His solution? Federal law that requires government agencies and private industry to encrypt, or digitally scramble, sensitive data.

Size: px
Start display at page:

Download "His solution? Federal law that requires government agencies and private industry to encrypt, or digitally scramble, sensitive data."

Transcription

1 NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, FEBRUARY 9, 2007 Tec experts plot to catc identity tieves Politicians to security gurus offer ideas to prevent data breaces By Jon Swartz SAN FRANCISCO Te topic of data protection stole te sow at te RSA Conference on computer security ere tis week. Identity teft and corporate espionage were dominant temes among te 15,000 attendees. And wit good reason. Data are te new currency of te Internet age for legitimate and illegitimate businesses, says Howard Scmidt, former cief information security off icer of ebay wo now is a consultant. Data ave never been sared as quickly, and in suc vast amounts. But as millions of Americans use personal data to sop and bank online, and as more companies store data electronically, tey remain targets for online fraudsters, Scmidt and oters said. Microsoft Cairman Bill Gates, security experts, politicians and oter analysts offered teir takes on te problems, and suggestions to fix tem: "Te most dangerous breac." Identity teft was, again, a major source of discussion. Tere was no sortage of and-wringing over te consequences of consumer data ending up in te ands of fraudsters, and te fear was igligted by an FTC report of rampant consumer complaints about identity teft. But te unreported filcing of data from government agencies and private enterprises worries Ricard Clarke. "ID teft is one ting, but te teft of proprietary information witout te knowledge of te government or a private business is anoter," Clarke, best-selling autor and former Wite House cybersecurity czar, said Wednesday. "Te most dangerous breac is one you are unaware of." Te cost to companies and agencies is immeasurable, says Clarke, in town to take in te conference and plug is cybertriller, Breakpoint. And e fears te treat is growing, especially from Russia and Cina. His solution? Federal law tat requires government agencies and private industry to encrypt, or digitally scramble, sensitive data. On Tuesday, U.S. Sens. Patrick Leay, D- Vt., and Arlen Specter, R-Pa., introduced a data-privacy bill tat makes it a crime to conceal security breaces involving personal data. Gates: "A stupid system." Identity teft was also on te mind of Gates, wo visibly perked up wen te subject turned to te credit cardissuing system during an interview after is Tuesday morning speec. "It's a stupid system," e said, waving is ands dismissively. "It's a weak system wen someone wit your Social Security number or moter's maiden name can apply for credit witout you knowing it." Gates says te problem is largely solvable wit an autorization system tat requires consumers' final approval wen any financial transaction is made under teir name. He suggests biometric smart cards as part of a solution tat could be acieved witin five years. But tere will be a "paradigm sift" only wen fraud costs force a cange in te system, Gates says. Federal law? Tere were rumblings trougout convention alls and otel lobbies about a pus in Congress to make a federal law protecting consumers from te loss of sensitive information. Reprinted wit permission. All rigts reser ved.

2 AS SEEN IN USA TODAY S MONEY SECTION, FEBRUARY 9, 2007 But te autor of California's databreac notification law used as a model for more tan 30 oter states is worried a weak national law would pre-empt stronger state laws. "Let's not sacrifice te standard set in California on te altar of federal regulation," said state Sen. Joe Simitian, D-Palo Alto. FTC Cairman Debora Platt Majoras, wile sensitive to te consequences for consumers, says se favors a strong national law. Tere are at least two pieces of legislation in Congress, including te Leay-Specter bill, tat would require companies to publicly disclose data breaces. Since February 2005, more tan 100 million records containing personal information ave been subject to some sort of security breac, according to te non-profit Privacy Rigts Clearingouse. Hackers go sopping. Consumers aren't te only ones sopping online. A ras of recent data breaces suggest ackers also are sopping for te personal data of consumers at major retailers. TJX, wic operates more tan 2,500 stores under suc cains as T.J. Maxx and Marsalls, last mont said an outside audit of its PCs indicated ackers ad broken in and potentially ad access to a wide range of financial information. "Were do you get credit card information from? If not banks, ten retail outlets," says Art Coviello, president of RSA Security, te company tat sponsored te conference. Citing market researcer IDC, e says tere was a $1 billion market among cybercrooks for te sale of stolen identities last year. Attacks ave increased against retailers, e says, as large financial institutions ave fortified teir computer-security systems, forcing tieves to go elsewere. Retail payment systems were not designed wit security in mind, and ackers are finding weak links especially among retailers tat ave te most sensitive data stored, said Aviva Litan, an analyst at market researcer Gartner, in a pone interview. Reprinted wit permission. All rigts reserved. Page 2

3 NET GAIN Scoring points for your financial future Tec experts plot to catc identity tieves Objectives: Students will: Preparations: Eac student will need: Read te article Tec experts plot to catc identity tieves. A copy of te article Tec experts plot to catc identity tieves. Answer te discussion questions. A copy of tis lesson. List ways ID tieves steal information. Access to te Internet. Identify ways fraud is committed. Write ways to protect temselves against ID teft. Navigate a reliable website for information relevant to teir lives. 20 minutes Read te article and discuss questions Read Tec experts plot to catc identity tieves. Wen you are finised reading, discuss and answer te following questions as a class. According to te article, wat two crimes garnered a lot of attention at te RSA convention in 2007? Define tose two crimes. Wat is te most dangerous breac? Wat is Ricard Clarke s solution to stopping identity teft and corporate espionage? Wat qualifications does Clarke ave to suggest tis solution? Wat is Bill Gates solution to stopping identity teft? Wic solution do you tink would work better: Clarke s or Gates? Wy? Do you tink getting te government involved in minimizing information breaces is a good ting? Wy or wy not? Wat would be your solution for minimizing information breaces? List te many repercussions of aving your identity stolen. Wat would you ave to do to get your identity back and get your credit problems cleared up? Page 3

