Virtual Enterprise Transactions: A Cost Model
|
|
|
- Blanche Norman
- 10 years ago
- Views:
Transcription
1 Virtual Enterprise Transactions: A Cost Model A. D Atri 1 and A. Motro 2 Abstract A transaction is a bilateral exchange between two parties in which goods are delivered in return for payment. In virtual enterprise environments, transactions are the principal means of collaboration among the enterprise members, as well as the mechanism with which the enterprise provides its products to its external clients. In this paper we examine the concept of transactions in virtual enterprises. We define transactions as recursive processes (similar to supply chains), and we formalize the concept of transaction cost. We then examine transaction failure and transaction risk, which lead us to the concept of transaction expected loss. The overall goal is to allow enterprise members to launch those transactions that minimize their expected losses. We also discuss how initiating redundant transactions can further reduce expected losses. Introduction and Background A transaction is a bilateral exchange between two parties in which goods are delivered in return for payment. In a virtual enterprise environment, transactions are the mechanism with which the enterprise provides products to its external clients. Such transactions are termed external transactions. To fulfill an external transaction, the contracted enterprise member may procure necessary products from other members of the enterprise. These exchanges are termed internal transactions. The supplier of an internal transaction may, in turn, initiate other internal transactions (termed subtransactions). Altogether, the execution of an external transaction is a distributed effort of a group of enterprise members. In this paper we examine the concept of transactions in virtual enterprises. We begin by defining transactions as recursive processes (similar to supply chains), and then we formalize the concept of transaction cost. Later on we examine transaction failure and transaction risk, which lead us to the concept of transaction expected loss, 1 Università LUISS Guido Carli, Roma, Italy, [email protected] 2 George Mason University, VA, USA, [email protected] A. D Atri and D. Saccà (eds.), Information Systems: People, Organizations, Institutions, and Technologies, DOI / _20, Springer Physica-Verlag Berlin Heidelberg
2 166 A. D Atri and A. Motro described afterwards. The overall goal is to allow enterprise members to launch those transactions that minimize their expected losses. We also discuss how initiating redundant transactions can further reduce expected losses. This effort is within the framework of the VirtuE model for virtual enterprises that we defined in earlier works [3]. The concept of transaction has been discussed extensively in economics and related disciplines (business, banking, etc.); and (with a considerably different interpretation) in computer applications such as database systems [5] or workflow systems [6]. In the area of virtual enterprises [2], the VirtuE model introduced a concept of transaction that combines elements from both distributed database systems and economics. In other words, it used the structures of computer transactions to implement concepts borrowed from economics. The work here continues in this vein, with the introduction of a cost model. This cost model, which borrows concepts from transaction cost theory (for example, search and information cost [7]), enables us to discuss formally concepts such as transaction failure, transaction risk, and transaction expected loss in virtual enterprise environments. Transaction Model A transaction is a bilateral exchange between two parties in which goods are delivered in return of payment. The party initiating the transaction, requesting the goods and providing the payment is the client; the party responding to the request, providing the goods and receiving the payment is the supplier. Transactions consist of distinct phases, and in this paper we shall assume transactions have three phases: (1) order is the request by the client to the supplier that describes the goods needed; (2) manufacturing is the phase in which the supplier prepares the goods; and (3) fulfillment is the delivery of the goods by the supplier to the client. Thus, orders initiate transactions, and fulfillments conclude them. In a virtual enterprise environment, transactions are the mechanism in which the enterprise provides products or services to its clients. In the virtual enterprise environment described in VirtuE [1], such transactions are termed external transactions. To fulfill an external transaction, the enterprise member may procure necessary products or services from other members of the enterprise. These exchanges are termed internal transactions. In an internal transaction both the client and the supplier are members of the enterprise. The supplier of an internal transaction may, in turn, initiate other internal transactions. Altogether, the execution of an external transaction is a distributed effort of a group of enterprise members. As described in VirtuE, 3 when receiving orders (in either internal or external transactions), enterprise members consult two resources to determine how to respond to the transaction. These resources help the member determine what is needed to fulfill the order, and how to obtain it. 3 VirtuE considers goods that are either products or services. For simplicity, and without loss of generality, we shall assume here goods that are products.
