A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
|
|
|
- Branden Lyons
- 9 years ago
- Views:
Transcription
1 A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006, Chna [email protected], [email protected] Departent of Coputer Scence, Texas A& Unversty, College Staton, TX , USA [email protected] Abstract. Ths paper presents a new statstcal odel for detectng sgns of abnoralty n statc-prorty schedulng networks wth dfferentated servces at connecton levels on a class-by-class bass. The forulas n ters of detecton probablty, ss probablty, probabltes of classfcatons, and detecton threshold are proposed. Keywords: Anoaly detecton, real-te systes, traffc constrant, statcprorty schedulng networks, dfferentated servces, te seres. 1 Introducton Anoaly detecton has ganed applcatons n coputer councaton networks, such as network securty, see e.g. [1], [], [3], [4], [5], [6], [7]. Ths paper consders the abnoralty dentfcaton of arrval traffc te seres (traffc for short) at connecton levels, whch relates to traffc odels. In traffc engneerng, traffc odels can be classfed nto two categores [8]. One s statstcally odelng as can be seen fro [9], [10], [11]. The other bounded odelng, see e.g. [1], [13], [14], [15]. Though statstcally odelng has ganed consderable progresses, one thng worth notng s that they are well n agreeent wth real lfe data n aggregated case. In general, nevertheless, they are not enough when traffc at connecton levels has to be taken nto account. In fact, traffc odelng at connecton level reans challengng n the feld [16]. In the acadec area of coputer scence, a rearkable thng to odel traffc at connecton level s to study traffc fro a vew of deternstc queung theory, whch s often called network calculus or bounded odelng. One of the contrbutons n ths paper s to develop traffc constrant (a knd of deternstcally bounded odel [13]) nto a statstcal bound of traffc. Recent developents of networkng exhbt that there exsts an ncreased nterest n dfferentated servces (DffServ) [13], [17]. ro a vew of abnoralty detecton, nstead of detectng abnoralty of all connectons, we are ore nterested n Y. Hao et al. (Eds.): CIS 005, Part II, LNAI 380, pp. 67 7, 005. Sprnger-Verlag Berln Hedelberg 005
2 68. L and W. Zhao dentfyng abnoralty of soe connectons n practce. Thus, ths paper studes abnoralty detecton n the envronent of DffServ. As far as detectons were concerned, the current stuaton s not lackng ethods for detectons [18] but short of relable detectons as can be seen fro the stateent lke ths. The challenge s to develop a syste that detects close to 100 percent of attacks. We are stll far fro achevng ths goal [19]. ro a vew of statstcal detecton, however, nstead of developng a way to detect close to 100 percent of abnoralty, we study how to acheve an accurate detecton for a gven detecton probablty. By accurate detecton, we ean that a detecton odel s able to report sgns of abnoralty for a predeterned detecton probablty. Ths presentaton proposes an accurate detecton odel of abnoralty n statc-prorty schedulng networks wth DffServ based on two ponts: 1) the null hypotheses and ) averagng traffc constrant n [13]. A key pont n ths contrbuton s to randoze traffc constrant on an nterval-by-nterval bass so as to utlze the technques fro a vew of te seres to carry out a statstcal traffc bound, whch we shall call average traffc constrant for splcty. To our best knowledge, ths paper s the frst attept to propose average traffc constrant fro a vew of stochastc processes and oreover apply t to abnoralty detecton. The rest of paper s organzed as follows. Secton ntroduces an average traffc constrant n statc-prorty schedulng networks wth DffServ. Secton 3 dscusses detecton probablty and detecton threshold. Secton 4 concludes the paper. Average Traffc Constrant In ths secton, we frst bref the conventonal traffc constrant. Then, randoze t to a statstcal constrant of traffc. The traffc constrant s gven by the followng defnton. Defnton 1: Let f() t be arrval traffc functon. If f( t+ I) f( t) ( I) for t > 0 and I > 0, then ( I ) s called traffc constrant functon of f( t ) [13]. Defnton 1 s a general descrpton of traffc constrant, eanng that the ncreent of traffc f( t ) s upper-bounded by I ( ). It s actually a bounded traffc odel [13]. The practcal sgnfcance of such odel s to odel traffc at connecton level. Due to ths, we wrte the traffc constrant functon of group of flows as follows. Defnton : Let fp, j, k() t be all flows of class wth prorty p gong through server k fro nput lnk j. Let () k t be the traffc constrant functon of (). f kt Then, () k t s gven by ( ) f k t+ I () f k t ( ) k I for t > 0 and I > 0. Defnton provdes a bounded odel of traffc n statc-prorty schedulng networks wth DffServ at connecton level. Nevertheless, t s stll a deternstc odel n the bounded odelng sense. We now present a statstcal odel fro a vew of bounded odelng. Theoretcally, the nterval length I can be any postvely real nuber. In practce, however, t s usually selected as a fnte postve nteger n practce. x the value of