4 minutes Activity: Keeping Your Good Name Wit a partner, go to te Federal Trade Commission s website at to answer te questions below. Name six ways tieves steal personal information Wat is pising? Have you received tese offers in your ? Describe te offer. How did you know it was fraudulent? 1. According to te FTC, wat kinds of fraud do tieves commit wit te information? Name at least tree. Wat is one way you can find out if your personal information as been used fraudulently? 1. If your identity is stolen, wat are tree steps you sould take to stop te fraud? How can you proctect yourself from identity teft in te first place? Page 4

5 30 minutes Activity: Calculating te Cost of Identity Teft Wit your partner, use te cart to answer te answer te questions tat follow it. New Accounts & Oter Frauds Existing Non- Credit Card Accounts Existing Credit Cards Onliy All ID Teft Value of goods and services obtained by itentity tieves Median $1,350 $457 $350 $ t Percentile $15,000 $3,800 $4,000 $6, t Percentile $30,000 $6,000 $7,000 $13,000 Victims Out-of- Pocket Expenses Median $40 $0 $0 $0 90 t Percentile $3,000 $900 $132 $1, t Percentile $5,000 $1,200 $400 $2,000 Hours Victims Spent Resolving Teir Problems Median t Percentile t Percentile 1, Sample size n = Source: Tis table presents various measures of te costs of ID teft. Rater tan average values, te table uses median values (te point at wic alf te victims fell above te number and alf below). A minority of ID tefts result in muc greater arm tan te typical case. Because tese large values ave a significant impact on te average value, te median better represents te typical experience. To capture te experiences of tose wo suffer te most serious arm, te table also reports values for te 90t percentile and 95t percentile of arms reported. For tis survey, 4,917 people were surveyed. Tese people represented te 2294 million residents of te United States wo were 18 and older as of July Wat does median mean? Wat was te median time it took for a consumer to resolve te fraud problems on existing credit cards? Wat was te median time it took for a consumer to resolve te fraud problems on all identity teft? 4. 7 percent of te people surveyed said tey were victims of identity teft in How many people would tat represent in te wole United States? 5. If te average teft was $500, ow muc money did tieves get in 2005 from stealing identities? 6. Ten percent of people surveyed wo ad been victims said it took about 55 ours to resolve problems related to any kind of identity teft. If you make $8 an our, and it takes 55 ours to resolve tese problems, ow muc could tis potentially cost you just in lost wages? Discuss: Wit all te information you ve learned in tis lesson, wat main conclusions can you draw about te causes and effects of identity teft? Page 5

A strong credit score can help you score a lower rate on a mortgage

A strong credit score can help you score a lower rate on a mortgage NET GAIN Scoring points for your financial future AS SEEN IN USA TODAY S MONEY SECTION, JULY 3, 2007 A strong credit score can elp you score a lower rate on a mortgage By Sandra Block Sales of existing

More information

2.23 Gambling Rehabilitation Services. Introduction

2.23 Gambling Rehabilitation Services. Introduction 2.23 Gambling Reabilitation Services Introduction Figure 1 Since 1995 provincial revenues from gambling activities ave increased over 56% from $69.2 million in 1995 to $108 million in 2004. Te majority

More information

How To Ensure That An Eac Edge Program Is Successful

How To Ensure That An Eac Edge Program Is Successful Introduction Te Economic Diversification and Growt Enterprises Act became effective on 1 January 1995. Te creation of tis Act was to encourage new businesses to start or expand in Newfoundland and Labrador.

More information

College Planning Using Cash Value Life Insurance

College Planning Using Cash Value Life Insurance College Planning Using Cas Value Life Insurance CAUTION: Te advisor is urged to be extremely cautious of anoter college funding veicle wic provides a guaranteed return of premium immediately if funded

More information

What is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities.

What is Advanced Corporate Finance? What is finance? What is Corporate Finance? Deciding how to optimally manage a firm s assets and liabilities. Wat is? Spring 2008 Note: Slides are on te web Wat is finance? Deciding ow to optimally manage a firm s assets and liabilities. Managing te costs and benefits associated wit te timing of cas in- and outflows

More information

Tangent Lines and Rates of Change

Tangent Lines and Rates of Change Tangent Lines and Rates of Cange 9-2-2005 Given a function y = f(x), ow do you find te slope of te tangent line to te grap at te point P(a, f(a))? (I m tinking of te tangent line as a line tat just skims

More information

Digital evolution Where next for the consumer facing business?