3 Virtual Enterprise Transactions: A Cost Model What is needed: production plan. A production plan is a local resource that enumerates the products that the member must procure from other enterprise members to manufacture a given product. 4 Note that a given product may have multiple (alternative) production plans. 2. How to obtain it: the product catalog. The product catalog is an enterprise-wide resource in which members advertise the products that they supply. Each record in this catalog describes a product, a supplier of the product, and additional information, notably the price. Once the member decides on the production plan and selects the suppliers of the necessary component products, it launches a set of transactions to procure these components. When these transactions have been fulfilled, the member can assemble the product and deliver it to the client. A transaction is therefore a recursive process. We assume that the process terminates with transactions that procure primitive products: products whose manufacturing does not require importation. Transactions can be illustrated with tree diagrams, in which nodes represent manufacturing of products by suppliers, and edges indicate initiation of sub-transactions. In a transaction tree the root node models the manufacturing of the ultimate product (the product ordered by the external client), internal nodes model the manufacturing of component products, and leaf nodes model the manufacturing of primitive (import-free) products. Each transaction is assumed to have a unique identifier, which is assigned to the manufacturing node. A simple transaction tree is shown Fig. 1. In this example, an external client submits a transaction t 0 to order product p 0 from member m 0. To fulfill this order, m 0 submits two sub-transactions: t 1 orders product p 1 from member m 1, and t 2 orders p 2 from m 2. m 1 fulfills t 1 locally; but m 2 submits two additional sub-transactions: t 3 orders p 3 from m 3, and t 4 orders p 4 from m 4. Both m 3 and m 4 fulfill their orders locally. Fig. 1 A transaction tree 4 VirtuE s production plans consider also component parts that are available to this member locally. Without loss of generality, we shall assume here that all component parts are procured externally.
4 168 A. D Atri and A. Motro Transaction Cost There are different costs associated with the execution of a transaction, and we adopt a simple cost model, in which each transaction has an associated price. This is the amount paid by the client to the supplier in return for the product (this price is advertised in the catalog). We assume that price(t) is the sum of three cost components. Let t 1,, t n be the sub-transactions of t. 1. Procurement cost: price(t 1 ),, price(t n ). This is the amount paid by the manufacturer (the client) to each of its suppliers. 2. Transaction overhead cost: overhead(t 1 ),, overhead(t n ). This is the cost associated with the execution of each sub-transaction and borne by the client. 3. Manufacturing cost: manufacture(t). This is the cost of manufacturing the product from its n components (it incorporates the manufacturer s profit). Altogether: price(t) = manufacture(t) + i=1,n (price (t i ) + overhead (t i )). The cost of executing transactions is generally split between the client and the supplier. Here, the client is the member executing t, and the suppliers are the members executing t 1,, t n. We assume that the part borne by each supplier i has been incorporated into price(t i ). Similarly, we could have assumed that the part born by the client has been incorporated into manufacture(t). Yet, for reasons that will become apparent later, we prefer to keep this cost separate, as overhead(t i ). Let t 0 denote the root of a transaction initiated by an external client, then price(t 0 ) is the amount the external client pays for the ultimate product. As price is always a recursive summation of manufacturing costs and transaction overhead costs, it is sufficient to record the latter two. Hence, we label each node of a transaction tree with the associated manufacturing cost, and we label each edge with the associated overhead cost. We illustrate costs in Fig. 2, which shows the example of Fig. 1 with example costs. In this figure, node labels denote the transaction identifiers and the manufac- Fig. 2 A transaction tree with its associated costs
5 Virtual Enterprise Transactions: A Cost Model 169 turing costs, and edge labels denote the transaction overhead costs. The derived transaction prices are then: price(t 1 ) = 10, price(t 3 ) = 20, price(t 4 ) = 15, price(t 2 ) = 70, and price(t 0 ) = 110. Transaction Failure Until now we assumed that all orders are fulfilled, and transactions complete successfully. We consider now the possibility of transaction failure. A transaction fails when an order that has been placed is not fulfilled. Failure could be due to a variety of different reasons: a communication failure, sudden withdrawal from the enterprise, refusal to honor prior commitments, and so on. Failure can be modeled as a disconnection of an edge in the transaction tree. To analyze the cost of transaction failure, we make several assumptions. First, payment is part of fulfillment. Second, all the sub-transactions of a given transaction are placed simultaneously, and it is not possible to cancel orders that have already been placed. Finally, transactions cannot be reversed; i.e., goods may not be returned for a refund. 5 Under these assumptions, the client of a failed transaction does not pay for the cost of the product (as fulfillment never took place), and it bears only the cost of the transaction overhead (as this cost was already invested). The client, however, still pays for all the other component products that have been delivered, and for the cost of manufacturing (although manufacturing was not completed). Assuming the supplier of the failed transaction completed all its sub-transactions promptly, 6 it bears the complete cost of the product it committed to produce. Consider the transaction tree in Fig. 3. For simplicity, assume that all manufacturing costs are 5, and all transaction overhead costs are 1. The overall price is then 107. Assume now two failures: in t 7 and in t 11. The former failure propagates to t 2, and the latter propagates to t 5 and t 1, and consequently t 0 fails. The external client does not pay the virtual enterprise the price of 107, and this loss is distributed as follows: t 11 : 5, t 5 : 12, t 1 : 12, t 7 : 17, t 2 : 24, and t 0 : 37. Thus, only members on a failure path bear the price of failure (t 0, t 1, t 5 and t 11 are on the path of the first failure, and t 0, t 2 and t 7 are on the path of the second failure). Essentially, the price they pay is their overhead for the sub-transactions they launched, and the price of products that were delivered but proved unnecessary because the product for which they were intended was not manufactured. Because the price of the ultimate product is the sum of all the node costs and all the edge costs, and our distribution of the costs assigned each of these costs to exactly one member, the losses borne by the participating members add up to the price of 5 In VirtuE, these assumptions can be expressed by means of constitutional rules. 6 If not, then there had been an earlier failure.
