Software Diversity for Information Security

Size: px
Start display at page:

Download "Software Diversity for Information Security"

Transcription

1 for Information Security Pei-yu Chen, Gaurav Kataria an Ramayya Krishnan,3 Heinz School, Tepper School an 3 Cylab Carnegie Mellon University Abstract: In this paper we analyze a software iversification-base strategy to achieve information security. The notion of using iversity to limit correlate risks is a wiely accepte strategy in many fiels. Various risk management approaches strive to minimize the variance of losses face by iniviuals by either risk pooling, as in insurance, or iversification, as in portfolio management. However, these approaches are avantageous only for risk-averse agents as the expecte loss remains unchange. Exploiting externalities unique to information systems, we show that iversification can not only reuce loss variance but also minimize expecte loss. We formulate the optimal amount of iversity investment by a firm taking into account both the negative network externalities accruing from attacks as well as positive network effects that accrue from uniformity an interoperability. Keywors: Computer security, Information security, Software security, Risk management

2 I. INTRODUCTION Network effects have been the riving force unerlying a firm s ecisions on technology aoption i.e. whether to aopt, what to aopt an when to aopt (Katz an Shapiro 985 an 986; Brynjolfsson an Kemerer, 996). In the case of software aoption, firms often fin it more valuable to aopt software which has large market share. By making a choice compatible to others firms enjoy positive network effects stemming from greater benefits of compatibility an interoperability both within an outsie the organization (Rohlfs 974). As a result, markets with network effects are usually tippy i.e. tipping in favor of one prouct (Farrell an Klemperer ). The rise of MS Winows as the most popular choice for esktop operating system can be mainly attribute to this very fact (Economies ). However, often ignore is the negative network externality associate with consuming popular software. This negative network externality has become increasingly important more recently as more an more security attacks take place, an at the same time, firms realize that their ability to stay secure is somehow epenent on the actions (e.g. patching) of others that use the same software. More specifically, a popular software may attract consierably more attacks ue to its high market share. An, by using popular software to interconnect with many partners, firms risk being attacke an affecte by the breaches at their partners (Kunreuther an Heal 3). Therefore, by joining a larger network (e.g., sharing a software with more users) a firm may face higher risk. This observation has lately gaine more traction since the recent string of some fairly evastating worms like MS-Blaster (CERT CA-3-) an Sasser (Symantec 4). These worms have exploite the vulnerabilities present in Microsoft Winows operating system to propagate from computer to computer, eventually targeting most of the unpatche machines connecte to Internet. Unfortunately, this meant most of all the worl s machines were affecte ue to the fact that over 9% of all client-sie computers use Microsoft Winows (Geer et al. 4). Whether the lower quality of Microsoft Winows Accoring to market researcher OneStat.com, Winows now controls percent of the global esktop operating system market, compare to just.43 percent for Apple Macintosh an.6 percent for Linux.

3 or the size of Microsoft s market share is the cause for large numbers of attacks against it is unknown. Some observers have cite economies of scale as the main reason why most attackers choose to attack Winows machines (Honeynet Project 4, Symantec 4). It may be that in consiering positive network externalities alone an isregaring negative externalities firms have over investe in homogeneous systems. Some observers have even argue that this has le to market failure in the case of OS market (Geer et al. 4). In this research we aim to aress the following research questions: Can a firm benefit from investing in a ifferent IT infrastructure than other firms it oes business with? Can a firm benefit from maintaining a iversity of systems? Can society benefit from such iversity? What is the social cost of lacking iversity? An what is the optimal level of iversity at the firm an society level? We show that iversification not only reuces loss variance but also minimizes expecte loss. We also provie a framework for etermining optimal iversification strategy for a firm. In section II, we formulate the problem of a firm that nees to purchase software as a buget constraine ecision problem. In sections III an IV, we iscuss the benefit of homogeneity an reuction in expecte loss via iversity, respectively. In section V, we iscuss the optimal iversification strategy taking into account both the positive an negative externalities. Finally, we conclue by iscussing our results an escribing our larger research agena to incorporate the role of inustry, government an market forces for achieving socially optimal software iversity. II. IT BUDGET Expeniture on IT is a buget constraine problem that takes into account switching cost, training, migration, interoperability, an integration (Figure ). Security is a newly 3

