S., Cryptographic Key Agreement for Mobile Radio,

Size: px
Start display at page:

Download "S., Cryptographic Key Agreement for Mobile Radio,"

Transcription

1 DIGITAL SIGNAL PROCESSING 6, (1996) ARTICLE NO Cryptgraphic Key Agreement fr Mbile Radi Amer A. Hassan,* Wayne E. Stark, Jhn E. Hershey, and Sandeep Chennakeshu* *Ericssn Mbile Cmmunicatins Inc., 1 Triangle Drive, Research Triangle Park, Nrth Carlina 27709; EECS Department, The University f Michigan, Ann Arbr, Michigan 48109; and GE Crprate R&D, 1 River Rad, Schenectady, New Yrk Hassan, A. A., Stark, W. E., Hershey, J. E., and Chennakeshu, S., Cryptgraphic Key Agreement fr Mbile Radi, Digital Signal Prcessing 6 (1996), The prblem f establishing a mutually held secret cryptgraphic key using a radi channel is addressed. The perfrmance f a particular key distributin system is evaluated fr a practical mbile radi cmmunicatins system. The perfrmance measure taken is prbabilistic, and different frm the Shannn measure f perfect secrecy. In particular, it is shwn that by using a channel decder, the prbability f tw users establishing a secret key is clse t ne, while the prbability f an adversary generating the same key is clse t zer. The number f pssible keys is large enugh that exhaustive search is impractical. I. INTRODUCTION r 1996 Academic Press, Inc. The need fr secure data cmmunicatins in mbile systems is apparent. A brker r a banker might need t relay sensitive data t a selected custmer thrugh the radi channel. In ne-key cryptgraphic techniques, such as DES [1], a cmmn secret key is needed between such tw users. Key distributin and prtectin is an extremely imprtant aspect f secure cmmunicatins systems. Hwever, it is nt unlikely that the tw users d nt share a cmmn secret key a priri, but need t use a secure channel. In the case where tw users d nt share a cmmn key it is pssible t use tw-key public key cryptgraphy (PKC) such as described in [2]. As an explratin f an alternative t PKC, a technique prpsed in [3] demnstrated that characteristics f the radi channel might be used t the same effect. These characteristics are the cnfirmed shrt term reciprcity f the channel and the rapid spatial decrrelatin f phase in the radi channel; that is, fr an incrementally shrt perid f time, the impulse respnse f a channel viewed frm the antenna frm A t the antenna fr B is the same as the impulse respnse f the channel viewed frm B t A, excluding thermal nise. In this paper the perfrmance f the key management technique that was prpsed in [3] is evaluated fr the purpse f practical implementatin. In additin t prviding anther paradigm fr establishing a mutually held secret variable ver a public channel, the methd addressed in this paper is further mtivated by the fllwing cnsideratin. The ppular PKC algrithms are unprvably secure. The cmplexity f cmputatin fr cnventinal PKC schemes and the amunt f infrmatin that must be exchanged can be quite severe. As new attacks against the PKC systems are uncvered, these systems have retreated t ever lnger exchange vectrs and ever mre cmplex cmputatins. The technique addressed in this paper is a practical alternate mechanism fr cryptvariable establishment and sharing. The mechanism fr secrecy in this scheme depends upn a physical prcess, and the cryptvariable can be established with cmputatins equivalent t a bunded distance decding algrithm. Thus, the decder we use t establish the cryptgraphic variable may als be used fr prcessing the subsequent data transmissin. Als a cnventinal PKC system requires a (pseud) randm quantity t be generated by each party. With the prpsed system there is n need t d this, as the randmness is prvided by the nn-time statinarity and nnspatial statinarity f the channel itself. Wyner [5] and Ozarw and Wyner [6] explit the channel fr secret cmmunicatins but in a cm /96 $18.00 Cpyright r 1996 by Academic Press, Inc. All rights f reprductin in any frm reserved. 207

2 as prbabilistic secrecy. Als, the number f pssible keys is large enugh that exhaustive search is impractical, this will be referred t as cmputatinal secrecy. The paper is rganized as fllws. The system mdel and the key distributin technique are addressed in Sectin II. The perfrmance f the prpsed technique is analyzed in Sectin III; there, numerical results using Glay cding are evaluated. In Sectin IV we draw cnclusins. II. SYSTEM MODEL FIG. 1. A blck diagram shwing the system cnsidered with tw different time varying channels; n i (t), i 5 1, 2, 3, represent thermal nise. The impulse respnse f channel AB is the same as the impulse respnse f channel BA, but it is different frm that f channel AE r BE. pletely different setting. Their results are existence prfs; in particular, it was shwn that fr given nisy channels (ne fr the cmmunicatrs and ne fr an eavesdrpper) there exists a rate belw which perfect secrecy is pssible. This assumes the eavesdrpper has a nisier channel than the cmmunicatrs channel. In [7] the authr has an interesting verview f cryptgraphic key agreement schemes that use the channel in different ways. In mst f these schemes the tw parties initially share a shrt secret key; the wrk in [7], hwever, relaxes this assumptin and addresses the prblem f generating a shared secret key by tw users each knwing a randm variable and the tw randm variables being dependent. A prtcl is described t establish a cmmn secret key and which uses a nisy channel. Hwever, this prtcl is cmpletely impractical when the eavesdrpper s channel is much better than the cmmunicatrs. The scheme described in this paper is cmputatinally secure even when the eavesdrpper has a substantially better channel than the cmmunicatrs. Finally, the recent wrk in [8] evaluates infrmatin theretic mdels f secret sharing. The authrs were able t determine the largest achievable key rate called key capacity. The perfrmance measure taken in this paper is prbabilistic, and different frm the Shannn measure f perfect secrecy [4]. In particular, it is shwn that by using a channel decder, the prbability f tw users establishing a secret key is clse t ne, while the prbability f an adversary generating the same key is essentially zer; this will be referred t The prpsed system is shwn in Fig. 1, where E is an adversary. During the kth signaling interval (kt, (k 1 1)T], A transmits s(t) cnsisting f tw sinusids at frequencies f 1 and f 2 with equal phases and equal energy E; that is, s(t) 5Π2E T cs (2pf 1t 1f) 1Π2E T cs (2pf 2t 1f). (1) The signal is transmitted thrugh a time-varying faded channel, crrupted by additive white Gaussian nise n(t) with duble-sided pwer spectral density N /2. We assume that cs (2pf 1 t) and cs (2pf 2 t) are rthgnal and separated by at least the cherence bandwidth f the channel. Then the received signal r(t), fr t [ (kt, (k 1 1)T], is given by r(t) 5Π2L 1 2 (k)e T cs (2pf 1 t 1Q 1 (k)) 1Π2L 2 2 (k)e cs (2pf T 2 t 1Q 2 (k)) 1 n(t), where the randm variables L i (k), i 5 1, 2, are independent and identically distributed randm variables due t fading, with Rayleigh prbability density functins 5 l i p L (l i ) 5 s 1 exp 2 l 2 22 i 2 2s, fr l i $ 0, (2) 0 fr l i, 0 where s 2 5 E(L i2 (k)) is a characteristic f the channel (E dentes expectatin with respect t p L ). The randm variables Q 1 (k) and Q 2 (k) are mutually independent, each with a unifrm prbability density functin ver [2p, p]. 208