Digital evolution Where next for the consumer facing business? Were next for te consumer facing business? Cover 2 Digital tecnologies are powerful enablers and lie beind a combination of disruptive forces. Teir rapid continuous development demands a response from

More information

NAFN NEWS SPRING2011 ISSUE 7. Welcome to the Spring edition of the NAFN Newsletter! INDEX. Service Updates Follow That Car! Turn Back The Clock

NAFN NEWS SPRING2011 ISSUE 7. Welcome to the Spring edition of the NAFN Newsletter! INDEX. Service Updates Follow That Car! Turn Back The Clock NAFN NEWS ISSUE 7 SPRING2011 Welcome to te Spring edition of te NAFN Newsletter! Spring is in te air at NAFN as we see several new services cropping up. Driving and transport emerged as a natural teme

More information

2 Limits and Derivatives

2 Limits and Derivatives 2 Limits and Derivatives 2.7 Tangent Lines, Velocity, and Derivatives A tangent line to a circle is a line tat intersects te circle at exactly one point. We would like to take tis idea of tangent line

More information

Determine the perimeter of a triangle using algebra Find the area of a triangle using the formula

Determine the perimeter of a triangle using algebra Find the area of a triangle using the formula Student Name: Date: Contact Person Name: Pone Number: Lesson 0 Perimeter, Area, and Similarity of Triangles Objectives Determine te perimeter of a triangle using algebra Find te area of a triangle using

More information

Working Capital 2013 UK plc s unproductive 69 billion

Working Capital 2013 UK plc s unproductive 69 billion 2013 Executive summary 2. Te level of excess working capital increased 3. UK sectors acieve a mixed performance 4. Size matters in te supply cain 6. Not all companies are overflowing wit cas 8. Excess

More information

Area-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data

Area-Specific Recreation Use Estimation Using the National Visitor Use Monitoring Program Data United States Department of Agriculture Forest Service Pacific Nortwest Researc Station Researc Note PNW-RN-557 July 2007 Area-Specific Recreation Use Estimation Using te National Visitor Use Monitoring

More information

For Sale By Owner Program. We can help with our for sale by owner kit that includes:

For Sale By Owner Program. We can help with our for sale by owner kit that includes: Dawn Coen Broker/Owner For Sale By Owner Program If you want to sell your ome By Owner wy not:: For Sale Dawn Coen Broker/Owner YOUR NAME YOUR PHONE # Look as professional as possible Be totally prepared

More information

Pioneer Fund Story. Searching for Value Today and Tomorrow. Pioneer Funds Equities

Pioneer Fund Story. Searching for Value Today and Tomorrow. Pioneer Funds Equities Pioneer Fund Story Searcing for Value Today and Tomorrow Pioneer Funds Equities Pioneer Fund A Cornerstone of Financial Foundations Since 1928 Te fund s relatively cautious stance as kept it competitive

More information

Can a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade?

Can a Lump-Sum Transfer Make Everyone Enjoy the Gains. from Free Trade? Can a Lump-Sum Transfer Make Everyone Enjoy te Gains from Free Trade? Yasukazu Icino Department of Economics, Konan University June 30, 2010 Abstract I examine lump-sum transfer rules to redistribute te

More information

Verifying Numerical Convergence Rates

Verifying Numerical Convergence Rates 1 Order of accuracy Verifying Numerical Convergence Rates We consider a numerical approximation of an exact value u. Te approximation depends on a small parameter, suc as te grid size or time step, and

More information

1. Case description. Best practice description

1. Case description. Best practice description 1. Case description Best practice description Tis case sows ow a large multinational went troug a bottom up organisational cange to become a knowledge-based company. A small community on knowledge Management

More information

Operation go-live! Mastering the people side of operational readiness

Operation go-live! Mastering the people side of operational readiness ! I 2 London 2012 te ultimate Up to 30% of te value of a capital programme can be destroyed due to operational readiness failures. 1 In te complex interplay between tecnology, infrastructure and process,

More information

Instantaneous Rate of Change:

Instantaneous Rate of Change: Instantaneous Rate of Cange: Last section we discovered tat te average rate of cange in F(x) can also be interpreted as te slope of a scant line. Te average rate of cange involves te cange in F(x) over

More information

The EOQ Inventory Formula

The EOQ Inventory Formula Te EOQ Inventory Formula James M. Cargal Matematics Department Troy University Montgomery Campus A basic problem for businesses and manufacturers is, wen ordering supplies, to determine wat quantity of

More information

Guide to Cover Letters & Thank You Letters

Guide to Cover Letters & Thank You Letters Guide to Cover Letters & Tank You Letters 206 Strebel Student Center (315) 792-3087 Fax (315) 792-3370 TIPS FOR WRITING A PERFECT COVER LETTER Te resume never travels alone. Eac time you submit your resume

More information

An inquiry into the multiplier process in IS-LM model

An inquiry into the multiplier process in IS-LM model An inquiry into te multiplier process in IS-LM model Autor: Li ziran Address: Li ziran, Room 409, Building 38#, Peing University, Beijing 00.87,PRC. Pone: (86) 00-62763074 Internet Address: jefferson@water.pu.edu.cn

More information

2.12 Student Transportation. Introduction

2.12 Student Transportation. Introduction Introduction Figure 1 At 31 Marc 2003, tere were approximately 84,000 students enrolled in scools in te Province of Newfoundland and Labrador, of wic an estimated 57,000 were transported by scool buses.