4 emerging an increasingly important constraint in the IT buget allocation process. When selecting its software, a firm ecies how much uniformity it wants with the external worl an to what extent it is willing to stay istant (or iverse). We aopt the terminology of homogeneity (or iversity) to inicate on a scale of to the extent to which a firm is similar (or issimilar) in its choice of software with the rest of the worl. By staying homogeneous internally an externally it expects greater benefits of interoperability while risking catastrophic consequences via simultaneous failure of all its systems as has been the case with some recent worms 3. Figure : A firm has to choose between homogeneity an iversity with Interoperability an Security being the primary traeoff. We consier firm technology acquisition strategy, i.e., whether they shoul acquire technology of the same type to ensure maximum interoperability or they shoul mix- A Worlwie Stuy Conucte by CIO Magazine an PricewaterhouseCoopers in 3 sai Looking ahea to 4, security will become more strategic as companies invest greater resources in eveloping strategy, efining architecture an risk assessment. 3 More than half of Korea s Internet backbone went own uring SQL Slammer worm just ue to enial of service (DOS) problem. 4

5 an-match ifferent technologies to reuce security loss. The strategic ecision variable is the level of iversity, with interoperability an security risk as the main traeoff. Other factors that can potentially impact the level of iversity are switching cost when firms have installe base from incumbent software. Without loss of generality, in our analysis we consier a firms software environment to consist of two technologies an incumbent technology an a competing technology. The firm may choose to have x proportion of its systems on incumbent software, while having the remaining -x on the competing software. Then, assuming a risk-neutral firm, the net utility erive can be written as follows: E[U(x )] = Benefit(x ) E[Loss(x )] () Where, Loss is stochastic an benefit is eterministic. Within this framework we iscuss benefits of homogeneity in Section III an benefits of iversity in Section IV. III. BENEFIT OF HOMOGENEITY The avantages realize by compatibility an integration have been iscusse in the IS an stanarization literature (Klemperer 987, Varian an Shapiro 999). In choosing software that has large market share, a firm ensures easy connectivity with its partners an suppliers, while at the same time, having all its internal systems operating on ientical software ensures seamless interconnectivity. The avantages of such a setup have been wiely iscusse in ata warehousing an process integration literature (IBM 4). 5

6 Figure : A firm s software choice affects its connectivity both internally an externally. The benefit of homogeneity is primarily the benefit of interconnectivity. In a stanarize environment this benefit shoul be inepenent of x, the level of iversity in a firm. Unfortunately, software interfaces toay are not stanarize, which means that having software from same venor on all computers provies an extra benefit to the firms. Benefit(of having a combination) = Where, K S [( xn ) + ( xn) + xn * M * E + xn *( M )* E] K S = Stanarization coefficient The stanarization coefficient is a scaling factor to enote the benefit of interconnection of two computers running same software platform. Some stanars o exist toay (e.g. SOAP an XML), however ue to many proprietary extensions an interfaces the full benefit of interconnection is not fully realize. The other variables in () are as follows: N = Number of computers in the firm x = Proportion of computers running incumbent software x = (-x ): Proportion of computers running the alternative software () 6

7 M = Market Share of software ; (-M) = Market Share of software E = Number of external computer that the firm may connect to Solving () for optimal software choice gives a binary outcome: a firm woul choose all software if it has greater market share, an if software has greater market share then it woul choose all software, other things being equal, as shown in figure 3 below. We note that in absence of negative externalities a firm woul prefer to invest only in the incumbent software (Farrell an Saloner, 985). May be this is the reason why society toay is over-investe in Winows. In the following section we iscuss the negative network externalities an show that reuction in losses via iversity can possibly compensate for the positive network effects with homogeneity. Optimal Diversity (X) Market share of software Figure 3: Firms prefers all software when market share of is over 5%, when market share of increases above 5% it prefers all software. IV. LOSS REDUCTION VIA DIVERSITY By virtue of always being connecte an tightly integrate in online business processes, it is wiely accepte toay that firms receive numerous attacks on their systems. Even without counting targete attacks the baseline rate of stray virus/worm type of attacks on corporate networks is consierably high (CSI/FBI Survey 4). There is no oubt that 7