6 170 A. D Atri and A. Motro Fig. 3 The distribution of failure costs the ultimate product. An obvious conclusion is that because the price of products increases along the supply chain, high level suppliers tend to pay a higher share of the loss. Although this higher risk would normally be mitigated by higher profit margins, it is important to minimize the risk of failure. This issue is discussed next. Transaction Risk We define transaction risk as the probability that a transaction fails; that is, the probability that a supplier will not fulfill an order for a particular product. risk(t) denotes the risk in transaction t. We assume that risk(t) combines two different components: (1) Supplier risk measures the risk associated with a particular supplier m; it is the proneness of the supplier to fail. (2) Product risk measures the risk associated with the manufacturing of the particular product p. We interpret this risk as the probability that at least one of the transactions to procure components for p fails. With this definition, product risk increases with the complexity of the product (its number of components): If a product is changed to require an additional component, product risk will increase. Altogether, the risk of a transaction t, in which supplier m is requested to manufacture a product p, is the probability that m fails, or at least one of the sub-transactions to procure components for p fails. For a transaction t that orders a primitive (import-free) product from supplier m, the risk is simply that of supplier failure. It is convenient to view supplier failure as the probability of node failure, and transaction failure as the probability of edge failure. In general, it cannot be assumed that the n + 1 events that define risk(t) (the failure of m or of one of the n sub-transactions it issues) are mutually exclusive; i.e., it
7 Virtual Enterprise Transactions: A Cost Model 171 may not be assumed that there is at most one failure. In such cases, risk(t) must be calculated according to De Moivre s inclusion-exclusion principle [4]. In practice, however, unless n is small, it is normally impossible to calculate risk(t) in this way, and one must settle for lower and upper bounds, such as those suggested by the Bonferroni inequalities [1]. If we assume that the n + 1 events are independent (i.e., the failure of a node and the failure of each incoming edge are unrelated), then risk(t) may be calculated from supplier risk values only. That is, risk values may be propagated from the leaf nodes to the root of the transaction tree. As an example, consider the previous transaction tree and assume that the risks of member failure are 0.01 for primitive manufacturers, and 0.03 for the others. 7 Then, in the three phases of propagation (shown in Fig. 4), we derive that the risk of the external transaction is risk(t 0 ) = As the example demonstrates, the risk increases with the number of primitive products (in this example, 10), and the number of intermediate suppliers (in this example, 8). Thus, to calculate transaction risk, our model requires the complete transaction tree and the supplier risk values for each participating member. We may assume that these risk values are calculated by the enterprise (and updated after each completed or aborted transaction), and are available to its members. 8 In terms common in the Internet today, supplier risk corresponds to the supplier s reliability rating. A feature of the transaction model introduced earlier is the possibility to procure a product from different suppliers. This suggests initiating the sub-transaction with the lowest risk. We showed how transaction risk can be propagated upwards the transaction tree, but it cannot be assumed that a client knows in advance the subtree that will be associated with each of its orders (information necessary to calculate Fig. 4 The propagation of risk 7 In general, it should not be assumed that manufacturers are divided into these two types. 8 VirtuE handles these values as member-specific performance indicators.