3 B differentially detects an estimate f D kb 5Q 1 (k)2 Q 2 (k) and quantizes the estimate int ne f M phase values, say Q ( ). Except in sequences, the time index k will be drpped with n ambiguity. The differential baseband signal can be shwn t be U B 52L 1 L 2 E exp 5 j(q 1 2Q 2 )61L 1 N 1 1L 2 N* 2 5X B 1jY B, (3) where N 1 and N 2 are cmplex valued Gaussian randm variables with zer mean and variance 2EN, and * dentes cnjugatin. The estimated phase difference is given by F B 5 tan 21 Y B /X B and the quantizer utput is Q (F B ). Repeating the abve transmissin at times k 5 1, 2,...,n,Bestablishes the sequence S B 5 (Q (F 1 B ) Q (F 2 B ) Q(F n B )). (4) Similarly, B transmits a sequence f tw sinusids at the frequencies f 1 and f 2 and with equal phases, after negligible delay amng transmissins; that is, A transmits, then B, then A, and s n in an interleaved rder t maintain the reciprcity assumptin. Fr instance, cnsider a mbile with speed f 100 km/h and using a carrier in the 900 MHz regin; with a delay f 10 µs, the distance mved by the mbile wuld be m, which is negligible cmpared t the wavelength 0.3 m. Thus A frms the baseband differential signal U A 52L 1 L 2 E exp 5 j(q 1 2Q 2 )61L 1 V 1 1L 2 V* 2 5X A 1jY A, (5) where V 1 and V 2 are independent f N 1 and N 2. The estimated phase difference is F A 5 tan 21 Y A /X A. Ntice that due t the reciprcity f the channel, the nly difference between U A and U B is the additive Gaussian nise. Therefre, A establishes the sequence S A 5 (Q (F 1 A ) Q (F 2 A ) Q(F N A )). (6) An adversary E will have the infrmatin U E 52L 3 L 4 E exp 5 j(q 3 2Q 4 )61L 3 N 3 1L 4 N* 4 5X E 1jY E, (7) where L i, i 5 1, 2, 3, 4 are mutually independent, and the estimated phase difference is F E 5 tan 21 Y E /X E ; als, Q i, i 5 1, 2, 3, 4 are mutually independent randm variables. The adversary E establishes the sequence S E 5 (Q (F 1 E ) Q (F 2 E ) Q(F N E )). (8) The sequences S A, S B, and S E are the input t an errr crrectin decder. The utputs f the decders are the keys K A, K B, and K E. Ntice that there is n encding perfrmed at the transmitter end. The decder essentially limits the number f pssible keys t increase the reliability fr key agreement. III. PERFORMANCE ANALYSIS AND RESULTS The fllwing events will be used t assess the perfrmance f a key distributin system: G i 5 5F A [ R i, F B [ R i 6, B i 5 5F A [ R i, F E [ R i 6; here R i is the regin in phase space that is mapped t symbl i. The prbability f a symbl match amng A, B is p g 5 Pr 5 M < i51 Pr(G i )6 M 5 i51 (Pr(F A [ R i )) 2. (9) The prbability f a symbl match amng A, E is p b 5 Pr 5 M < i51 (B i )6 5 1 M. (10) The prbability f an estimated phase in a decisin regin is derived in the Appendix. Nw cnsider the use f a linear blck cde with minimum Hamming distance d, dimensin k, and a blck length n equal t the length f the secret key needed. Then t 5 c(d 2 1)/2d is the number f errrs that can be crrected by the decder. The prbability f agreement being in success is the prbability f the tw received vectrs being in the same decding regin f a cdewrd. This can be shwn t be Pr(K A 5 K B ) 5 l l A l j50 n2l k50 l2j m 150 j m 250 k m 350 n2l2k m n b2 (1 2 p g) b p g n2b, (11) 209

4 FIG. 2. The perfrmance f (23,12) Glay cde t establish a key f length 64 bits by cncatenating three cdewrds. where A l is the weight enumeratr functin f the cde, and b5m 1 1m 2 1m 3 1m 4 0#j1k#t 0#m 1 1j12m 2 1k2m 3 1m 4 #t. The prbability f adversary success P B is given by a similar equatin substituting p b fr p g. Fr small k, mre redundancy is available and a cde with better errr crrectin capability can be btained; hwever, the number f pssible keys becmes smaller and fr small enugh k exhaustive search by an adversary becmes feasible. Therefre, the chice f the cde parameters are crucial, since the cde restricts the key space, but the reductin shuld nt yield an insecure system. Withut the use f a decder, Pr(K A 5 K B ) 5 Pr(S A 5 S B ) 5 p gn and Pr(K A 5 K E ) 5 Pr(S A 5 S E ) 5 1/M n. It is f interest t discuss mre tradeffs invlved in the key distributin system. Sme tradeffs were pinted ut earlier: small k yields a cde with gd errr crrecting capability, but exhaustive search becmes faster expnentially with decrease k. Fr large M, a larger cde can be used thus increasing the cmputatinal secrecy f the system; als, p b decreases, which results in a gd prbabilistic secrecy. Hwever, this is nt sufficient t btain a gd cryptgraphic system; with increasing M, thermal nise effects becme dminant and an increase in E b /N is required t achieve a key agreement with certain prbabilistic secrecy. Therefre, a tradeff exists between cmputatinal secrecy, prbabilistic secrecy, and transmitted energy. T demnstrate with an example, cnsider the use f a (23,12) Glay cde t establish a key f length 64 bits. This key is the cncatenatin f three subkeys each f length 23 (the last 4 bits can be drpped). The Glay cde is a perfect cde, and, therefre, the decder will always utput a cdewrd. The prbability f key establishment is then given by Pr(K A 5 K B ) 3, where Pr(K A 5 K B ) is given in (11). Figure 2 shws the perfrmance f the system in terms f 1 2 Pr(K A 5 K B ) as a functin f average E/N. The use f a decder is necessary fr A and B t establish a cryptgraphic key. Hwever, a decder des nt help E. The chice f a cde and the crrespnding decder is imprtant. One wuld be tempted t use a Reed Slmn cde with large M, since exhaustive search by an adversary fr such cdes is essentially impssible, and the perfrmance f such cdes is attractive in errr cntrl cding. The prblem with using Reed Slmn cdes is the fact that the cde is sparse. With very high prbability the analyzed prtcl will fail t establish the cryptgraphic key. This is true when using any sparse cdes. 210

