LR-parsing technology Abtract paring: tatic analyi of dynamically generated tring output uing LR-paring technology Kyung-Goo Doh 1, Hyunha Kim 1, David A. Schmidt 2 1 Hanyang Univerity, Anan, South Korea 2 Kana State Univerity,

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Cost Models for Selecting Materialized Views in Public Clouds

Cost Models for Selecting Materialized Views in Public Clouds International Journal of Data Warehouing and Mining, 0(4), -25, October-December 204 Cot Model for Selecting Materialized View in ublic Cloud Romain erriot, Clermont Univerité, Univerité Blaie acal, Aubière

More information

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur

Module 8. Three-phase Induction Motor. Version 2 EE IIT, Kharagpur Module 8 Three-phae Induction Motor Verion EE IIT, Kharagpur Leon 33 Different Type of Starter for Induction Motor (IM Verion EE IIT, Kharagpur Inructional Objective Need of uing arter for Induction motor

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

6. Friction, Experiment and Theory

6. Friction, Experiment and Theory 6. Friction, Experiment and Theory The lab thi wee invetigate the rictional orce and the phyical interpretation o the coeicient o riction. We will mae ue o the concept o the orce o gravity, the normal

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001*

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001* Allen M. Potehman Univerity of Illinoi at Urbana-Champaign Unuual Option Market Activity and the Terrorit Attack of September 11, 2001* I. Introduction In the aftermath of the terrorit attack on the World

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Turbulent Mixing and Chemical Reaction in Stirred Tanks

Turbulent Mixing and Chemical Reaction in Stirred Tanks Turbulent Mixing and Chemical Reaction in Stirred Tank André Bakker Julian B. Faano Blend time and chemical product ditribution in turbulent agitated veel can be predicted with the aid of Computational

More information

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance?

Unobserved Heterogeneity and Risk in Wage Variance: Does Schooling Provide Earnings Insurance? TI 011-045/3 Tinbergen Intitute Dicuion Paper Unoberved Heterogeneity and Rik in Wage Variance: Doe Schooling Provide Earning Inurance? Jacopo Mazza Han van Ophem Joop Hartog * Univerity of Amterdam; *

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Graph Analyi I Network Meaure of the Networked Adaptive Agents

Graph Analyi I Network Meaure of the Networked Adaptive Agents Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3 Proceeding of the 3 rd International Conference on Information Sytem, Logitic and Supply Chain Creating value through green upply chain ILS 2010 Caablanca (Morocco), April 14-16 The right information to

More information

OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK

OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK binding neuron, biological and medical cybernetic, interpike interval ditribution, complex ytem, cognition and ytem Alexander VIDYBIDA OUTPUT STREAM OF BINDING NEURON WITH DELAYED FEEDBACK A binding neuron

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

International Journal of Heat and Mass Transfer

International Journal of Heat and Mass Transfer International Journal of Heat and Ma Tranfer 5 (9) 14 144 Content lit available at ScienceDirect International Journal of Heat and Ma Tranfer journal homepage: www.elevier.com/locate/ijhmt Technical Note

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

The Arms Race on American Roads: The Effect of SUV s and Pickup Trucks on Traffic Safety

The Arms Race on American Roads: The Effect of SUV s and Pickup Trucks on Traffic Safety The Arm Race on American Road: The Effect of SUV and Pickup Truck on Traffic Safety Michelle J. White Univerity of California, San Diego, and NBER Abtract Driver have been running an arm race on American

More information