8 even after following best practices, systems fall prey to online attacks on a aily basis. Accepting this harsh reality most firms have measures in place to tackle these incients. Some information security risk management frameworks have been propose to better unerstan an tackle this problem (Hoo, Butler 3). Soo Hoo s approach focuses on Annualize Loss Expectancy (ALE) to choose between security measures, while Butler s approach is more qualitative an base on one-to-one interviews with the management to etermine the relative risks of possible outcomes an effectiveness of the risk mitigation approaches. A CMU-LBNL joint stuy on information security risk quantization states time-to-respon to an incient as the measure of loss incurre (Arora et al. 4). Recognizing that in aition to scale of the incient, ifferent type of incients require ifferent attention, they efine time to respon as a combination measure of various efforts incluing iagnostic, repair, legal, public relations, an manatory reporting; each of which is require in varying proportion to tackle ifferent incients. For instance, a virus attack may require no more than isk scanning an cleaning, while graffiti on the company s webpage is a public relations nightmare. Firms employ resources to tackle these scenarios which occur on a aily basis. In our research we moel the capability of the firm to respon to such scenarios as a fixe an limite resource. On the other han, the scale of the incients varies consierably on a aily basis. In this paper, we consier the number of computers affecte by a worm(s) outbreak on a ay, as a measure of the seriousness of the incient. In this case the contingency operation of the limite-resource IT epartment involves patching, backup an/or rebuiling systems. It is perhaps reasonable to assume that the loss to a firm ue to computers being affecte grows more than linearly to the number of computers affecte. Consier the following situation where the loss to the firm may be capture by the total waiting time (or owntime) to bring all the computers back up. If we assume that the IT epartment services the affecte computers in a sequential manner, then the organization faces lost prouctivity not only for the computer that is currently being service but also for all the other affecte computers that are waiting in some sort of queue for being service by the IT epartment. Therefore, the amage cause to the firm when y of its computers is affecte in a worm outbreak is of the form: 8

9 L ( y) = ky (3) Where, y is normalize such that it varies from zero to infinity. By this simple analysis we are trying to epict the loss to an organization as a function of y, the scale of incient (Figure 4). Even though this may not be the most accurate epiction of the loss function, it highlights the non-linear relationship between the loss accrue an the scale of the attack. The important point being that simple attacks are hanle with little or no effort (e.g. blocking ports by properly configuring the firewall) while the bigger incients require much extensive effort an owntime. The total service time increases rapily with increasing scale of attack. Figure 4: A convex loss function epicting the rapily rising service effort with increasing scale of incient. Because we know that the proportion of computers affecte on a ay is not fixe, it is instea likely to have a istribution where minor incients happen more frequently an major ones are not so frequent. A minor incient from the perspective of the firm is when just a few computers are affecte an a major incient is when a large percentage of computers are own. This assertion is not without factual support. Numerous websites 9

10 report vulnerability statistics which show that now-obsolete attacks are still being observe in large numbers an outate viruses are still in circulation 4. On the other han, once every few months we see a major worm which successfully exploits large number of computers worlwie (MS Blaster, Sasser, Coe Re, Nima etc). The LBNL- CMU stuy an Butler s interviews with security managers offer ata to support these statements (Arora 4, Butler 3). Base on these observations we moel the probability ensity function for the scale of incient as an exponential istribution, f ( y) Where, β y / β = e (4) y = number of computers affecte on a ay (Normalize to vary between zero an infinity) β = mean number of computers affecte on a ay The average number of computers affecte, β, may epen on many factors incluing, type of software service, type of inustry, inherent security level of software prouct, market share an/or sentiment against the software prouct etc. However, as shown in Table, Winows which has over 9% market share in client-sie operating system market receives 9.6% of attacks at ten most attacke ports. At the same time, the number of vulnerabilities iscovere in Winows outnumbers all other operating systems. Market share thus appears to have consierable influence on the attacks. 4 Symantec, CERT, ISC SANS etc report that many obsolete viruses an variant of alreay patche worms appear frequently.