5 IV. CONCLUSION prbability density functin f F is given by We have evaluated the perfrmance f an uncnventinal cryptgraphic key agreement technique based n the reversibility f a radi channel. This technique results in superir cmputatinal secrecy as well as prbabilistic secrecy. Using this scheme, arbitrary lng keys can be shared, and a key can change during a sessin. An equivalent system wuld be the transmissin f 2M rthgnal tnes by each user. This system will have the same perfrmance; hwever, it requires a much larger bandwidth, as required by rthgnal signaling. APPENDIX where and p F (f0g) 5 1 exp 52G6 2p 1 1 Œ2p (ŒG cs f) exp 52G sin2 f6 3 [1 2 Q(Œ2G cs f)], G5 L 1 2 L 2 2 L 1 2 1L 2 2 E N In this Appendix, the prbability density functin f F is evaluated. Initially, assume D5Q 1 2Q 2 is given and equal t 0. Cnsider U 5 2L 1 L 2 E 1L 1 N 1 1L 2 N* 2 5X1jY X 5 2L 1 L 2 E 1 Re(L 1 N 1 1L 2 N* 2 ) Y5Im(L 1 N 1 1L 2 N* 2 ), where, cnditined n L 1 and L 2,E(X)52L 1 L 2 E0µ, E(Y) 5 0, and variance (X) 5 variance (Y) 5 2EN 0 (L 12 1 L 22 ) 0 s 2. The cnditinal jint prbability density functin f X and Y is P(x, y0l 1, L 2 ) 5 1 with the change f variables 2ps 2 exp 52[(x 2 µ)2 1 y 2 ]/2s 2 6 R 5 ŒX 2 1 Y 2, and F5tan 21 Y X the cnditinal jint density functin f Q and R is given by p(r, F0L 1, L 2 ) 5 R 2ps 2 exp 52(R 2 1 µ 2 2 2µR cs F)/2s 2 6. Integrating ver R [ [0,`), it can be shwn that the Q(x) 5 1 Œ2p e x ` exp 52u 2 /26 du. The prbability density functin P G (g) can be shwn t be 1 g 1 P G (g) 5 e 0 g x 2 (1 2 x) exp 5 2 g 1 2 g x(1 2 x)6 dx, where g52s 2 E/N is the average signal-t-nise rati. The prbability density functin f F cnditined n Dfi0 is then given by p F (f2d). Finally, nte that Q 1 and Q 2 are identically distributed unifrm randm variables ver [2p, p). The sum D5Q 1 2Q 2 can take values in [22p, 2p) accrding t a triangular functin (the cnvlutin f tw unifrm distributins). Thus t reslve the ambiguities f 2p, define the randm variable D8 5 5 D22p, p#d#2p D, 2p#D#p D12p, 22p#D#2p. It can be shwn that D8 is unifrmly distributed ver [2p, p]. With regins given by R i 5 [2(i 2 1)2p/M, i2p/m), fr i 5 1,...,M, the desired prbability is given by Pr(F [ R i ) 5 1 e ` p e 2p 0 2p e p F (f2d0g)p(g)dfdddg. Ri 211

6 ACKNOWLEDGMENTS The authrs thank a reviewer fr pinting ut a fault in using sparse cdes. They als thank Prfessr J. Massey fr his valuable cmments. REFERENCES 1. Data Encryptin Standard. Federal Infrmatin Prcessing Standards, Publicatin Number 46, Natinal Bureau f Standards, Rivest, R. L., Shamir, A., and Adelman, L. A methd fr btaining digital signatures and public key crypt-systems. Cmmun. ACM 21, n. 2 (1978), Hershey, J. E., Hassan, A. A., and Yarlagadda, R. Uncnventinal cryptgraphic keying variable management. IEEE Trans. Cmmun., in press. 4. Shannn, C. E. Cmmunicatin thery f secrecy systems. Bell Syst. Tech. J. 28 (1949), Wyner, A. D. The wire-tap channel, Bell Syst. Tech. J. 54 (1975), Ozarw, L. H., and Wyner, A. D. Wire tap channel, II. Bell Syst. Tech. J. 63 (1984), Maurer, U. M. Secret key agreement by public discussin frm cmmn infrmatin. IEEE Trans. Infrm. Thery 39 (1993), Ahlswede, R., and Csizár, I. Cmmn randmness in infrmatin thery and cryptgraphy. I. Secret sharing. IEEE Trans. Infrm. Thery 39,

1.3. The Mean Temperature Difference

1.3. The Mean Temperature Difference 1.3. The Mean Temperature Difference 1.3.1. The Lgarithmic Mean Temperature Difference 1. Basic Assumptins. In the previus sectin, we bserved that the design equatin culd be slved much easier if we culd

More information

New York University Computer Science Department Courant Institute of Mathematical Sciences

New York University Computer Science Department Courant Institute of Mathematical Sciences New Yrk University Cmputer Science Department Curant Institute f Mathematical Sciences Curse Title: Data Cmmunicatin & Netwrks Curse Number:CSCI-GA.2662-00 Instructr: Jean-Claude Franchitti Sessin: 2 Assignment

More information

WEB APPLICATION SECURITY TESTING

WEB APPLICATION SECURITY TESTING WEB APPLICATION SECURITY TESTING Cpyright 2012 ps_testware 1/7 Intrductin Nwadays every rganizatin faces the threat f attacks n web applicatins. Research shws that mre than half f all data breaches are

More information

ELEC 204 Digital System Design LABORATORY MANUAL

ELEC 204 Digital System Design LABORATORY MANUAL ELEC 204 Digital System Design LABORATORY MANUAL : Design and Implementatin f a 3-bit Up/Dwn Jhnsn Cunter Cllege f Engineering Kç University Imprtant Nte: In rder t effectively utilize the labratry sessins,

More information

Retirement Planning Options Annuities

Retirement Planning Options Annuities Retirement Planning Optins Annuities Everyne wants a glden retirement. But saving fr retirement is n easy task. The baby bmer generatin is graying. Mre and mre peple are appraching retirement age. With

More information

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES

UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES UNIVERSITY OF CALIFORNIA MERCED PERFORMANCE MANAGEMENT GUIDELINES REFERENCES AND RELATED POLICIES A. UC PPSM 2 -Definitin f Terms B. UC PPSM 12 -Nndiscriminatin in Emplyment C. UC PPSM 14 -Affirmative

More information

Disk Redundancy (RAID)

Disk Redundancy (RAID) A Primer fr Business Dvana s Primers fr Business series are a set f shrt papers r guides intended fr business decisin makers, wh feel they are being bmbarded with terms and want t understand a cmplex tpic.