More information

1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution

1.6. Analyse Optimum Volume and Surface Area. Maximum Volume for a Given Surface Area. Example 1. Solution 1.6 Analyse Optimum Volume and Surface Area Estimation and oter informal metods of optimizing measures suc as surface area and volume often lead to reasonable solutions suc as te design of te tent in tis

More information

An Orientation to the Public Health System for Participants and Spectators

An Orientation to the Public Health System for Participants and Spectators An Orientation to te Public Healt System for Participants and Spectators Presented by TEAM ORANGE CRUSH Pallisa Curtis, Illinois Department of Public Healt Lynn Galloway, Vermillion County Healt Department

More information

Note: Principal version Modification Modification Complete version from 1 October 2014 Business Law Corporate and Contract Law

Note: Principal version Modification Modification Complete version from 1 October 2014 Business Law Corporate and Contract Law Note: Te following curriculum is a consolidated version. It is legally non-binding and for informational purposes only. Te legally binding versions are found in te University of Innsbruck Bulletins (in

More information

Strategic trading in a dynamic noisy market. Dimitri Vayanos

Strategic trading in a dynamic noisy market. Dimitri Vayanos LSE Researc Online Article (refereed) Strategic trading in a dynamic noisy market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt and Moral

More information

Geometric Stratification of Accounting Data

Geometric Stratification of Accounting Data Stratification of Accounting Data Patricia Gunning * Jane Mary Horgan ** William Yancey *** Abstract: We suggest a new procedure for defining te boundaries of te strata in igly skewed populations, usual

More information

Catalogue no. 12-001-XIE. Survey Methodology. December 2004

Catalogue no. 12-001-XIE. Survey Methodology. December 2004 Catalogue no. 1-001-XIE Survey Metodology December 004 How to obtain more information Specific inquiries about tis product and related statistics or services sould be directed to: Business Survey Metods

More information

Welfare, financial innovation and self insurance in dynamic incomplete markets models

Welfare, financial innovation and self insurance in dynamic incomplete markets models Welfare, financial innovation and self insurance in dynamic incomplete markets models Paul Willen Department of Economics Princeton University First version: April 998 Tis version: July 999 Abstract We

More information

Once you have reviewed the bulletin, please

Once you have reviewed the bulletin, please Akron Public Scools OFFICE OF CAREER EDUCATION BULLETIN #5 : Driver Responsibilities 1. Akron Board of Education employees assigned to drive Board-owned or leased veicles MUST BE FAMILIAR wit te Business

More information

Care after stroke. or transient ischaemic attack. Information for patients and their carers

Care after stroke. or transient ischaemic attack. Information for patients and their carers Care after stroke or transient iscaemic attack Information for patients and teir carers 2008 Tis booklet is based on te National Clinical Guideline for Stroke, tird edition, wic includes te National Institute

More information

Math Test Sections. The College Board: Expanding College Opportunity

Math Test Sections. The College Board: Expanding College Opportunity Taking te SAT I: Reasoning Test Mat Test Sections Te materials in tese files are intended for individual use by students getting ready to take an SAT Program test; permission for any oter use must be sougt

More information

Teams without Walls. The value of medical innovation and leadership

Teams without Walls. The value of medical innovation and leadership Teams witout Walls Te value of medical innovation and leadersip Report of a Working Party of te Royal College of Pysicians, te Royal College of General Practitioners and te Royal College of Paediatrics

More information

A system to monitor the quality of automated coding of textual answers to open questions

A system to monitor the quality of automated coding of textual answers to open questions Researc in Official Statistics Number 2/2001 A system to monitor te quality of automated coding of textual answers to open questions Stefania Maccia * and Marcello D Orazio ** Italian National Statistical

More information

- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz

- 1 - Handout #22 May 23, 2012 Huffman Encoding and Data Compression. CS106B Spring 2012. Handout by Julie Zelenski with minor edits by Keith Schwarz CS106B Spring 01 Handout # May 3, 01 Huffman Encoding and Data Compression Handout by Julie Zelenski wit minor edits by Keit Scwarz In te early 1980s, personal computers ad ard disks tat were no larger

More information

Research on the Anti-perspective Correction Algorithm of QR Barcode

Research on the Anti-perspective Correction Algorithm of QR Barcode Researc on te Anti-perspective Correction Algoritm of QR Barcode Jianua Li, Yi-Wen Wang, YiJun Wang,Yi Cen, Guoceng Wang Key Laboratory of Electronic Tin Films and Integrated Devices University of Electronic

More information

Research on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number

Research on Risk Assessment of PFI Projects Based on Grid-fuzzy Borda Number Researc on Risk Assessent of PFI Projects Based on Grid-fuzzy Borda Nuber LI Hailing 1, SHI Bensan 2 1. Scool of Arcitecture and Civil Engineering, Xiua University, Cina, 610039 2. Scool of Econoics and

More information

Derivatives Math 120 Calculus I D Joyce, Fall 2013

Derivatives Math 120 Calculus I D Joyce, Fall 2013 Derivatives Mat 20 Calculus I D Joyce, Fall 203 Since we ave a good understanding of its, we can develop derivatives very quickly. Recall tat we defined te derivative f x of a function f at x to be te

More information

RISK ASSESSMENT MATRIX

RISK ASSESSMENT MATRIX U.S.C.G. AUXILIARY STANDARD AV-04-4 Draft Standard Doc. AV- 04-4 18 August 2004 RISK ASSESSMENT MATRIX STANDARD FOR AUXILIARY AVIATION UNITED STATES COAST GUARD AUXILIARY NATIONAL OPERATIONS DEPARTMENT