11 Figure 5: Exponential pf of computers affecte with mean = β. On a given ay, it is more likely that fewer computers are affecte; the likeliness ecreases as the scale of incient increases.

12 Table : Top Ten Most Attacke Ports Accoring to SANS Institute Internet Storm Center Average number of source IP attacking Port/ this port Primary Protocol Service /7-/4 Target OS Vulnerability Relate Information 445/ tcp,up 35/ tcp,up 39/ tcp,up 3756 Winows epmap 598 Winows microsofts netbiosssn 5964 Winows 5/tcp RPC 645 Winows 6/up 53/ tcp,up PopUp Messenge 5645 Winows ns 3899 Linux/Unix 8/tcp http /tcp MS-SQL /up PopUp Messenge Winows an Linux MS-SQL Server 3957 Winows 37/up netbios-ns 479 Winows CA-3-9: Exploitation of Vulnerabilities in Microsoft RPC Interface CA-3-: W3/Blaster worm CA-3-3: RPCSS Vulnerabilities in Microsoft Winows CA-3-9: Exploitation of Vulnerabilities in Microsoft RPC Interface CA-3-: W3/Blaster worm Current Activity 8/8/3: W3/Welchia Worm CA-3-3: Buffer Overflow in Winows Locator Service CA-3-9: Exploitation of Vulnerabilities in Microsoft RPC Interface CA-3-: W3/Blaster worm CA-3-3: RPCSS Vulnerabilities in Microsoft Winows Currently inboun scans are likely RPC an LSA exploit attempts against the Winows Source: Data compile from Internet Storm Center at SANS an US-CERT. Percentage attacking winows: 755 / 8764 = 9.6% Typically inboun traffic to this port is Messenger Spam CA--3: Multiple Vulnerabilities in BIND CA--7: Apache/mo_ssl Worm CA--33: Heap Overflow Vulnerability in Microsoft Data Access Components (MDAC) CA-3-9: Buffer Overflow in Core Microsoft Winows DLL Current Activity 8/8/3: W3/Welchia Worm Inboun scans are typically looking for Microsoft SQL Server installations with weak passwor protection an if successful are looking to steal or corrupt ata or use some features with SQL Server to compromise the host system. Typically inboun traffic to this port is Messenger Spam CA-3-8: Increase Activity Targeting Winows Shares CA-3-3: RPCSS Vulnerabilities in Microsoft Winows

13 Now, given the loss function an the pf of scale of incient, we can calculate the expecte loss to a firm. E( loss) = = k = k * β y e β L( y) f ( y) y y / β y (5) Without loss of generality we assume k =/ for rest of the analysis. IV. Diversity As A Means To Security We have shown earlier that consiering compatibility alone leas to homogeneity. However, homogeneity may also lea to higher security risk (Kunreuther an Heal, ; Geer et al, 4). In this section, we woul like to examine whether iversity can be an effective way to achieve higher security level, an how much iversity is neee in orer to reuce expecte loss ue to security threats. Consier, the firm ecies to iversify its software use in orer to reuce the chances of simultaneous failure of many computers; it may o so by keeping x proportion of its computers on the incumbent software while switching to a competing prouct for the remaining (-x ) portion. In orer to etermine the expecte loss when a firm ecies to use a combination of software, we nee to calculate the pf of total number of computers affecte which in this case is the combination of two ranom variables, y = x + (6) y x y Where, y = total computers affecte by attacks on both types of software platforms x y = total computers affecte by attacks on incumbent software 3

14 x y = total computers affecte by attacks on competing software; x = - x If both the software proucts/platforms are nearly ientical except that bugs in one are inepenent of other, then we can assume that β = β, which implies that the pf of y is f y / β ( x ) y / βx ) = ( e e ) (7) β( x ) ( y Continuing further we calculate the expecte loss, as E( loss) = L( y = β ( + x x ) ) f ( y ) y (8) Minimizing the expecte loss with respect to x, we get the minimum value as.75β for x =.5. This result is not surprising as we assume the two proucts to have equal β. However, since we normally observe the proucts are not ientical in their characteristics, the number an intensity of attacks face by two proucts is usually ifferent leaing to ifferent values for β. Therefore we next assume that, β = β while β = m*β Where, m = is a function of all the factors that cause severity or number of attacks against a prouct to increase, possibly its larger market share. Iniviually the probability ensity for y an y can be given by, f ( y ) β y / β y / mβ = e an f ( y ) = e (9) mβ The pf of the y can be calculate as 4