More information

Sinusoidal Steady State Response of Linear Circuits. The circuit shown on Figure 1 is driven by a sinusoidal voltage source v s (t) of the form

Sinusoidal Steady State Response of Linear Circuits. The circuit shown on Figure 1 is driven by a sinusoidal voltage source v s (t) of the form Sinusidal Steady State espnse f inear Circuits The circuit shwn n Figure 1 is driven by a sinusidal ltage surce v s (t) f the frm v () t = v cs( ωt) (1.1) s i(t) + v (t) - + v (t) s v c (t) - C Figure

More information

Welcome to CNIPS Training: CACFP Claim Entry

Welcome to CNIPS Training: CACFP Claim Entry Welcme t CNIPS Training: CACFP Claim Entry General Cmments frm SCN CACFP claiming begins with submissin f the Octber claim due by Nvember 15, 2012. Timelines/Due Dates With CNIPS, SCN will cntinue t enfrce

More information

Standards and Procedures for Approved Master's Seminar Paper or Educational Project University of Wisconsin-Platteville Requirements

Standards and Procedures for Approved Master's Seminar Paper or Educational Project University of Wisconsin-Platteville Requirements Standards and Prcedures fr Apprved Master's Seminar Paper r Educatinal Prject University f Wiscnsin-Platteville Requirements Guidelines Apprved by the Graduate Cuncil University f Wiscnsin-Platteville

More information

How do I evaluate the quality of my wireless connection?

How do I evaluate the quality of my wireless connection? Hw d I evaluate the quality f my wireless cnnectin? Enterprise Cmputing & Service Management A number f factrs can affect the quality f wireless cnnectins at UCB. These include signal strength, pssible

More information

Economic Justification: Measuring Return on Investment (ROI) and Cost Benefit Analysis (CBA)

Economic Justification: Measuring Return on Investment (ROI) and Cost Benefit Analysis (CBA) Advancing Statewide Spatial Data Infrastructures in Supprt f the Natinal Spatial Data Infrastructure (NSDI) Ecnmic Justificatin: Measuring Return n Investment (ROI) and Cst Benefit Analysis (CBA) Intrductin

More information

Budget Planning. Accessing Budget Planning Section. Select Click Here for Budget Planning button located close to the bottom of Program Review screen.

Budget Planning. Accessing Budget Planning Section. Select Click Here for Budget Planning button located close to the bottom of Program Review screen. Budget Planning Accessing Budget Planning Sectin Select Click Here fr Budget Planning buttn lcated clse t the bttm f Prgram Review screen. Depending n what types f budgets yur prgram has, yu may r may

More information

OUR DISCIPLINARY POLICY

OUR DISCIPLINARY POLICY OUR DISCIPLINARY POLICY WHO is this plicy fr? Channel 4 emplyees wh ve passed their prbatinary perid Channel 4 managers This plicy des nt frm part f any emplyee s cntract f emplyment and we may amend it

More information

The ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories.

The ad hoc reporting feature provides a user the ability to generate reports on many of the data items contained in the categories. 11 This chapter includes infrmatin regarding custmized reprts that users can create using data entered int the CA prgram, including: Explanatin f Accessing List Screen Creating a New Ad Hc Reprt Running

More information

Getting Started Guide

Getting Started Guide AnswerDash Resurces http://answerdash.cm Cntextual help fr sales and supprt Getting Started Guide AnswerDash is cmmitted t helping yu achieve yur larger business gals. The utlined pre-launch cnsideratins

More information

Using PayPal Website Payments Pro UK with ProductCart

Using PayPal Website Payments Pro UK with ProductCart Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...

More information

Information paper Reference Data Management Service

Information paper Reference Data Management Service This infrmatin paper describes the EU Reference Data Management Service. This Service prvides a central database, web service web applicatin fr maintaining RIS reference data, which is used by varius RIS-systems

More information

Comparisons between CRM and CCM PFC *

Comparisons between CRM and CCM PFC * Energy and Pwer Engineering, 13, 5, 864-868 di:1.436/epe.13.54b165 Published Online July 13 (http://www.scirp.rg/jurnal/epe Cmparisns between CRM and CCM PFC * Weiping Zhang,Wei Zhang,Jianb Yang 1,Faris

More information

Operational Amplifier Circuits Comparators and Positive Feedback

Operational Amplifier Circuits Comparators and Positive Feedback Operatinal Amplifier Circuits Cmparatrs and Psitive Feedback Cmparatrs: Open Lp Cnfiguratin The basic cmparatr circuit is an p-amp arranged in the pen-lp cnfiguratin as shwn n the circuit f Figure. The

More information

THE UNEARNED NO CLAIM BONUS. C. P. WELTEN Amsterdam

THE UNEARNED NO CLAIM BONUS. C. P. WELTEN Amsterdam THE UNEARNED NO CLAIM BONUS C. P. WELTEN Amsterdam I. The claims experience f a mtrcar insurance is assumed t give sme indicatin abut the risk (basic claim frequency) f that insurance. The experience rating

More information

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003

Trends and Considerations in Currency Recycle Devices. What is a Currency Recycle Device? November 2003 Trends and Cnsideratins in Currency Recycle Devices Nvember 2003 This white paper prvides basic backgrund n currency recycle devices as cmpared t the cmbined features f a currency acceptr device and a

More information

Writing a Compare/Contrast Essay

Writing a Compare/Contrast Essay Writing a Cmpare/Cntrast Essay As always, the instructr and the assignment sheet prvide the definitive expectatins and requirements fr any essay. Here is sme general infrmatin abut the rganizatin fr this

More information

CSE 231 Fall 2015 Computer Project #4

CSE 231 Fall 2015 Computer Project #4 CSE 231 Fall 2015 Cmputer Prject #4 Assignment Overview This assignment fcuses n the design, implementatin and testing f a Pythn prgram that uses character strings fr data decmpressin. It is wrth 45 pints

More information

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents

BRILL s Editorial Manager (EM) Manual for Authors Table of Contents BRILL s Editrial Manager (EM) Manual fr Authrs Table f Cntents Intrductin... 2 1. Getting Started: Creating an Accunt... 2 2. Lgging int EM... 3 3. Changing Yur Access Cdes and Cntact Infrmatin... 3 3.1

More information

Contact: Monique Goyens directorsoffice@beuc.eu

Contact: Monique Goyens directorsoffice@beuc.eu Cmparisn Websites Cntact: Mnique Gyens directrsffice@beuc.eu Ref.: X/2012/065-28/08/2012 BUREAU EUROPÉEN DES UNIONS DE CONSOMMATEURS AISBL DER EUROPÄISCHE VERBRAUCHERVERBAND Rue d Arln 80, B-1040 Brussels