More information

Writing Mathematics Papers

Writing Mathematics Papers Writing Matematics Papers Tis essay is intended to elp your senior conference paper. It is a somewat astily produced amalgam of advice I ave given to students in my PDCs (Mat 4 and Mat 9), so it s not

More information

ACT Math Facts & Formulas

ACT Math Facts & Formulas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationals: fractions, tat is, anyting expressable as a ratio of integers Reals: integers plus rationals plus special numbers suc as

More information

SAT Math Must-Know Facts & Formulas

SAT Math Must-Know Facts & Formulas SAT Mat Must-Know Facts & Formuas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Rationas: fractions, tat is, anyting expressabe as a ratio of integers Reas: integers pus rationas

More information

Ending tobacco smoking in Britain. Radical strategies for prevention and harm reduction in nicotine addiction

Ending tobacco smoking in Britain. Radical strategies for prevention and harm reduction in nicotine addiction Ending tobacco smoking in Britain Radical strategies for prevention and arm reduction in nicotine addiction A report by te Tobacco Advisory Group of te Royal College of Pysicians, September 2008 Acknowledgements

More information

Torchmark Corporation 2001 Third Avenue South Birmingham, Alabama 35233 Contact: Joyce Lane 972-569-3627 NYSE Symbol: TMK

Torchmark Corporation 2001 Third Avenue South Birmingham, Alabama 35233 Contact: Joyce Lane 972-569-3627 NYSE Symbol: TMK News Release Torcmark Corporation 2001 Tird Avenue Sout Birmingam, Alabama 35233 Contact: Joyce Lane 972-569-3627 NYSE Symbol: TMK TORCHMARK CORPORATION REPORTS FOURTH QUARTER AND YEAR-END 2004 RESULTS

More information

How doctors can close the gap

How doctors can close the gap RCP policy statement 2010 How doctors can close te gap Tackling te social determinants of ealt troug culture cange, advocacy and education Acknowledgements We would like to tank te Department of Healt

More information

SAT Subject Math Level 1 Facts & Formulas

SAT Subject Math Level 1 Facts & Formulas Numbers, Sequences, Factors Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reals: integers plus fractions, decimals, and irrationals ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences: PEMDAS (Parenteses

More information

Tis Problem and Retail Inventory Management

Tis Problem and Retail Inventory Management Optimizing Inventory Replenisment of Retail Fasion Products Marsall Fiser Kumar Rajaram Anant Raman Te Warton Scool, University of Pennsylvania, 3620 Locust Walk, 3207 SH-DH, Piladelpia, Pennsylvania 19104-6366

More information

How To Get A Garnisment On An Inerited Ir

How To Get A Garnisment On An Inerited Ir Valdivia v. Valdivia, %13 SO.2c1 1190 Page 1190 593 So.2d 1190 17 Fla. L. Weekly D514 Isabel VALDIVIA, Appellant, v. Ester Fajardo VALDIVIA, Appellee. No. 91-1438. District Court of Appeal of Florida,

More information

M(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1)

M(0) = 1 M(1) = 2 M(h) = M(h 1) + M(h 2) + 1 (h > 1) Insertion and Deletion in VL Trees Submitted in Partial Fulfillment of te Requirements for Dr. Eric Kaltofen s 66621: nalysis of lgoritms by Robert McCloskey December 14, 1984 1 ackground ccording to Knut

More information

Heterogeneous firms and trade costs: a reading of French access to European agrofood

Heterogeneous firms and trade costs: a reading of French access to European agrofood Heterogeneous firms and trade costs: a reading of Frenc access to European agrofood markets Cevassus-Lozza E., Latouce K. INRA, UR 34, F-44000 Nantes, France Abstract Tis article offers a new reading of

More information

Referendum-led Immigration Policy in the Welfare State

Referendum-led Immigration Policy in the Welfare State Referendum-led Immigration Policy in te Welfare State YUJI TAMURA Department of Economics, University of Warwick, UK First version: 12 December 2003 Updated: 16 Marc 2004 Abstract Preferences of eterogeneous

More information

f(a + h) f(a) f (a) = lim

f(a + h) f(a) f (a) = lim Lecture 7 : Derivative AS a Function In te previous section we defined te derivative of a function f at a number a (wen te function f is defined in an open interval containing a) to be f (a) 0 f(a + )

More information

a joint initiative of Cost of Production Calculator

a joint initiative of Cost of Production Calculator a joint initiative of Cost of Production Calculator 1 KEY BENEFITS Learn to use te MAKING MORE FROM SHEEP cost of production calculator to: Measure te performance of your seep enterprise year on year Compare

More information

Rewards-Supply Aggregate Planning in the Management of Loyalty Reward Programs - A Stochastic Linear Programming Approach

Rewards-Supply Aggregate Planning in the Management of Loyalty Reward Programs - A Stochastic Linear Programming Approach Rewards-Supply Aggregate Planning in te Management of Loyalty Reward Programs - A Stocastic Linear Programming Approac YUHENG CAO, B.I.B., M.Sc. A tesis submitted to te Faculty of Graduate and Postdoctoral

More information

EC201 Intermediate Macroeconomics. EC201 Intermediate Macroeconomics Problem set 8 Solution