8 172 A. D Atri and A. Motro risk). This could be addressed by assuming that each supplier associates with each its products an estimate of the transaction risk. A second flexibility built into our transaction model is the possibility of alternative production plans for a given product (different production plans require different sets of components). The availability of risk values for each sub-transaction will also allow clients to estimate the risks of alternative production plans. Altogether, we sketched how enterprise members can apply knowledge of transaction risk to either (1) choose among alternative suppliers (for a product they need), or, more ambitiously, (2) choose among alternative production plans (to fulfill an order they received). Yet, choosing the option with the lowest risk may not always be the best choice, as the least-risky transaction may have a much higher price. Considering both price and risk is discussed next. Expected Loss and Redundant Ordering Assume member m initiates a transaction for product p for price c with risk r. In the previous section we discussed how m could optimize its operation to minimize the risk r. Similarly, m could optimize its operation to minimize the cost c. Yet, both these approaches may be unattractive: Minimizing risk could come at high cost, and minimizing cost could come at high risk. A more balanced approach is to minimize transaction expected loss. Recall that when a transaction initiated by m fails, m bears only the cost of its overhead; yet m is obligated to pay the cost of the other transactions that were issued in parallel for the same manufacturing task, and completed successfully, and for the cost of manufacturing. Denoting these costs l, the transaction expected loss is r l. For example, consider a manufacturing task for which m needs two parts, p 1 and p 2, and each part has two alternative sources: p 1 can be obtained for cost 10 with risk 0.4 or for cost 20 with risk 0.2, and p 2 can be obtained for cost 30 with risk 0.3 or for cost 60 with risk 0.1. For simplicity, we ignore transaction overhead and the cost of manufacturing. Assume m chooses the first option for each part. There are four distinct possibilities: The first transaction succeeds and the second fails the probability is (1 0.4) 0.3 = 0.18, and the loss is 10. The first transaction fails and the second succeeds the probability is 0.4 (1 0.3) = 0.28, and the loss is 30. There is no loss to m if both transactions succeed (probability (1 0.4) (1 0.3) = 0.42), or if both fail (probability = 0.12). Hence, the expected loss of this choice of options is = Similarly, the expected loss for choosing the first option for p 1 and the second option for p 2 is 22.2, the expected loss of choosing the second option for p 1 and the first option for p 2 is 9, and the expected loss for choosing the second option for each part is This suggests preferring high cost with low risk for p 1, and low cost with high risk for p 2. To minimize expected losses, members could find advantage in placing redundant orders. That is, m could procure a product p from two members: from m 1 with cost c 1 at risk r 1, and from m 2 with cost c 2 at risk r 2. The cost increases to c 1 + c 2 but
9 Virtual Enterprise Transactions: A Cost Model 173 (assuming independence) the risk is reduced to r 1 r 2. Expected loss may be reduced as well. A similar approach could be followed for complete production plans. We can calculate the expected loss of an entire production plan. Members could then choose the production plan that minimizes their expected losses, and they could consider redundant ordering that will reduce their expected losses even further. Conclusion We described a simple yet powerful cost model for transactions in virtual enterprises. Simplicity is maintained with several assumptions, including: (1) Transactions involve only three phases: ordering, manufacturing and fulfillment; (2) all subtransactions are placed simultaneously (e.g., it is not possible to choose the second sub-transaction after the first has been completed); (3) orders may not be cancelled or reversed (no refunds); (4) transaction cost is the sum of external procurement, transaction overhead, and local manufacturing; (5) transaction risk is the combination of manufacturer risk and product risk, where the latter is the risk in procuring the product components; and (6) the failure of a node (a manufacturer) and any of its incoming edges (the sub-transactions it issued) are independent events, allowing for simple calculation of risk based on probabilities of individual events only. The power of the model is in its ability to represent appropriately many realworld situations and perform several optimizations, including: (1) The freedom to order a part from different sources, and to assemble a part according to different schemes; (2) the just distribution of the cost of a failed transaction among the suppliers on the failure path, with higher costs being borne by suppliers higher on the supply chain; (3) the positive correlation between product complexity and product risk; (4) the propagation of product risks upward the supply chain; (5) the optimization of individual member operations to reduce costs, risks, or expected losses; and (6) the ability to place redundant orders to further improve any of these variables. Much work remains to be done, with future work to be focused on: (1) Relaxing some the abovementioned model restrictions; (2) allowing members to maintain stock, thus allowing economics of scale (for example, transaction overhead would be paid less frequently); and (3) devising efficient algorithms for optimizing members operations (in particular, how to deploy redundant ordering efficiently). References 1. C.E. Bonferroni. Teoria statistica delle classi e calcolo delle probabilità. Istituto Superiore di Scienze Economiche e Commerciali di Firenze, 8: 1936, L.M. Camarinha-Matos and H. Afsarmanesh. The Virtual Enterprise Concept. In Proceedings of the IFIP TC5 WG5.3 / PRODNET Working Conference on Infrastructures for Virtual Enterprises: Networking Industrial Enterprises, IFIP Conference Proceedings, Vol. 153, 1999, pages 3 14.