3 A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks 69 I and observe ( ) k I n the nterval [( n 1) I, ni], n= 1,,..., N. or each nterval, there s a traffc constrant functon ( ), k I whch s also a functon of the ndex n. We denote ths functon k(, I n ). Usually, k(, I n) k(, I q) for n q. Therefore, (, ) k I n s a rando varable over the ndex n. Now, dvde the nterval [( n 1) I, ni] nto non-overlapped segents. Each segent s of L length. or the th segent, we copute the ean E[ k( I, n)] ( = 1,,..., ), where E s the ean operator. Agan, E [ k( I, n)] l E[ for l. Thus, E[ s a rando varable too. Accordng to statstcs, f 10, E[ ( I, n )] qute accurately follows Gaussan dstrbuton [1], [0]. In ths case, k E[ ( I, n )] ~ k 1 π { E [ k( I, n)] µ ( )} exp[ ], (1) where s the varance of E[ and µ ( ) s ts ean. We call E[ ( I, n )] average traffc constrant of traffc flow f ().,, t k p j k 3 Detecton Probablty In the case of 10, t s easly seen that µ ( ) E[ k( I, n)] Pr ob z1 α / < zα / = 1 α, () where (1 α) s called confdence coeffcent. Let C (, α ) be the confdence nterval wth (1 α) confdence coeffcent. Then, zα / zα / C (, α ) = µ ( ), µ ( ) +. (3) The above expresson exhbts that µ ( ) s a teplate of average traffc constrant. Statstcally, we have (1 α)% confdence to say that E[ / takes µ ( ) as ts approxaton wth the varaton less than or equal to z α. Denote ξ E [ k( I, n)]. Then, On the other hand, / Pr ob ( ) z α α ξ > µ + =. / Pr ob ( ) z α α ξ µ =. (4) (5)
4 70. L and W. Zhao or facltatng the dscusson, two ters are explaned as follows. Correctly recognzng an abnoral sgn eans detecton and falng to recognze t ss. We explan the detecton probablty as well as ss probablty by the followng theore. Theore 1 (Detecton probablty and detecton threshold): Let / V ( ) z α = µ + (6) be the detecton threshold. Let P det and P ss be detecton probablty and ss probablty, respectvely. Then, P det = PV { < ξ < } = (1 α /), (7) P ss = P{ < ξ < V} = α /. (8) Proof: The probablty of ξ C (, α) s (1 α ). Accordng to () and (5), the probablty of ξ V s (1 α / ). Therefore, ξ > V exhbts a sgn of abnoralty wth (1 α / ) probablty. Hence, P det =(1 α /). Snce detecton probablty plus ss one equals 1, P ss = α /. ro Theore 1, we can acheve the followng statstcal classfcaton crteron for a gven detecton probablty by settng the value α. Corollary 1 (Classfcaton): Let f () k t be arrval traffc of class wth prorty p gong through server k fro nput lnk j at a protected ste. Then, () f k t N f E[ k( I, n)] V (9a) where N ples noral set of traffc flow, and () f kt A f E[ k( I, n)] > V. (9b) where A ples abnoral set. The proof s straghtforward fro Theore 1. The dagra of our detecton s ndcated n g. 1. Settng detecton probablty (1 α / ) f(t) eature ξ Report Classfer extractor ξ µ () Teplate V ξ Establshng teplate Detecton threshold g. 1. Dagra of detecton odel
5 A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks 71 4 Conclusons In ths paper, we have extended the traffc constrant n [13], whch s conventonally a bound functon of arrval traffc, to a te seres by averagng traffc constrants of flows on an nterval-by-nterval bass n DffServ envronent. Then, we have derved a statstcal traffc constrant to bound traffc. Based on ths, we have proposed a statstcal odel for the purpose of abnoralty detecton n statc-prorty schedulng networks wth dfferentated servces at connecton level. Wth the present odel, sgns of abnoralty can be dentfed on a class-by-class bass accordng to a detecton probablty that s predeterned. The detecton probablty ay be very hgh and ss probablty ay be very low f α s set to be very sall. The results n the paper suggest that abnoralty sgns can be detected at early stage that abnoralty occurs snce dentfcaton s done at connecton level. Acknowledgeents Ths work was supported n part by the Natonal Natural Scence oundaton of Chna (NSC) under the project grant