15 f ) = y / mβ ( x ) y / βx ( e e ) β( m( x ) x ) () ( y Now calculating the expecte loss as we i before in the case of no iversity, E( loss) = L( y = β [ m ( x ) ) f ( y + x ) y + mx ( x )] ().5 E(loss).5.5 m=.5 m=.75 m=. m= X Figure 6: Normalize Expecte loss as a function of x for four ifferent values of m. E.g. when two proucts are almost ientical then E(loss) is minimum at x =x =.5 Differentiating E(loss) with respect to x, we see that the minimum loss is realize when, m m x = () ( m m + ) As an illustration, when m =.9 (i.e. when prouct on average receives % fewer computer casualties than prouct ), then the optimal amount of iversity is x =.396. This means that prouct which is superior in its security shoul be use for 6% of the computers. Another interesting observation from this analysis is that iversity is effective 5

16 in reucing expecte security loss when the ratios of the security levels of non-incumbent software to incumbent software is between.5 to (as shown in Figure 6). That is, even though the non-incumbent software is not as secure as the incumbent software, a firm may still benefit from acquiring non-incumbent software for a small set of its machines. The optimal amount of iversity i.e. x (=-x ) is plotte against m in Figure 7.. Optimal Diversity (X) m: an inicator of higher attacks (possibly market share) Figure 7: Optimal amount of iversity as a function of relative security m; higher m implies that software receives more attacks vis-à-vis software. It may also be interesting to consier the impact of iversity on the variance of loss, given that a small variance is generally preferre to a large variance. Therefore, extening the above analysis to account for the variance of the loss we have, V ( loss) = E( loss = L ( y ) f ( y ) E ) y ( loss) L( y ) f ( y ) y ( m ( x) x ) ( m ( x ) + x ) = 6β β (3) m( x) + x m( x ) + x 4 =.88β evaluate at [ m =.9, x =.396] As compare to variance of loss when only software is use given by, 6

17 V ( loss) = E( loss = 4 4 = 6β β 4 = 5β ) E L ( y) f ( y) y ( loss) L( y) f ( y) y (4) Thus, in aition to the reuction in expecte loss firms also see a five fol reuction in their variance when they switch 6% of their system from an incumbent to a competitor which is % safer. V. OPTIMAL DIVERSITY Prior literature on technology an software aoption has consiere only positive network externalities an has not taken negative network externalities into account. However, recent inustry reports (Geer et al. 3) suggest that negative network externalities exist an take the form of a higher security risk associate with consuming a popular software. This paper is, to the best of our knowlege, the first attempt to analyze security risks an iversification strategies using the lens of positive an negative network externalities. We offer a way to quantify the benefits of iversity an show that iversity can be an effective way to reuce security risk by reucing expecte loss an variance of loss. There are a number of extensions we are working on as part of future work. For instance, if firms make choices as escribe in our paper, we recognize that market shares of the incumbent an competing software will change an thereby alter their market shares. This calls for an analysis of equilibrium behavior an we are pursuing this within a fulfille expectations framework (Katz an Shapiro 985). The goal of this optimization strategy is to maximize the overall utility realize by the firm. Without more concrete ata we cannot precisely estimate the exact amount of iversity require. However, we believe that more careful examination of ata can give reliable estimates for the parameters of our moel. In the following section we iscuss 7