10 174 A. D Atri and A. Motro 3. A. D Atri and A. Motro. VirtuE: a Formal Model of Virtual Enterprises for Information Markets. International Journal of Intelligent Systems, Vol. 30, No. 1, February 2008, pages A. De Moivre. Doctrine of Chances A Method for Calculating the Probabilities of Events in Plays. Pearson, London, A.K. Elmagramid. Database Transaction Models for Advanced Applications. M. Kaufmann Publishers, San Mateo, California, P. Grefen. Transactional Workflows or Workflow Transactions? In Proceedings of DEXA 02, 13th International Conference on Database and Expert Systems Applications, Lecture Notes in Computer Science, Vol. 2453, Springer, 2002, Pages G.E. Smith, M.P. Venkatraman, R.R. Dholakia. Diagnosing the Search Cost Effect: Waiting Time and the Moderating Impact of Prior Category Knowledge. Journal of Economic Psychology, Vol. 20, 1999, pages
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
Modeling Workflow Patterns
Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-
Chapter 4 Software Lifecycle and Performance Analysis
Chapter 4 Software Lifecycle and Performance Analysis This chapter is aimed at illustrating performance modeling and analysis issues within the software lifecycle. After having introduced software and
Virtual Enterprise Transactions: A Cost Model
VirtualEnterpriseTransactions:ACostModel AlessandroD Atri CeRSI,LuissGuidoCarliUniversity,Rome,Italy and AmihaiMotro ComputerScienceDepartment,GeorgeMasonUniversity,VA,USA Abstract Atransactionisabilateralexchangebetweentwopartiesinwhichgoodsaredeliveredinreturnfor
Lecture 10: Regression Trees
Lecture 10: Regression Trees 36-350: Data Mining October 11, 2006 Reading: Textbook, sections 5.2 and 10.5. The next three lectures are going to be about a particular kind of nonlinear predictive model,
Classification/Decision Trees (II)
Classification/Decision Trees (II) Department of Statistics The Pennsylvania State University Email: [email protected] Right Sized Trees Let the expected misclassification rate of a tree T be R (T ).
Algorithms and Data Structures
Algorithms and Data Structures Part 2: Data Structures PD Dr. rer. nat. habil. Ralf-Peter Mundani Computation in Engineering (CiE) Summer Term 2016 Overview general linked lists stacks queues trees 2 2
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems
A Model-driven Approach to Predictive Non Functional Analysis of Component-based Systems Vincenzo Grassi Università di Roma Tor Vergata, Italy Raffaela Mirandola {vgrassi, mirandola}@info.uniroma2.it Abstract.
Analysis of Algorithms I: Optimal Binary Search Trees
Analysis of Algorithms I: Optimal Binary Search Trees Xi Chen Columbia University Given a set of n keys K = {k 1,..., k n } in sorted order: k 1 < k 2 < < k n we wish to build an optimal binary search
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Generating models of a matched formula with a polynomial delay
Generating models of a matched formula with a polynomial delay Petr Savicky Institute of Computer Science, Academy of Sciences of Czech Republic, Pod Vodárenskou Věží 2, 182 07 Praha 8, Czech Republic
Topology-based network security
Topology-based network security Tiit Pikma Supervised by Vitaly Skachek Research Seminar in Cryptography University of Tartu, Spring 2013 1 Introduction In both wired and wireless networks, there is the
FIN-40008 FINANCIAL INSTRUMENTS SPRING 2008
FIN-40008 FINANCIAL INSTRUMENTS SPRING 2008 Options These notes consider the way put and call options and the underlying can be combined to create hedges, spreads and combinations. We will consider the
Three Effective Top-Down Clustering Algorithms for Location Database Systems
Three Effective Top-Down Clustering Algorithms for Location Database Systems Kwang-Jo Lee and Sung-Bong Yang Department of Computer Science, Yonsei University, Seoul, Republic of Korea {kjlee5435, yang}@cs.yonsei.ac.kr
Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
Classification On The Clouds Using MapReduce
Classification On The Clouds Using MapReduce Simão Martins Instituto Superior Técnico Lisbon, Portugal [email protected] Cláudia Antunes Instituto Superior Técnico Lisbon, Portugal [email protected]
Fast Multipole Method for particle interactions: an open source parallel library component
Fast Multipole Method for particle interactions: an open source parallel library component F. A. Cruz 1,M.G.Knepley 2,andL.A.Barba 1 1 Department of Mathematics, University of Bristol, University Walk,
Parallel Scalable Algorithms- Performance Parameters