More information

SQL Perform Tools 5.10 Release Note

SQL Perform Tools 5.10 Release Note SQL Perfrm Tls 5.10 Release Nte Lndn, UK, February 26 2015 SQL Perfrm Tls versin 5.10 release Tday we are prudly annuncing the latest release f ur prducts' family SQL Perfrm Tls. Fr clarity, the prduct

More information

Simple and Efficient Contract Signing Protocol

Simple and Efficient Contract Signing Protocol Simple and Efficient Cntract Signing Prtcl Abdullah M. Alaraj Infrmatin Technlgy Department Cllege f Cmputer, Qassim University Saudi Arabia Abstract In this paper, a new cntract signing is prpsed based

More information

expertise hp services valupack consulting description security review service for Linux

expertise hp services valupack consulting description security review service for Linux expertise hp services valupack cnsulting descriptin security review service fr Linux Cpyright services prvided, infrmatin is prtected under cpyright by Hewlett-Packard Cmpany Unpublished Wrk -- ALL RIGHTS

More information

Patient Participation Report

Patient Participation Report Patient Participatin Reprt In 2011, Westngrve Partnership decided t establish a PPG (Patient Participatin Grup) that wuld allw us t engage with ur patients, receive feedback frm them and ensure that they

More information

Chapter 6: Continuous Probability Distributions GBS221, Class 20640 March 25, 2013 Notes Compiled by Nicolas C. Rouse, Instructor, Phoenix College

Chapter 6: Continuous Probability Distributions GBS221, Class 20640 March 25, 2013 Notes Compiled by Nicolas C. Rouse, Instructor, Phoenix College Chapter Objectives 1. Understand the difference between hw prbabilities are cmputed fr discrete and cntinuus randm variables. 2. Knw hw t cmpute prbability values fr a cntinuus unifrm prbability distributin

More information

Lecture 2: Supervised vs. unsupervised learning, bias-variance tradeoff

Lecture 2: Supervised vs. unsupervised learning, bias-variance tradeoff Lecture 2: Supervised vs. unsupervised learning, bias-variance tradeff Reading: Chapter 2 Stats 202: Data Mining and Analysis Lester Mackey September 23, 2015 (Slide credits: Sergi Bacallad) 1 / 24 Annuncements

More information

We will record and prepare documents based off the information presented

We will record and prepare documents based off the information presented Dear Client: We appreciate the pprtunity f wrking with yu regarding yur Payrll needs. T ensure a cmplete understanding between us, we are setting frth the pertinent infrmatin abut the services that we

More information

ADMINISTRATION AND FINANCE POLICIES AND PROCEDURES TABLE OF CONTENTS

ADMINISTRATION AND FINANCE POLICIES AND PROCEDURES TABLE OF CONTENTS CONTROL Revisin Date: 1/21/03 TABLE OF CONTENTS 10.01 OVERVIEW OF ACCOUNTING FOR INVESTMENT IN PLANT... 2 10.01.1 CURRENT POLICY... 2 10.02 INVENTORY MAINTENANCE AND CONTROL... 3 10.02.1 PROCEDURES FOR

More information

Symantec User Authentication Service Level Agreement

Symantec User Authentication Service Level Agreement Symantec User Authenticatin Service Level Agreement Overview and Scpe This Symantec User Authenticatin service level agreement ( SLA ) applies t Symantec User Authenticatin prducts/services, such as Managed

More information

Student Academic Learning Services Page 1 of 7. Statistics: The Null and Alternate Hypotheses. A Student Academic Learning Services Guide

Student Academic Learning Services Page 1 of 7. Statistics: The Null and Alternate Hypotheses. A Student Academic Learning Services Guide Student Academic Learning Services Page 1 f 7 Statistics: The Null and Alternate Hyptheses A Student Academic Learning Services Guide www.durhamcllege.ca/sals Student Services Building (SSB), Rm 204 This

More information

INTERMEDIATE CAD FILE MANAGEMENT

INTERMEDIATE CAD FILE MANAGEMENT INTERMEDIATE CAD FILE MANAGEMENT Intrductin File mismanagement is the dwnfall f many brilliant individuals. If yu are wise, yu wn't be ne f the peple wh meet disaster due t pr file management. Cmputers

More information

Applied Spatial Statistics: Lecture 6 Multivariate Normal

Applied Spatial Statistics: Lecture 6 Multivariate Normal Applied Spatial Statistics: Lecture 6 Multivariate Nrmal Duglas Nychka, Natinal Center fr Atmspheric Research Supprted by the Natinal Science Fundatin Bulder, Spring 2013 Outline additive mdel Multivariate

More information

WINDOW REPLACEMENT Survey

WINDOW REPLACEMENT Survey WINDOW REPLACEMENT Prperty wners and develpers undertaking rehabilitatin prjects fr bth Tax Act Certificatin and Sectin 106 Cmpliance are encuraged t repair and retain existing histric windws. Hwever,

More information

Copyrights and Trademarks

Copyrights and Trademarks Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and

More information

Importance and Contribution of Software Engineering to the Education of Informatics Professionals

Importance and Contribution of Software Engineering to the Education of Informatics Professionals Imprtance and Cntributin f Sftware Engineering t the Educatin f Infrmatics Prfessinals Dr. Tick, József Budapest Plytechnic, Hungary, tick@bmf.hu Abstract: As a result f the Blgna prcess a new frm f higher

More information

Wire Transfer Request

Wire Transfer Request Wire Transfer Request Requirements and Instructins OFFICE OF DISBURSEMENTS Categry: Dcument Name: Payment Prcessing Wire Transfer Request - Requirements and Instructins Respnsible Department: Office f

More information

Payment Options Check Payable to Account Holder* Electronic Funds Transfer (ACH) $5.00 Maintain IRA with The Bancorp (contact us for options)

Payment Options Check Payable to Account Holder* Electronic Funds Transfer (ACH) $5.00 Maintain IRA with The Bancorp (contact us for options) Dear Custmer: Thank yu fr cntacting Custmer Care regarding the clsure f yur Individual Retirement Accunt (IRA). In rder t prcess yur request, please cmplete the enclsed Request fr Distributin frm. Yu may

More information

NHPCO Guidelines for Using CAHPS Hospice Survey Results

NHPCO Guidelines for Using CAHPS Hospice Survey Results Intrductin NHPCO Guidelines fr Using CAHPS Hspice Survey Results The Centers fr Medicare and Medicaid Services (CMS) has develped the Cnsumer Assessment f Healthcare Prviders and Systems (CAHPS ) Hspice

More information

Chris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation

Chris Chiron, Interim Senior Director, Employee & Management Relations Jessica Moore, Senior Director, Classification & Compensation TO: FROM: HR Officers & Human Resurces Representatives Chris Chirn, Interim Senir Directr, Emplyee & Management Relatins Jessica Mre, Senir Directr, Classificatin & Cmpensatin DATE: May 26, 2015 RE: Annual