nuber , by the Natonal Scence oundaton under Contracts , , , by the Defense Advanced Research Projects Agency under Contract , and by Texas A& Unversty under ts Telecouncaton and Inforaton Task orce Progra. Any opnons, fndngs, conclusons, and/or recoendatons expressed n ths ateral, ether expressed or pled, are those of the authors and do not necessarly reflect the vews of the sponsors lsted above. References 1. L,.: An Approach to Relably Identfyng Sgns of DDOS lood Attacks based on LRD Traffc Pattern Recognton. Coputer & Securty 3 (004) Bettat, R., Zhao, W., Teodor, D.: Real-Te Intruson Detecton and Suppresson n AT Networks. Proc., the 1st USENIX Workshop on Intruson Detecton and Network ontorng, Aprl 1999, Schultz, E.: Intruson Preventon. Coputer & Securty 3 (004) Cho, S.-B., Park, H.-J.: Effcent Anoaly Detecton by odelng Prvlege lows Usng Hdden arkov odel. Coputer & Securty (003) Cho, S., Cha, S.: SAD: Web Sesson Anoaly Detecton based on Paraeter Estaton. Coputer & Securty 3 (004) Gong,.: Decpherng Detecton Technques: Part III Denal of Servce Detecton. Whte Paper, cafee Network Securty Technologes Group, Jan Sorensen, S.: Copettve Overvew of Statstcal Anoaly Detecton. Whte Paper, Junper Networks Inc., chel, H., Laevens, K.: Teletraffc Engneerng n a Broad-Band Era. Proc. IEEE 85 (1997) Wllnger, W., Paxson, V.: Where atheatcs eets the Internet. Notces of the Aercan atheatcal Socety 45 (1998)
6 7. L and W. Zhao 10. L,., Zhao, W., and et al.: odelng Autocorrelaton unctons of Self-Slar Teletraffc n Councaton Networks based on Optal Approxaton n Hlbert Space. Appled atheatcal odellng 7 (003) L,., L, SC.: odelng Network Traffc Usng Cauchy Correlaton odel wth Long- Range Dependence. odern Physcs Letters B 19 (005) L.-Boudec, J.-Yves, Patrck, T.: Network Calculus, A Theory of Deternstc Queung Systes for the Internet. Sprnger (001) 13. Wang, S., Xuan, D., Bettat, R., Zhao, W.: Provdng Absolute Dfferentated Servces for Real-Te Applcatons n Statc-Prorty Schedulng Networks. IEEE/AC T. Networkng 1 (004) Cruz, L.: A Calculus for Network Delay, Part I: Network Eleents n Isolaton; Part II: Network Analyss. IEEE T. Infor. Theory 37 (1991) , Chang, C. S.: On Deternstc Traffc Regulaton and Servce Guarantees: a Systeatc Approach by lterng. IEEE T. Inforaton Theory 44 (1998) Estan C., Varghese, G.: New Drectons n Traffc easureent and Accountng: ocusng on the Elephants, Ignorng the ce. AC T. Coputer Systes 1 (003) ne, I.: PLS DffServ-Aware Traffc Engneerng. Whte Paper, Junper Networks Inc., Leach, J.: TBSE An Engneerng Approach to The Desgn of Accurate and Relable Securty Systes. Coputer & Securty 3 (004) Keerer, R. A., Vgna, G.: Intruson Detecton: a Bref Hstory and Overvew. Suppleent to Coputer (IEEE Securty & Prvacy) 35 (00) Bendat, J. S., Persol, A. G.: Rando Data: Analyss and easureent Procedure. nd Edton, John Wley & Sons (1991)
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
Basic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
An Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
SIMPLE LINEAR CORRELATION
SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
How Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
A FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting
Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
BERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
Binomial Link Functions. Lori Murray, Phil Munz
Bnomal Lnk Functons Lor Murray, Phl Munz Bnomal Lnk Functons Logt Lnk functon: ( p) p ln 1 p Probt Lnk functon: ( p) 1 ( p) Complentary Log Log functon: ( p) ln( ln(1 p)) Motvatng Example A researcher
PERRON FROBENIUS THEOREM
PERRON FROBENIUS THEOREM R. CLARK ROBINSON Defnton. A n n matrx M wth real entres m, s called a stochastc matrx provded () all the entres m satsfy 0 m, () each of the columns sum to one, m = for all, ()
Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
Efficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
Two-Phase Traceback of DDoS Attacks with Overlay Network
4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of
A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departamento de Matemática Aplicada, Universidad de La Habana
REVISTA INVESTIGACION OPERACIONAL Vol., No. 3, 000 A NOTE ON THE PREDICTION AND TESTING OF SYSTEM RELIABILITY UNDER SHOCK MODELS C. Bouza, Departaento de Mateátca Aplcada, Unversdad de La Habana ABSTRACT
The OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
A Probabilistic Theory of Coherence