www.bsc.es Parallel Scalable Algorithms- Performance Parameters Vassil Alexandrov, ICREA - Barcelona Supercomputing Center, Spain Overview Sources of Overhead in Parallel Programs Performance Metrics for
Approximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
Chapter 14 Managing Operational Risks with Bayesian Networks
Chapter 14 Managing Operational Risks with Bayesian Networks Carol Alexander This chapter introduces Bayesian belief and decision networks as quantitative management tools for operational risks. Bayesian
Data quality in Accounting Information Systems
Data quality in Accounting Information Systems Comparing Several Data Mining Techniques Erjon Zoto Department of Statistics and Applied Informatics Faculty of Economy, University of Tirana Tirana, Albania
Analysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES
NEW VERSION OF DECISION SUPPORT SYSTEM FOR EVALUATING TAKEOVER BIDS IN PRIVATIZATION OF THE PUBLIC ENTERPRISES AND SERVICES Silvija Vlah Kristina Soric Visnja Vojvodic Rosenzweig Department of Mathematics
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics*
IE 680 Special Topics in Production Systems: Networks, Routing and Logistics* Rakesh Nagi Department of Industrial Engineering University at Buffalo (SUNY) *Lecture notes from Network Flows by Ahuja, Magnanti
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification
Performance Analysis of Naive Bayes and J48 Classification Algorithm for Data Classification Tina R. Patil, Mrs. S. S. Sherekar Sant Gadgebaba Amravati University, Amravati [email protected], [email protected]
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths
Single-Link Failure Detection in All-Optical Networks Using Monitoring Cycles and Paths Satyajeet S. Ahuja, Srinivasan Ramasubramanian, and Marwan Krunz Department of ECE, University of Arizona, Tucson,
Modeling Guidelines Manual
Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe [email protected] Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.
From Last Time: Remove (Delete) Operation
CSE 32 Lecture : More on Search Trees Today s Topics: Lazy Operations Run Time Analysis of Binary Search Tree Operations Balanced Search Trees AVL Trees and Rotations Covered in Chapter of the text From
Analysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
MAC Sublayer. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross
MAC Sublayer Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross Collision-Free Protocols v N Stations v Each programmed with a unique address: 0-(N-1). v Propagation
On the k-path cover problem for cacti
On the k-path cover problem for cacti Zemin Jin and Xueliang Li Center for Combinatorics and LPMC Nankai University Tianjin 300071, P.R. China [email protected], [email protected] Abstract In this paper we
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
Caching XML Data on Mobile Web Clients
Caching XML Data on Mobile Web Clients Stefan Böttcher, Adelhard Türling University of Paderborn, Faculty 5 (Computer Science, Electrical Engineering & Mathematics) Fürstenallee 11, D-33102 Paderborn,
Outline BST Operations Worst case Average case Balancing AVL Red-black B-trees. Binary Search Trees. Lecturer: Georgy Gimel farb
Binary Search Trees Lecturer: Georgy Gimel farb COMPSCI 220 Algorithms and Data Structures 1 / 27 1 Properties of Binary Search Trees 2 Basic BST operations The worst-case time complexity of BST operations
Lecture 4: Properties of stock options
Lecture 4: Properties of stock options Reading: J.C.Hull, Chapter 9 An European call option is an agreement between two parties giving the holder the right to buy a certain asset (e.g. one stock unit)
THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES
THE SEARCH FOR NATURAL DEFINABILITY IN THE TURING DEGREES ANDREW E.M. LEWIS 1. Introduction This will be a course on the Turing degrees. We shall assume very little background knowledge: familiarity with
EQ-BGP: an efficient inter-domain QoS routing protocol
EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland [email protected] Abstract
Distributed Dynamic Load Balancing for Iterative-Stencil Applications
Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,
Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models
Journal of Business Finance & Accounting, 30(9) & (10), Nov./Dec. 2003, 0306-686X Monitoring the Behaviour of Credit Card Holders with Graphical Chain Models ELENA STANGHELLINI* 1. INTRODUCTION Consumer
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology, Madras Lecture - 36 Location Problems In this lecture, we continue the discussion
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
Design and Implementation of Firewall Policy Advisor Tools