EC201 Intermediate Macroeconomics. EC201 Intermediate Macroeconomics Problem set 8 Solution EC201 Intermediate Macroeconomics EC201 Intermediate Macroeconomics Prolem set 8 Solution 1) Suppose tat te stock of mone in a given econom is given te sum of currenc and demand for current accounts tat

More information

Improved dynamic programs for some batcing problems involving te maximum lateness criterion A P M Wagelmans Econometric Institute Erasmus University Rotterdam PO Box 1738, 3000 DR Rotterdam Te Neterlands

More information

Strategic trading and welfare in a dynamic market. Dimitri Vayanos

Strategic trading and welfare in a dynamic market. Dimitri Vayanos LSE Researc Online Article (refereed) Strategic trading and welfare in a dynamic market Dimitri Vayanos LSE as developed LSE Researc Online so tat users may access researc output of te Scool. Copyrigt

More information

Computer Science and Engineering, UCSD October 7, 1999 Goldreic-Levin Teorem Autor: Bellare Te Goldreic-Levin Teorem 1 Te problem We æx a an integer n for te lengt of te strings involved. If a is an n-bit

More information

Optimized Data Indexing Algorithms for OLAP Systems

Optimized Data Indexing Algorithms for OLAP Systems Database Systems Journal vol. I, no. 2/200 7 Optimized Data Indexing Algoritms for OLAP Systems Lucian BORNAZ Faculty of Cybernetics, Statistics and Economic Informatics Academy of Economic Studies, Bucarest

More information

Lecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function

Lecture 10: What is a Function, definition, piecewise defined functions, difference quotient, domain of a function Lecture 10: Wat is a Function, definition, piecewise defined functions, difference quotient, domain of a function A function arises wen one quantity depends on anoter. Many everyday relationsips between

More information

Free Shipping and Repeat Buying on the Internet: Theory and Evidence

Free Shipping and Repeat Buying on the Internet: Theory and Evidence Free Sipping and Repeat Buying on te Internet: eory and Evidence Yingui Yang, Skander Essegaier and David R. Bell 1 June 13, 2005 1 Graduate Scool of Management, University of California at Davis (yiyang@ucdavis.edu)

More information

DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES

DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES DEPARTMENT OF ECONOMICS HOUSEHOLD DEBT AND FINANCIAL ASSETS: EVIDENCE FROM GREAT BRITAIN, GERMANY AND THE UNITED STATES Sara Brown, University of Leicester, UK Karl Taylor, University of Leicester, UK

More information

Math 113 HW #5 Solutions

Math 113 HW #5 Solutions Mat 3 HW #5 Solutions. Exercise.5.6. Suppose f is continuous on [, 5] and te only solutions of te equation f(x) = 6 are x = and x =. If f() = 8, explain wy f(3) > 6. Answer: Suppose we ad tat f(3) 6. Ten

More information

SAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY

SAMPLE DESIGN FOR THE TERRORISM RISK INSURANCE PROGRAM SURVEY ASA Section on Survey Researc Metods SAMPLE DESIG FOR TE TERRORISM RISK ISURACE PROGRAM SURVEY G. ussain Coudry, Westat; Mats yfjäll, Statisticon; and Marianne Winglee, Westat G. ussain Coudry, Westat,

More information

New Vocabulary volume

New Vocabulary volume -. Plan Objectives To find te volume of a prism To find te volume of a cylinder Examples Finding Volume of a Rectangular Prism Finding Volume of a Triangular Prism 3 Finding Volume of a Cylinder Finding

More information

Unemployment insurance/severance payments and informality in developing countries

Unemployment insurance/severance payments and informality in developing countries Unemployment insurance/severance payments and informality in developing countries David Bardey y and Fernando Jaramillo z First version: September 2011. Tis version: November 2011. Abstract We analyze

More information

The modelling of business rules for dashboard reporting using mutual information

The modelling of business rules for dashboard reporting using mutual information 8 t World IMACS / MODSIM Congress, Cairns, Australia 3-7 July 2009 ttp://mssanz.org.au/modsim09 Te modelling of business rules for dasboard reporting using mutual information Gregory Calbert Command, Control,

More information

ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE

ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE ON LOCAL LIKELIHOOD DENSITY ESTIMATION WHEN THE BANDWIDTH IS LARGE Byeong U. Park 1 and Young Kyung Lee 2 Department of Statistics, Seoul National University, Seoul, Korea Tae Yoon Kim 3 and Ceolyong Park

More information

Chapter 10: Refrigeration Cycles

Chapter 10: Refrigeration Cycles Capter 10: efrigeration Cycles Te vapor compression refrigeration cycle is a common metod for transferring eat from a low temperature to a ig temperature. Te above figure sows te objectives of refrigerators

More information

Staying in-between Music Technology in Higher Education

Staying in-between Music Technology in Higher Education Staying in-between Music Tecnology in Higer Education (Post-modern) Callenges and Opportunities for Music Tecnology Education Carola Boem Carola Boem Centre for Music Tecnology Department of Music Department

More information

MULTY BINARY TURBO CODED WOFDM PERFORMANCE IN FLAT RAYLEIGH FADING CHANNELS

MULTY BINARY TURBO CODED WOFDM PERFORMANCE IN FLAT RAYLEIGH FADING CHANNELS Volume 49, Number 3, 28 MULTY BINARY TURBO CODED WOFDM PERFORMANCE IN FLAT RAYLEIGH FADING CHANNELS Marius OLTEAN Maria KOVACI Horia BALTA Andrei CAMPEANU Faculty of, Timisoara, Romania Bd. V. Parvan,