A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
Secure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna [email protected] Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
Virtual machine resource allocation algorithm in cloud environment
COMPUTE MOELLIN & NEW TECHNOLOIES 2014 1(11) 279-24 Le Zheng Vrtual achne resource allocaton algorth n cloud envronent 1, 2 Le Zheng 1 School of Inforaton Engneerng, Shandong Youth Unversty of Poltcal
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
The Application of Fractional Brownian Motion in Option Pricing
Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn [email protected]
Time Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters
Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *
Maximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI [email protected] Clare Matheu Brown Unversty rovdence, RI [email protected] Danel Rcketts Brown Unversty rovdence, RI [email protected]
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
ENVIRONMENTAL MONITORING Vol. II - Statistical Analysis and Quality Assurance of Monitoring Data - Iris Yeung
STATISTICAL ANALYSIS AND QUALITY ASSURANCE OF MONITORING DATA Irs Yeung Cty Unversty of Hong Kong, Kowloon, Hong Kong Keywords: AIC, ARIMA model, BIC, cluster analyss, dscrmnant analyss, factor analyss,
An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System
201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected];
Classification of Network Traffic via Packet-Level Hidden Markov Models
Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,
Statistical Methods to Develop Rating Models
Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and
A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
An Approach For: Improving Voice Command processor Based On Better Features and Classifiers Selection
An Approach For: Iprovng Voce Coand processor Based On Better Features and Classfers Selecton Mohaed FEZARI 1, Al Al-Dhoud 1.Laboratory of Autoatc and Sgnals, Annaba, BP.1, Annaba, 3, ALGERIA. Faculty
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School
Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management
Statistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
7.5. Present Value of an Annuity. Investigate
7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on
Naglaa Raga Said Assistant Professor of Operations. Egypt.
Volue, Issue, Deceer ISSN: 77 8X Internatonal Journal of Adanced Research n Coputer Scence and Software Engneerng Research Paper Aalale onlne at: www.jarcsse.co Optal Control Theory Approach to Sole Constraned
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Traffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
STATISTICAL DATA ANALYSIS IN EXCEL
Mcroarray Center STATISTICAL DATA ANALYSIS IN EXCEL Lecture 6 Some Advanced Topcs Dr. Petr Nazarov 14-01-013 [email protected] Statstcal data analyss n Ecel. 6. Some advanced topcs Correcton for
A Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
A DATA MINING APPLICATION IN A STUDENT DATABASE
JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul
A Programming Model for the Cloud Platform
Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna [email protected]
Support vector domain description
Pattern Recognton Letters 20 (1999) 1191±1199 www.elsever.nl/locate/patrec Support vector doman descrpton Davd M.J. Tax *,1, Robert P.W. Dun Pattern Recognton Group, Faculty of Appled Scence, Delft Unversty
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
CHAPTER 14 MORE ABOUT REGRESSION
CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
Handwritten Nushu Character Recognition Based on Hidden Markov Model
JORNAL OF COMPTERS VOL. 5 NO. 5 MAY 00 663 Handwrtten Nushu Character Recognton Based on Hdden Marov Model Jangng Wang Rongbo Zhu College of Coputer Scence South-Central nversty for Natonaltes Wuhan 430074
CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, [email protected] Zhyng
NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
The Distribution of Eigenvalues of Covariance Matrices of Residuals in Analysis of Variance
JOURNAL OF RESEARCH of the Natonal Bureau of Standards - B. Mathem atca l Scence s Vol. 74B, No.3, July-September 1970 The Dstrbuton of Egenvalues of Covarance Matrces of Resduals n Analyss of Varance
Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000
Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS
IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,