Design and Implementation of Firewall Policy Advisor Tools Ehab S. Al-Shaer and Hazem H. Hamed Multimedia Networking Research Laboratory School of Computer Science, Telecommunications and Information Systems
A Performance Comparison of Five Algorithms for Graph Isomorphism
A Performance Comparison of Five Algorithms for Graph Isomorphism P. Foggia, C.Sansone, M. Vento Dipartimento di Informatica e Sistemistica Via Claudio, 21 - I 80125 - Napoli, Italy {foggiapa, carlosan,
The drugs tracking system in Italy Brussels, 14th September
The drugs tracking system in Italy Brussels, 14th September Normative context From a European directive to a national initiative The Italian project for the creation of a Central Data Base tracking all
Risk Mitigation Strategies for Critical Infrastructures Based on Graph Centrality Analysis
Risk Mitigation Strategies for Critical Infrastructures Based on Graph Centrality Analysis George Stergiopoulos a, Panayiotis Kotzanikolaou b, Marianthi Theocharidou c, Dimitris Gritzalis a, a Information
Modeling Systems - External and Internal Behavior Models
Systematically Combining Specifications of Internal and External System Behavior Using Statecharts Martin Glinz Department of Informatics, University of Zurich Winterthurerstrasse 190 CH-8057 Zurich, Switzerland
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets
Data Quality Mining: Employing Classifiers for Assuring consistent Datasets Fabian Grüning Carl von Ossietzky Universität Oldenburg, Germany, [email protected] Abstract: Independent
How Asymmetry Helps Load Balancing
How Asymmetry Helps oad Balancing Berthold Vöcking nternational Computer Science nstitute Berkeley, CA 947041198 voecking@icsiberkeleyedu Abstract This paper deals with balls and bins processes related
http://www.jstor.org This content downloaded on Tue, 19 Feb 2013 17:28:43 PM All use subject to JSTOR Terms and Conditions
A Significance Test for Time Series Analysis Author(s): W. Allen Wallis and Geoffrey H. Moore Reviewed work(s): Source: Journal of the American Statistical Association, Vol. 36, No. 215 (Sep., 1941), pp.
Compression algorithm for Bayesian network modeling of binary systems
Compression algorithm for Bayesian network modeling of binary systems I. Tien & A. Der Kiureghian University of California, Berkeley ABSTRACT: A Bayesian network (BN) is a useful tool for analyzing the
Data Cleansing for Remote Battery System Monitoring
Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network
Find-The-Number. 1 Find-The-Number With Comps
Find-The-Number 1 Find-The-Number With Comps Consider the following two-person game, which we call Find-The-Number with Comps. Player A (for answerer) has a number x between 1 and 1000. Player Q (for questioner)
A Contribution to Expert Decision-based Virtual Product Development
A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,
KNOWLEDGE FACTORING USING NORMALIZATION THEORY
KNOWLEDGE FACTORING USING NORMALIZATION THEORY J. VANTHIENEN M. SNOECK Katholieke Universiteit Leuven Department of Applied Economic Sciences Dekenstraat 2, 3000 Leuven (Belgium) tel. (+32) 16 28 58 09
ER E P M A S S I CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5
S I N S UN I ER E P S I T VER M A TA S CONSTRUCTING A BINARY TREE EFFICIENTLYFROM ITS TRAVERSALS DEPARTMENT OF COMPUTER SCIENCE UNIVERSITY OF TAMPERE REPORT A-1998-5 UNIVERSITY OF TAMPERE DEPARTMENT OF
INTEGER PROGRAMMING. Integer Programming. Prototype example. BIP model. BIP models
Integer Programming INTEGER PROGRAMMING In many problems the decision variables must have integer values. Example: assign people, machines, and vehicles to activities in integer quantities. If this is
Concepts of Concurrent Computation
Chair of Software Engineering Concepts of Concurrent Computation Bertrand Meyer Sebastian Nanz Lecture 3: Synchronization Algorithms Today's lecture In this lecture you will learn about: the mutual exclusion
Fast Sequential Summation Algorithms Using Augmented Data Structures
Fast Sequential Summation Algorithms Using Augmented Data Structures Vadim Stadnik [email protected] Abstract This paper provides an introduction to the design of augmented data structures that offer
SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH
31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,
Solutions to Homework 6
Solutions to Homework 6 Debasish Das EECS Department, Northwestern University [email protected] 1 Problem 5.24 We want to find light spanning trees with certain special properties. Given is one example
Small Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