More information

Software and Hardware Change Management Policy for CDes Computer Labs

Software and Hardware Change Management Policy for CDes Computer Labs Sftware and Hardware Change Management Plicy fr CDes Cmputer Labs Overview The cmputer labs in the Cllege f Design are clsely integrated with the academic needs f faculty and students. Cmputer lab resurces

More information

Chapter 3: Cluster Analysis

Chapter 3: Cluster Analysis Chapter 3: Cluster Analysis 3.1 Basic Cncepts f Clustering 3.1.1 Cluster Analysis 3.1. Clustering Categries 3. Partitining Methds 3..1 The principle 3.. K-Means Methd 3..3 K-Medids Methd 3..4 CLARA 3..5

More information

How to put together a Workforce Development Fund (WDF) claim 2015/16

How to put together a Workforce Development Fund (WDF) claim 2015/16 Index Page 2 Hw t put tgether a Wrkfrce Develpment Fund (WDF) claim 2015/16 Intrductin What eligibility criteria d my establishment/s need t meet? Natinal Minimum Data Set fr Scial Care (NMDS-SC) and WDF

More information

CHECKING ACCOUNTS AND ATM TRANSACTIONS

CHECKING ACCOUNTS AND ATM TRANSACTIONS 1 Grades 6-8 Lessn 1 CHECKING ACCOUNTS AND ATM TRANSACTIONS Tpic t Teach: This lessn is intended fr middle schl students in sixth thrugh eighth grades during a frty minute time perid. The lessn teaches

More information

Connecticut State Department of Education 2014-15 School Health Services Information Survey

Connecticut State Department of Education 2014-15 School Health Services Information Survey Cnnecticut State Department f Educatin 2014-15 Schl Health Services Infrmatin Survey General Directins fr Cmpletin by Schl Nurse Crdinatr/Supervisr This Schl Health Services Infrmatin Survey was designed

More information

Statistical Analysis (1-way ANOVA)

Statistical Analysis (1-way ANOVA) Statistical Analysis (1-way ANOVA) Cntents at a glance I. Definitin and Applicatins...2 II. Befre Perfrming 1-way ANOVA - A Checklist...2 III. Overview f the Statistical Analysis (1-way tests) windw...3

More information

Heythrop College Disciplinary Procedure for Support Staff

Heythrop College Disciplinary Procedure for Support Staff Heythrp Cllege Disciplinary Prcedure fr Supprt Staff Intrductin 1. This prcedural dcument des nt apply t thse academic-related staff wh are mentined in the Cllege s Ordinance, namely the Librarian and

More information

CDC UNIFIED PROCESS PRACTICES GUIDE

CDC UNIFIED PROCESS PRACTICES GUIDE Dcument Purpse The purpse f this dcument is t prvide guidance n the practice f Risk Management and t describe the practice verview, requirements, best practices, activities, and key terms related t these

More information

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar

Why Can t Johnny Encrypt? A Usability Evaluation of PGP 5.0 Alma Whitten and J.D. Tygar Class Ntes: February 2, 2006 Tpic: User Testing II Lecturer: Jeremy Hyland Scribe: Rachel Shipman Why Can t Jhnny Encrypt? A Usability Evaluatin f PGP 5.0 Alma Whitten and J.D. Tygar This article has three

More information

Connecting to Email: Live@edu

Connecting to Email: Live@edu Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate

More information

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future

The Importance Advanced Data Collection System Maintenance. Berry Drijsen Global Service Business Manager. knowledge to shape your future The Imprtance Advanced Data Cllectin System Maintenance Berry Drijsen Glbal Service Business Manager WHITE PAPER knwledge t shape yur future The Imprtance Advanced Data Cllectin System Maintenance Cntents

More information

Access Control Algorithm for RPR MAC

Access Control Algorithm for RPR MAC Access Cntrl Algrithm fr RPR MAC Kanaiya Vasani Anp Ghanwani Lantern Cmmunicatins IEEE 802.17 Interim Meeting Orland, FL January 2002 kv_acc_02.pdf 1 Outline Overview MAC architecture Cmpnents f the bandwidth

More information

A CONSISTENCY IMPROVING METHOD IN BINARY AHP

A CONSISTENCY IMPROVING METHOD IN BINARY AHP Jurnal f the Operatins Research Sciety f Japan Vl. 38, N., March 995 995 The Operatins Research Sciety f Japan A CONSISTENCY IMPROVING METHOD IN BINARY AHP Kazutm Nishizawa Nihn UniVfTsity (Received March

More information

Best Practice - Pentaho BA for High Availability

Best Practice - Pentaho BA for High Availability Best Practice - Pentah BA fr High Availability This page intentinally left blank. Cntents Overview... 1 Pentah Server High Availability Intrductin... 2 Prerequisites... 3 Pint Each Server t Same Database

More information

Personal Data Security Breach Management Policy

Personal Data Security Breach Management Policy Persnal Data Security Breach Management Plicy 1.0 Purpse The Data Prtectin Acts 1988 and 2003 impse bligatins n data cntrllers in Western Care Assciatin t prcess persnal data entrusted t them in a manner

More information

Office Use Only Account # Approved By:

Office Use Only Account # Approved By: Office Use Only Accunt # Apprved By: Dealer Applicatin Please cmplete and submit this applicatin alng with a cpy f yur (EIN) Federal Tax Id Number certificate befre placing yur 1 st rder. We will review

More information

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au

RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS. interests in the use of IT services, such as online bank services of Société Générale de Banques au RECOMMENDATIONS SECURITY ONLINE BANK TRANSACTIONS Best practices IT security refers t the bdy f techniques and best practices t prtect yur cmputers and yur interests in the use f IT services, such as nline

More information

Watlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011

Watlington and Chalgrove GP Practice - Patient Satisfaction Survey 2011 Watlingtn and Chalgrve GP - Patient Satisfactin Survey 2011 Backgrund During ne week in Nvember last year patients attending either the Chalgrve r the Watlingtn surgeries were asked t cmplete a survey

More information

In connection with the SEC's Money Market Reform proposal, DST Systems, Inc. respectfully submits our comments for your consideration.

In connection with the SEC's Money Market Reform proposal, DST Systems, Inc. respectfully submits our comments for your consideration. DST September 18, 2013 Ms. Elizabeth M. Murphy Secretary Securities and Exchange Cmmissin 100 F. Street, NE Washingtn, DC 20549-1090 Subject: Mney Market Fund Refrm, File# 57-03-13 Dear Ms. Murphy: In

More information

PART 6. Chapter 12. How to collect and use feedback from readers. Should you do audio or video recording of your sessions?