18 our larger research agena an escribe how we plan to precisely estimate those parameters. VI. DISCUSSION AND CONLCUSION Recent ata from our honeynet sensor gri reveals that the average life expectancy to compromise an unpatche Linux system is 3 months..ata from the Symantec Deepsight Threat Management System inicates a vulnerable Win3 system has life expectancy not measure in months, but merely hours. -Honeynet Project: Tren Analysis Dec 4. Winows has long been the popular choice for esktop computing, but as more alternatives emerge e.g. Linux an Mac OS X, firms may prefer some lack of interconnectivity for reuction in security losses. However, some questions still remain: is maximization of utility a corner solution in favor of homogeneity as has been the case in the past? Can a society benefit from iversity? What s the social cost of lacking iversity? In our research we aim to estimate the optimal level of iversity for both an iniviual firm as well as for society. In this paper, we have presente a novel framework to incorporate the benefits of both homogeneity an iversity in software omain. Specifically, we have shown that epening on the characteristics of the firm, inustry in general, an type of software, ifferent levels of iversity may be optimal. We are now intereste in aressing some of the important questions like: shoul large firms prefer more iversity as compare to small firms, shoul government manate stanarization an shoul government subsiize evelopment of competing software. We hope to answer these questions by builing a more accurate moel for lost prouctivity as a function of scale of incient, an estimating the same using the call center ata from CMU computing services. 8

19 REFERENCES Arora, A., D. Hall, C. A. Pinto, D. Ramsey an R. Telang (4). Measuring the Risk- Base Value of IT Security Solutions, IEEE IT Professional Magazine, 6(6): Brynjolfsson, E. an C. Kemerer (996). Network Externalities in Microcomputer Software: An Econometric Analysis of the Spreasheet Market, Management Science, 4(): Butler, S. (). Security Attribute Evaluation Metho: A Cost Benefit Approach, International Conference on Software Engineering (ICSE ). Cert (3). CERT Avisory CA-3- W3/Blaster Worm, CSI/FBI (4). Ninth Annual- Computer Crime an Security Survey. Economies, N. (). The Microsoft Antitrust Case, Journal of Inustry, Competition an Trae: From Theory to Policy, (): Farrell, J. an G. Saloner (985). Stanarization, compatibility an Innovation, Ran Journal of Economics, 6: Farrell, J. an P. Klemperer (). Coorination an Lock-in: Competition with Switching Costs an Network Effects, in M. Armstrong an R. Porter, es., Hanbook of Inustrial Organization, vol. 3. Geer, D., R. Bace, P. Gutmann, P. Metzger, C. Pfleeger, J. Quarterman, B. Schneier (3). CyberInsecurity: The Cost of Monopoly How the Dominance of Microsoft's Proucts Poses a Risk to Security, Honeynet Project (4). Know Your Enemy: Trens, Hoo, K.S. (). How much is enough? A Risk Management Approach to Computer Security, Workshop on Economics an Information Security, University of California, Berkeley. IBM Inc. (4). IBM e-business Technology, Solution, an Design Overview, IBM Rebooks, Katz, M. L. an C. Shapiro (985). Network Externalities, Competition, an Compatibility, American Economic Review, 75(3):

20 Katz, M. L. an C. Shapiro (986). Technology Aoption in the Presence of Network Externalities, Journal of Political Economy, 94(4): Klemperer, P. (987). Markets with Consumer Switching Costs, The Quarterly Journal of Economics, MIT Press, (): Kunreuther, H. an G. Heal (3). Interepenent Security, Journal of Risk an Uncertainty, Kluwer Acaemic Publishers, 6(): Rohlfs, J. (974). A Theory of Interepenent Deman for a Communications Service, Bell Journal of Economics, 5(): Shapiro, C. an H. Varian (999). Information Rules: A Strategic Guie to the Network Economy, Boston: Harvar University Press. Symantec Inc. (4). Symantec's Internet Security Threat Report, Volume VI, September 4.

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Innovation Union means: More jobs, improved lives, better society

Innovation Union means: More jobs, improved lives, better society The project follows the Lisbon an Gothenburg Agenas, an supports the EU 2020 Strategy, in particular SMART Growth an the Innovation Union: Innovation Union means: More jobs, improve lives, better society

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

Aon Retiree Health Exchange

Aon Retiree Health Exchange 2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability

Dow Jones Sustainability Group Index: A Global Benchmark for Corporate Sustainability www.corporate-env-strategy.com Sustainability Inex Dow Jones Sustainability Group Inex: A Global Benchmark for Corporate Sustainability Ivo Knoepfel Increasingly investors are iversifying their portfolios

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Improving Direct Marketing Profitability with Neural Networks

Improving Direct Marketing Profitability with Neural Networks Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis. The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the