More information

Staffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky

Staffing and routing in a two-tier call centre. Sameer Hasija*, Edieal J. Pinker and Robert A. Shumsky 8 Int. J. Operational Researc, Vol. 1, Nos. 1/, 005 Staffing and routing in a two-tier call centre Sameer Hasija*, Edieal J. Pinker and Robert A. Sumsky Simon Scool, University of Rocester, Rocester 1467,

More information

Schedulability Analysis under Graph Routing in WirelessHART Networks

Schedulability Analysis under Graph Routing in WirelessHART Networks Scedulability Analysis under Grap Routing in WirelessHART Networks Abusayeed Saifulla, Dolvara Gunatilaka, Paras Tiwari, Mo Sa, Cenyang Lu, Bo Li Cengjie Wu, and Yixin Cen Department of Computer Science,

More information

To motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R}

To motivate the notion of a variogram for a covariance stationary process, { Ys ( ): s R} 4. Variograms Te covariogram and its normalized form, te correlogram, are by far te most intuitive metods for summarizing te structure of spatial dependencies in a covariance stationary process. However,

More information

Distances in random graphs with infinite mean degrees

Distances in random graphs with infinite mean degrees Distances in random graps wit infinite mean degrees Henri van den Esker, Remco van der Hofstad, Gerard Hoogiemstra and Dmitri Znamenski April 26, 2005 Abstract We study random graps wit an i.i.d. degree

More information

Model Quality Report in Business Statistics

Model Quality Report in Business Statistics Model Quality Report in Business Statistics Mats Bergdal, Ole Blac, Russell Bowater, Ray Cambers, Pam Davies, David Draper, Eva Elvers, Susan Full, David Holmes, Pär Lundqvist, Sixten Lundström, Lennart

More information

Yale ICF Working Paper No. 05-11 May 2005

Yale ICF Working Paper No. 05-11 May 2005 Yale ICF Working Paper No. 05-11 May 2005 HUMAN CAPITAL, AET ALLOCATION, AND LIFE INURANCE Roger G. Ibbotson, Yale cool of Management, Yale University Peng Cen, Ibbotson Associates Mose Milevsky, culic

More information

Predicting the behavior of interacting humans by fusing data from multiple sources

Predicting the behavior of interacting humans by fusing data from multiple sources Predicting te beavior of interacting umans by fusing data from multiple sources Erik J. Sclict 1, Ritcie Lee 2, David H. Wolpert 3,4, Mykel J. Kocenderfer 1, and Brendan Tracey 5 1 Lincoln Laboratory,

More information

Note nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1

Note nine: Linear programming CSE 101. 1 Linear constraints and objective functions. 1.1 Introductory example. Copyright c Sanjoy Dasgupta 1 Copyrigt c Sanjoy Dasgupta Figure. (a) Te feasible region for a linear program wit two variables (see tet for details). (b) Contour lines of te objective function: for different values of (profit). Te

More information

Comparison between two approaches to overload control in a Real Server: local or hybrid solutions?

Comparison between two approaches to overload control in a Real Server: local or hybrid solutions? Comparison between two approaces to overload control in a Real Server: local or ybrid solutions? S. Montagna and M. Pignolo Researc and Development Italtel S.p.A. Settimo Milanese, ITALY Abstract Tis wor

More information

Notes: Most of the material in this chapter is taken from Young and Freedman, Chap. 12.

Notes: Most of the material in this chapter is taken from Young and Freedman, Chap. 12. Capter 6. Fluid Mecanics Notes: Most of te material in tis capter is taken from Young and Freedman, Cap. 12. 6.1 Fluid Statics Fluids, i.e., substances tat can flow, are te subjects of tis capter. But

More information

Human Capital, Asset Allocation, and Life Insurance

Human Capital, Asset Allocation, and Life Insurance Human Capital, Asset Allocation, and Life Insurance By: P. Cen, R. Ibbotson, M. Milevsky and K. Zu Version: February 25, 2005 Note: A Revised version of tis paper is fortcoming in te Financial Analysts

More information

Children as insurance

Children as insurance J Popul Econ 2001) 14: 119±136 999 2001 Cildren as insurance Claus Cr. PoÈrtner University of Copenagen, Institute of Economics, Studiestraede 6, 1455 Copenagen K, Denmark Fax: 45-35323085, e-mail: claus.poertner@econ.ku.dk)

More information

Using Intelligent Agents to Discover Energy Saving Opportunities within Data Centers

Using Intelligent Agents to Discover Energy Saving Opportunities within Data Centers 1 Using Intelligent Agents to Discover Energy Saving Opportunities witin Data Centers Alexandre Mello Ferreira and Barbara Pernici Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico

More information

Pressure. Pressure. Atmospheric pressure. Conceptual example 1: Blood pressure. Pressure is force per unit area:

Pressure. Pressure. Atmospheric pressure. Conceptual example 1: Blood pressure. Pressure is force per unit area: Pressure Pressure is force per unit area: F P = A Pressure Te direction of te force exerted on an object by a fluid is toward te object and perpendicular to its surface. At a microscopic level, te force