PART 6. Chapter 12. How to collect and use feedback from readers. Should you do audio or video recording of your sessions? TOOLKIT fr Making Written Material Clear and Effective SECTION 3: Methds fr testing written material with readers PART 6 Hw t cllect and use feedback frm readers Chapter 12 Shuld yu d audi r vide recrding

More information

Credit Report Reissue Recommendation TABLE OF CONTENTS

Credit Report Reissue Recommendation TABLE OF CONTENTS T: Credit Reprting Wrkgrup Frm: Mike Bixby (305) 829-5549 MBixby@LandAm.cm Paul Wills (770) 740-7353 Paul.Wills@Equifax.cm Date: February 13, 2007 Re: Credit Reprt Reissue Recmmendatin The MISMO Credit

More information

9 ITS Standards Specification Catalog and Testing Framework

9 ITS Standards Specification Catalog and Testing Framework New Yrk State ITS Standards Specificatin Develpment Guide 9 ITS Standards Specificatin Catalg and Testing Framewrk This chapter cvers cncepts related t develpment f an ITS Standards Specificatin Catalg

More information

HSBC Online Home Loan Application Process

HSBC Online Home Loan Application Process HSBC Online Hme Lan Applicatin Prcess Versin 1.0 Nvember 2005 Cpyright. HSBC Bank Australia Limited 2005 ALL RIGHTS RESERVED N part f this publicatin may be reprduced, stred in a retrieval system, r transmitted,

More information

Chicago Department of Finance. Tax Audit Process

Chicago Department of Finance. Tax Audit Process Chicag Department f Finance Tax Audit Prcess Audit Overview There are varius ways a business gets selected fr audit. The mst cmmn are referrals frm anther divisin f the Department f Finance, referral frm

More information

J A M S. Enterprise Resource Planning (ERP) System Selection Using a Novel Integrated Weight Decision Making Method. R. V. Rao 1* and B. K.

J A M S. Enterprise Resource Planning (ERP) System Selection Using a Novel Integrated Weight Decision Making Method. R. V. Rao 1* and B. K. Internatinal Jurnal f Advanced Manufacturing Systems Vlume 2 G Number 1 G January-June 2011 G pp. 21-28 Internatinal Science Press I J A M S Enterprise Resurce Planning (ERP) System Selectin Using a Nvel

More information

Marketing Consultancy Division (MCD) Export Consultancy Unit (ECU) Export in Focus. Export Market Expansion Strategies. Rabi-I, 1427 (April, 2006)

Marketing Consultancy Division (MCD) Export Consultancy Unit (ECU) Export in Focus. Export Market Expansion Strategies. Rabi-I, 1427 (April, 2006) Marketing Cnsultancy Divisin (MCD) Exprt Cnsultancy Unit (ECU) Exprt in Fcus Exprt Market Expansin Strategies Rabi-I, 1427 (April, 2006) 1 Exprt Market Expansin Strategies Intrductin It is clear that glbalizatin

More information

Project Startup Report Presented to the IT Committee June 26, 2012

Project Startup Report Presented to the IT Committee June 26, 2012 Prject Name: SOS File 2.0 Agency: Secretary f State Business Unit/Prgram Area: Secretary f State Prject Spnsr: Al Jaeger Prject Manager: Beverly Maitland Prject Startup Reprt Presented t the IT Cmmittee

More information

UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS. (by: Kiriakoula Hatzikiriakos, McMillan Binch Mendelsohn)

UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS. (by: Kiriakoula Hatzikiriakos, McMillan Binch Mendelsohn) UNCITRAL COLLOQIUM ON FINANCING INTELLECTUAL PROPERTY ASSETS (by: Kiriakula Hatzikiriaks, McMillan Binch Mendelshn) The purpse f this paper is t highlight sme issues and recmmendatins t be cnsidered during

More information

Data Analytics for Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015

Data Analytics for Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015 Data Analytics fr Campaigns Assignment 1: Jan 6 th, 2015 Due: Jan 13 th, 2015 These are sample questins frm a hiring exam that was develped fr OFA 2012 Analytics team. Plan n spending n mre than 4 hurs

More information

Overview of the CMS Modification to Meaningful Use 2015 through 2017

Overview of the CMS Modification to Meaningful Use 2015 through 2017 Overview f the CMS Mdificatin t Meaningful Use 2015 thrugh 2017 On April 10, 2015, the Centers fr Medicare & Medicaid Services (CMS) issued a new prpsed rule fr the Medicare and Medicaid EHR Incentive

More information

IX- On Some Clustering Techniques for Information Retrieval. J. D. Broffitt, H. L. Morgan, and J. V. Soden

IX- On Some Clustering Techniques for Information Retrieval. J. D. Broffitt, H. L. Morgan, and J. V. Soden IX-1 IX- On Sme Clustering Techniques fr Infrmatin Retrieval J. D. Brffitt, H. L. Mrgan, and J. V. Sden Abstract Dcument clustering methds which have been prpsed by R. E. Bnner and J. J. Rcchi are cmpared.

More information

Special Tax Notice Regarding 403(b) (TSA) Distributions

Special Tax Notice Regarding 403(b) (TSA) Distributions Special Tax Ntice Regarding 403(b) (TSA) Distributins P.O. Bx 7893 Madisn, WI 53707-7893 1-800-279-4030 Fax: (608) 237-2529 The IRS requires us t prvide yu with a cpy f the Explanatin f Direct Rllver,

More information

GOLDBLUM & HESS Attorneys at Law

GOLDBLUM & HESS Attorneys at Law GOLDBLUM & HESS Attrneys at Law PRACTICE LIMITED TO IMMIGRATION, NATIONALITY, AND CONSULAR LAW Jane W. Gldblum* Wendy Castr Hess** 101 GREENWOOD AVENUE PHONE: (215) 885-3600 JENKINTOWN PLAZA, SUITE 380

More information

Software Quality Assurance Plan

Software Quality Assurance Plan Sftware Quality Assurance Plan fr AnthrpdEST pipeline System Versin 1.0 Submitted in partial fulfillment f the requirements f the degree f Master f Sftware Engineering Prepared by Luis Fernand Carranc

More information

Configuring an Email Client for your Hosting Support POP/IMAP mailbox

Configuring an Email Client for your Hosting Support POP/IMAP mailbox Cnfiguring an Email Client fr yur Hsting Supprt POP/IMAP mailbx This article lists the email settings and prt numbers fr pp and imap cnfiguratins, as well as fr SSL. It cntains instructins fr setting up

More information

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS

FORM ADV (Paper Version) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS APPENDIX A FORM ADV (Paper Versin) UNIFORM APPLICATION FOR INVESTMENT ADVISER REGISTRATION AND REPORT FORM BY EXEMPT REPORTING ADVISERS Frm ADV: General Instructins Read these instructins carefully befre

More information

Quantifying CDM Audit Results

Quantifying CDM Audit Results By: Rsemary Hlliday, MHA Principal, Hlliday & Assciates March 13, 2012 Quantifying CDM Audit Results D yu have a strategy fr the day yu re asked t estimate the impact f a Charge Master audit? As a savvy