More information

At School & On-Line: Helping Students Avoid Security Threats on the Internet

At School & On-Line: Helping Students Avoid Security Threats on the Internet At School & On-Line: Helping Stuents Avoi Security Threats on the Internet Insert picture in this frame Insert picture in this frame Presentation by Richar K. Avery, CPP Presient, New Englan Region Securitas

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars September 2008 / Issue 21 A legal upate from Dechert s Financial Services Group SEC Issues Propose Guiance to Fun Boars Relating to Best Execution an Soft Dollars The Securities an Exchange Commission

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Dynamic Network Security Deployment Under Partial Information

Dynamic Network Security Deployment Under Partial Information Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College

More information

Owner s Manual. TP--WEM01 Performance Series AC/HP Wi-- Fi Thermostat Carrier Côr Thermostat TABLE OF CONTENTS

Owner s Manual. TP--WEM01 Performance Series AC/HP Wi-- Fi Thermostat Carrier Côr Thermostat TABLE OF CONTENTS TP--WEM01 Performance Series AC/HP Wi-- Fi Thermostat Carrier Côr Thermostat Fig. 1 - Carrier Côrt Thermostat TABLE OF CONTENTS Owner s Manual A14493 PAGE OVERVIEW... 2 Your Carrier Côrt Thermostat...

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

Weiyong Zhang Operations and Management Science Department Carlson School of Management University of Minnesota wzhang@csom.umn.

Weiyong Zhang Operations and Management Science Department Carlson School of Management University of Minnesota wzhang@csom.umn. Harnessing Network Externalities for Better E-Commerce: A Review of Winners, Losers and Microsoft: Competition and Antitrust in High Technology (by Stanley Liebowitz and Stephen Margolis, Oakland, CA:

More information

Qualified Annuity Claimant s Statement

Qualified Annuity Claimant s Statement Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight

More information

Linking ICT related Innovation. Adoption and Productivity: results from micro-aggregated versus firm-level data

Linking ICT related Innovation. Adoption and Productivity: results from micro-aggregated versus firm-level data 08 09 0 Linking ICT relate Innovation Aoption an Prouctivity: results from micro-aggregate versus firm-level ata 4 5 Explanation of symbols. ata not available * provisional figure ** revise provisional

More information

y or f (x) to determine their nature.

y or f (x) to determine their nature. Level C5 of challenge: D C5 Fining stationar points of cubic functions functions Mathematical goals Starting points Materials require Time neee To enable learners to: fin the stationar points of a cubic

More information

Hybrid Model Predictive Control Applied to Production-Inventory Systems

Hybrid Model Predictive Control Applied to Production-Inventory Systems Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES

A MULTI-CRITERIA EVALUATION OF INFORMATION SECURITY CONTROLS USING BOOLEAN FEATURES A MUTI-CRITERIA EVAUATION OF INFORMATION SECURITY CONTROS USING BOOEAN FEATURES Angel R. Otero 1, Carlos E. Otero 2 an Abrar Qureshi 2 1 Grauate School of Computer an Information Sciences, Nova Southeastern

More information

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management

The Impact of Forecasting Methods on Bullwhip Effect in Supply Chain Management The Imact of Forecasting Methos on Bullwhi Effect in Suly Chain Management HX Sun, YT Ren Deartment of Inustrial an Systems Engineering, National University of Singaore, Singaore Schoo of Mechanical an

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Sustainability Through the Market: Making Markets Work for Everyone q

Sustainability Through the Market: Making Markets Work for Everyone q www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of

More information

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László

More information

Nonparametric Estimation of State-Price Densities Implicit in Financial Asset Prices

Nonparametric Estimation of State-Price Densities Implicit in Financial Asset Prices THE JOURNAL OF FINANCE VOL LIII, NO. 2 APRIL 1998 Nonparametric Estimation of State-Price Densities Implicit in Financial Asset Prices YACINE AÏT-SAHALIA an ANDREW W. LO* ABSTRACT Implicit in the prices

More information

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski

More information

EU Water Framework Directive vs. Integrated Water Resources Management: The Seven Mismatches

EU Water Framework Directive vs. Integrated Water Resources Management: The Seven Mismatches Water Resources Development, Vol. 20, No. 4, 565±575, December 2004 EU Water Framework Directive vs. Integrate Water Resources Management: The Seven Mismatches MUHAMMAD MIZANUR RAHAMAN, OLLI VARIS & TOMMI

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1.