More information

Analyzing the Effects of Insuring Health Risks:

Analyzing the Effects of Insuring Health Risks: Analyzing te Effects of Insuring Healt Risks: On te Trade-off between Sort Run Insurance Benefits vs. Long Run Incentive Costs Harold L. Cole University of Pennsylvania and NBER Soojin Kim University of

More information

Optimizing Desktop Virtualization Solutions with the Cisco UCS Storage Accelerator

Optimizing Desktop Virtualization Solutions with the Cisco UCS Storage Accelerator Optimizing Desktop Virtualization Solutions wit te Cisco UCS Accelerator Solution Brief February 2013 Higligts Delivers linear virtual desktop storage scalability wit consistent, predictable performance

More information

EXTRA PRACTICE 1 EXTRA PRACTICE VOCABULARY. Across. Down NAME. Circle seven words. Then complete the sentences with the words you circled.

EXTRA PRACTICE 1 EXTRA PRACTICE VOCABULARY. Across. Down NAME. Circle seven words. Then complete the sentences with the words you circled. EXTRA PRACTICE EXTRA PRACTICE NAME VOCABULARY Circle seven words. Ten complete te sentences wit te words you circled.. Many animals try to ide from teir..... Te coral snake is a poisonous..... A bee is

More information

Your List of Work Orders This Summer. (Hiking in these mountains is not on the list.)

Your List of Work Orders This Summer. (Hiking in these mountains is not on the list.) A Voice for HR Directors at Independent Scools S lifeline May 2013, Issue #6 Your List of Work Orders Tis Summer (Hiking in tese mountains is not on te list.) Work Orders n SOS HR Training (June 2013)

More information

Performance Evaluation of Selected Category of Public Sector Mutual Fund Schemes in India

Performance Evaluation of Selected Category of Public Sector Mutual Fund Schemes in India Performance Evaluation of Selected Category of Public Sector Mutual Scemes in India Dr. R. Karrupasamy Director, Department of Management Studies Neru College of Tecnology, Coimbatore, Sout India. Mrs.

More information

CHAPTER 7. Di erentiation

CHAPTER 7. Di erentiation CHAPTER 7 Di erentiation 1. Te Derivative at a Point Definition 7.1. Let f be a function defined on a neigborood of x 0. f is di erentiable at x 0, if te following it exists: f 0 fx 0 + ) fx 0 ) x 0 )=.

More information

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure

On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Saring Scemes Based on General Access Structure (Corrected Version) Ventzislav Nikov 1, Svetla Nikova 2, Bart

More information

13 PERIMETER AND AREA OF 2D SHAPES

13 PERIMETER AND AREA OF 2D SHAPES 13 PERIMETER AND AREA OF D SHAPES 13.1 You can find te perimeter of sapes Key Points Te perimeter of a two-dimensional (D) sape is te total distance around te edge of te sape. l To work out te perimeter

More information

10 Building Code Opportunities for California Local Governments

10 Building Code Opportunities for California Local Governments IN PARTNERSHIP WITH 0 Building Code Opportunities for California Local Governments Go beyond Title 24 codes by instituting local ordinances tat elp you reac your climate goals sooner and reap rewards earlier.

More information

Training Robust Support Vector Regression via D. C. Program

Training Robust Support Vector Regression via D. C. Program Journal of Information & Computational Science 7: 12 (2010) 2385 2394 Available at ttp://www.joics.com Training Robust Support Vector Regression via D. C. Program Kuaini Wang, Ping Zong, Yaoong Zao College

More information

CHAPTER TWO. f(x) Slope = f (3) = Rate of change of f at 3. x 3. f(1.001) f(1) Average velocity = 1.1 1 1.01 1. s(0.8) s(0) 0.8 0

CHAPTER TWO. f(x) Slope = f (3) = Rate of change of f at 3. x 3. f(1.001) f(1) Average velocity = 1.1 1 1.01 1. s(0.8) s(0) 0.8 0 CHAPTER TWO 2.1 SOLUTIONS 99 Solutions for Section 2.1 1. (a) Te average rate of cange is te slope of te secant line in Figure 2.1, wic sows tat tis slope is positive. (b) Te instantaneous rate of cange

More information

Dynamically Scalable Architectures for E-Commerce

Dynamically Scalable Architectures for E-Commerce MKWI 2010 E-Commerce und E-Business 1289 Dynamically Scalable Arcitectures for E-Commerce A Strategy for Partial Integration of Cloud Resources in an E-Commerce System Georg Lackermair 1,2, Susanne Straringer

More information

Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System

Design and Analysis of a Fault-Tolerant Mechanism for a Server-Less Video-On-Demand System Design and Analysis of a Fault-olerant Mecanism for a Server-Less Video-On-Demand System Jack Y. B. Lee Department of Information Engineering e Cinese University of Hong Kong Satin, N.., Hong Kong Email:

More information

Binary Search Trees. Adnan Aziz. Heaps can perform extract-max, insert efficiently O(log n) worst case

Binary Search Trees. Adnan Aziz. Heaps can perform extract-max, insert efficiently O(log n) worst case Binary Searc Trees Adnan Aziz 1 BST basics Based on CLRS, C 12. Motivation: Heaps can perform extract-max, insert efficiently O(log n) worst case Has tables can perform insert, delete, lookup efficiently

More information