More information

TELE9753 Advanced Wireless Communications

TELE9753 Advanced Wireless Communications TELE9753 Advanced Wireless Cmmunicatins COURSE INTRODUCTION Sessin 1, 2013 Curse Staff Curse Crdinatr: Curse Lecturers: Prf. Jinhng Yuan, Rm EE324B J.Yuan@unsw.edu.au Prf. Jinhng Yuan, Rm EE324B J.Yuan@unsw.edu.au

More information

For both options: Please consult the Unisa website for admission requirements

For both options: Please consult the Unisa website for admission requirements The Department f Industrial and Organisatinal Psychlgy ffers prspective master s students tw ptins twards btaining a master s degree in Industrial and Organisatinal Psychlgy, namely, a cursewrk ptin and

More information

LeadStreet Broker Guide

LeadStreet Broker Guide RE/MAX f Western Canada LeadStreet Brker Guide Ver. 2.0 Revisin Histry Name Date Versin Descriptin Tamika Anglin 09/04/13 1.0 Initial Creatin Tamika Anglin 11/05/13 2.0 Inclusin f instructins n reprting

More information

Knowledge Base Article

Knowledge Base Article Knwledge Base Article Crystal Matrix Interface Cmparisn TCP/IP vs. SDK Cpyright 2008-2012, ISONAS Security Systems All rights reserved Table f Cntents 1: INTRODUCTION... 3 1.1: TCP/IP INTERFACE OVERVIEW:...

More information

Dec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals

Dec. 2012. Transportation Management System. An Alternative Traffic Solution for the Logistics Professionals Dec. 2012 Transprtatin Management System An Alternative Traffic Slutin fr the Lgistics Prfessinals What is a TMS-Lite system? What are the features and capabilities f a TMS-Lite system? Why chse a TMS-Lite

More information

Tipsheet: Sending Out Mass Emails in ApplyYourself

Tipsheet: Sending Out Mass Emails in ApplyYourself GEORGETOWN GRADUATE SCHOOL Tipsheet: Sending Out Mass Emails in ApplyYurself In ApplyYurself (AY), it is very simple and easy t send a mass email t all f yur prspects, applicants, r students with applicatins

More information

ONGOING FEEDBACK AND PERFORMANCE MANAGEMENT. A. Principles and Benefits of Ongoing Feedback

ONGOING FEEDBACK AND PERFORMANCE MANAGEMENT. A. Principles and Benefits of Ongoing Feedback ONGOING FEEDBACK AND PERFORMANCE MANAGEMENT A. Principles and Benefits f Onging Feedback While it may seem like an added respnsibility t managers already "full plate," managers that prvide nging feedback

More information

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide

LogMeIn Rescue Web SSO via SAML 2.0 Configuration Guide LgMeIn Rescue Web SSO via SAML 2.0 LgMeIn Rescue Web SSO via SAML 2.0 Cnfiguratin Guide 02-19-2014 Cpyright 2015 LgMeIn, Inc. 1 LgMeIn Rescue Web SSO via SAML 2.0 Cntents 1 Intrductin... 3 1.1 Dcument

More information

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER

MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER MSB FINANCIAL CORP. MILLINGTON BANK AUDIT COMMITTEE CHARTER This Audit Cmmittee Charter has been amended as f July 17, 2015. The Audit Cmmittee shall review and reassess this Charter annually and recmmend

More information

Change Management Process

Change Management Process Change Management Prcess B1.10 Change Management Prcess 1. Intrductin This plicy utlines [Yur Cmpany] s apprach t managing change within the rganisatin. All changes in strategy, activities and prcesses

More information

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3

Access EEC s Web Applications... 2 View Messages from EEC... 3 Sign In as a Returning User... 3 EEC Single Sign In (SSI) Applicatin The EEC Single Sign In (SSI) Single Sign In (SSI) is the secure, nline applicatin that cntrls access t all f the Department f Early Educatin and Care (EEC) web applicatins.

More information

Astm Bulletin 12 (1981) 22-26 RECURSIVE EVALUATION OF A FAMILY OF COMPOUNI) DISTRIBUTIONS* HARRY H. PANJER of Waterloo, Ontario, Canada

Astm Bulletin 12 (1981) 22-26 RECURSIVE EVALUATION OF A FAMILY OF COMPOUNI) DISTRIBUTIONS* HARRY H. PANJER of Waterloo, Ontario, Canada Astm Bulletin 12 (1981) 22-26 RECURSIVE EVALUATION OF A FAMILY OF COMPOUNI) DISTRIBUTIONS* Umvelmty HARRY H. PANJER f Waterl, Ontari, Canada 1 INTRODUCTION Cmpund dlstributmns such as the cmpund Pmssn

More information

June 29, 2009 Incident Review Dallas Fort Worth Data Center Review Dated: July 8, 2009

June 29, 2009 Incident Review Dallas Fort Worth Data Center Review Dated: July 8, 2009 The purpse f this dcument is t capture the events and subsequent respnse t the incident that tk place in the DFW datacenter n 29 June, 2009. I. Executive Summary On 29 June, an area f the Rackspace DFW

More information

Annuities and Senior Citizens

Annuities and Senior Citizens Illinis Insurance Facts Illinis Department f Insurance January 2010 Annuities and Senir Citizens Nte: This infrmatin was develped t prvide cnsumers with general infrmatin and guidance abut insurance cverages

More information

Principles of Engagement with Universities providing accredited Actuarial Science programmes

Principles of Engagement with Universities providing accredited Actuarial Science programmes The Actuarial Prfessin Principles f Engagement with Universities prviding accredited Actuarial Science prgrammes 1. What is an accredited actuarial science prgramme? Accreditatin f university prgrammes

More information

Template on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution

Template on written coordination and cooperation arrangements of the supervisory college established for the <XY> Group/<A> Institution COORDINATION AND COOPERATION ARRANGEMENTS EBA/RTS/2014/16 EBA/ITS/2014/07 Annex II Template n written crdinatin and cperatin arrangements f the supervisry cllege established fr the Grup/ Institutin

More information

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES

POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES POLISH STANDARDS ON HEALTH AND SAFETY AS A TOOL FOR IMPLEMENTING REQUIREMENTS OF THE EUROPEAN DIRECTIVES INTO THE PRACTICE OF ENTERPRISES M. PĘCIŁŁO Central Institute fr Labur Prtectin ul. Czerniakwska

More information

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd.

This report provides Members with an update on of the financial performance of the Corporation s managed IS service contract with Agilisys Ltd. Cmmittee: Date(s): Infrmatin Systems Sub Cmmittee 11 th March 2015 Subject: Agilisys Managed Service Financial Reprt Reprt f: Chamberlain Summary Public Fr Infrmatin This reprt prvides Members with an

More information