Basic Probability Concepts
page 1 Chapter 1 Basic Probability Concepts 1.1 Sample and Event Spaces 1.1.1 Sample Space A probabilistic (or statistical) experiment has the following characteristics: (a) the set of all possible outcomes
Settling Multiple Debts Efficiently: Problems
Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: [email protected] June 04 Abstract I present a series of
Simulation and Risk Analysis
Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic
Quality Ensuring Development of Software Processes
Quality Ensuring Development of Software Processes ALEXANDER FÖRSTER,GREGOR ENGELS Department of Computer Science University of Paderborn D-33095 Paderborn, Germany {alfo engels}@upb.de ABSTRACT: Software
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY
DEGREES OF CATEGORICITY AND THE HYPERARITHMETIC HIERARCHY BARBARA F. CSIMA, JOHANNA N. Y. FRANKLIN, AND RICHARD A. SHORE Abstract. We study arithmetic and hyperarithmetic degrees of categoricity. We extend
Chapter 13: Binary and Mixed-Integer Programming
Chapter 3: Binary and Mixed-Integer Programming The general branch and bound approach described in the previous chapter can be customized for special situations. This chapter addresses two special situations:
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS
PERFORMANCE STUDY AND SIMULATION OF AN ANYCAST PROTOCOL FOR WIRELESS MOBILE AD HOC NETWORKS Reza Azizi Engineering Department, Bojnourd Branch, Islamic Azad University, Bojnourd, Iran [email protected]
Mining Social Network Graphs
Mining Social Network Graphs Debapriyo Majumdar Data Mining Fall 2014 Indian Statistical Institute Kolkata November 13, 17, 2014 Social Network No introduc+on required Really? We s7ll need to understand
Traceability Data Integrity: Challenges and Solutions By Mitch DeCaire, Cogiscan, Inc.
Traceability Data Integrity: Challenges and Solutions By Mitch DeCaire, Cogiscan, Inc. The electronics manufacturing industry is experiencing increased demands for material traceability. Competitive pressures
How to Win the Stock Market Game
How to Win the Stock Market Game 1 Developing Short-Term Stock Trading Strategies by Vladimir Daragan PART 1 Table of Contents 1. Introduction 2. Comparison of trading strategies 3. Return per trade 4.
Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees
Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees M. M. Arslanov, S. B. Cooper, I. Sh. Kalimullin and M. I. Soskova Kazan State University, Russia University of Leeds, U.K. This paper
Lecture 9 - Message Authentication Codes
Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,
Gerry Hobbs, Department of Statistics, West Virginia University
Decision Trees as a Predictive Modeling Method Gerry Hobbs, Department of Statistics, West Virginia University Abstract Predictive modeling has become an important area of interest in tasks such as credit
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi
Project and Production Management Prof. Arun Kanda Department of Mechanical Engineering Indian Institute of Technology, Delhi Lecture - 9 Basic Scheduling with A-O-A Networks Today we are going to be talking
Information, Entropy, and Coding
Chapter 8 Information, Entropy, and Coding 8. The Need for Data Compression To motivate the material in this chapter, we first consider various data sources and some estimates for the amount of data associated
1 Introduction. 1.1 Three pillar approach
1 Introduction 1.1 Three pillar approach The recent years have shown that (financial) companies need to have a good management, a good business strategy, a good financial strength and a sound risk management
Treemaps with bounded aspect ratio
technische universiteit eindhoven Department of Mathematics and Computer Science Master s Thesis Treemaps with bounded aspect ratio by Vincent van der Weele Supervisor dr. B. Speckmann Eindhoven, July
Persistent Binary Search Trees
Persistent Binary Search Trees Datastructures, UvA. May 30, 2008 0440949, Andreas van Cranenburgh Abstract A persistent binary tree allows access to all previous versions of the tree. This paper presents
CS711008Z Algorithm Design and Analysis
CS711008Z Algorithm Design and Analysis Lecture 7 Binary heap, binomial heap, and Fibonacci heap 1 Dongbo Bu Institute of Computing Technology Chinese Academy of Sciences, Beijing, China 1 The slides were
Binary Coded Web Access Pattern Tree in Education Domain
Binary Coded Web Access Pattern Tree in Education Domain C. Gomathi P.G. Department of Computer Science Kongu Arts and Science College Erode-638-107, Tamil Nadu, India E-mail: [email protected] M. Moorthi