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Di usion on Social Networks Matthew O. Jackson y Caltech Leeat Yariv z Caltech Current Version: June 6, 2006 Appeare in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Abstract. We analyze a moel of i

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

The influence of anti-viral drug therapy on the evolution of HIV-1 pathogens

The influence of anti-viral drug therapy on the evolution of HIV-1 pathogens DIMACS Series in Discrete Mathematics an Theoretical Computer Science Volume 7, 26 The influence of anti-viral rug therapy on the evolution of HIV- pathogens Zhilan Feng an Libin Rong Abstract. An age-structure

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Liquidity and Corporate Debt Market Timing

Liquidity and Corporate Debt Market Timing Liquiity an Corporate Debt Market Timing Marina Balboa Faculty of Economics University of Alicante Phone: +34 965903621 Fax: +34 965903621 marina.balboa@ua.es Belén Nieto (Corresponing author) Faculty

More information

Chapter 4: Elasticity

Chapter 4: Elasticity Chapter : Elasticity Elasticity of eman: It measures the responsiveness of quantity emane (or eman) with respect to changes in its own price (or income or the price of some other commoity). Why is Elasticity

More information

Non Qualified Annuity Claimant s Statement

Non Qualified Annuity Claimant s Statement Non Qualifie Annuity Claimant s Statement The Lincoln National Life Insurance Company Service Office P.O. Box 7880 Fort Wayne, IN 46801-7880 Phone: 800-454-6265, Ext.*8200 www.lincolnfinancial.com Overnight

More information

Bond Calculator. Spreads (G-spread, T-spread) References and Contact details

Bond Calculator. Spreads (G-spread, T-spread) References and Contact details Cbons.Ru Lt. irogovskaya nab., 21, St. etersburg hone: +7 (812) 336-97-21 http://www.cbons-group.com Bon Calculator Bon calculator is esigne to calculate analytical parameters use in assessment of bons.

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water 5 Isotope effects on vibrational relaxation an hyrogen-bon ynamics in water Pump probe experiments HDO issolve in liqui H O show the spectral ynamics an the vibrational relaxation of the OD stretch vibration.

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization

Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization Stochastic Planning for Content Delivery: Unveiling the Benefits of Network Functions Virtualization Michele Mangili, Fabio Martignon an Antonio Capone LRI, Université Paris-Su {michele.mangili, fabio.martignon}@lri.fr

More information

Characterizing the Influence of Domain Expertise on Web Search Behavior

Characterizing the Influence of Domain Expertise on Web Search Behavior Characterizing the Influence of Domain Expertise on Web Search Behavior Ryen W. White Microsoft Research One Microsoft Way Remon, WA 98052 ryenw@microsoft.com Susan T. Dumais Microsoft Research One Microsoft

More information

ACC 626: Research Paper. Website Integrity. Jeannie Wu

ACC 626: Research Paper. Website Integrity. Jeannie Wu ACC 626: Research Paper Website Integrity Jeannie Wu July 1, Introuction Most companies toay have a, either because they are engage in e-commerce activities, or because it is an effective tool to provie

More information

Factor Prices and International Trade: A Unifying Perspective

Factor Prices and International Trade: A Unifying Perspective Factor Prices an International Trae: A Unifying Perspective Ariel Burstein UCLA an NBER Jonathan Vogel Columbia an NBER October 20 Abstract How o trae liberalizations a ect relative factor prices an to

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

CALCULATION INSTRUCTIONS

CALCULATION INSTRUCTIONS Energy Saving Guarantee Contract ppenix 8 CLCULTION INSTRUCTIONS Calculation Instructions for the Determination of the Energy Costs aseline, the nnual mounts of Savings an the Remuneration 1 asics ll prices

More information

econstor zbw www.econstor.eu

econstor zbw www.econstor.eu econstor www.econstor.eu Der Open-Access-Publikationsserver er ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Publication Server of the ZBW Leibniz Information Centre for Economics Qu, Zhan;

More information