Coordinated Denial-of-Service Attacks in IEEE Networks

Size: px
Start display at page:

Download "Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks"

Transcription

1 Coordnated Denal-of-Servce Attacks n IEEE Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay College of Crmnal Justce CUNY, New York, NY Emal: ssengupta@jjay.cuny.edu K.P. Subbalakshm Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ksubbala@stevens.edu Abstract The cogntve rado enabled IEEE wreless regonal area network (WRAN s desgned to opportunstcally utlze the unused or under-utlzed TV bands. However, due to the lack of proactve securty protocols and proper nteracton polces among the secondary networks themselves, the IEEE networks are vulnerable to varous denal-of-servce (DoS threats. In ths paper, we study the mpact of coordnated DoS attacks on IEEE networks from the malcous nodes perspectve. Assumng that multple malcous nodes wll launch coordnated attacks, we formulate a cooperatve game among the malcous nodes. The expresson of the net payoff s derved and the optmal decson strategy for the malcous nodes s obtaned numercally. Smulaton results demonstrate that the coordnated attack approach can enhance as hgh as -5% more net payoff for the malcous nodes than the uncoordnated attack. I. INTRODUCTION The conventonal fxed spectrum assgnment polcy has resulted n suboptmal use of spectrum resource leadng to over-utlzaton n some bands and under-utlzaton n others []. Ths observaton has led to the recent spectrum polcy reforms by Federal Communcaton Commsson (FCC. Ths goal, of dynamc spectrum access (DSA, s expected to be acheved va the recently proposed concept of cogntve rados. The IEEE s an emergng standard for cogntve rado-based wreless regonal area networks (WRANs. The IEEE standard ams at usng DSA to allow the geographcally unused, lcensed TV frequency spectrum to be used by unlcensed users on a non-nterferng bass [2]. To protect the prmary ncumbent servces, IEEE devces are requred to perform perodc spectrum sensng and evacuate promptly upon the return of the lcensed users. Even though the prmary user protecton mechansms have been proactvely specfed, nether the secondary-secondary nteracton mechansms nor the protecton of secondary devces/networks have been specfcally defned or addressed n IEEE standard [3]. Hence, the IEEE networks are vulnerable to denal-of-servce (DoS attacks, by whch the attacker wll prevent the secondary networks from usng the spectrum band effectvely or at all. Several research works are nvestgatng nto the dfferent securty aspects n cogntve rado networks [4], [5]. However, most of these works ether deal wth sngle malcous node or uncoordnated attacks by multple malcous nodes or are not specfc to IEEE In ths paper, we address a key fundamental queston: what f multple malcous nodes launch DoS attacks n a coordnated manner? Recently, a hacker brought down the Twtter by usng thousands of malware-nfected personal computers to launch DoS attacks coordnately, whch made mllons of Twtter users unable to access the servce. In the wreless DSA networks, ths knd of threat s even worse as specfc securty polces have not yet been developed. Thus, understandng ths attack model s absolutely crtcal. In ths work, we study the coordnated attack usng the concept of cooperatve game theory. In our model, the common goal of the malcous nodes s to dsrupt the communcatons of protocol complant IEEE secondary networks. We assume that the malcous nodes are also spectrum agle, but do not have a pror knowledge of the spectrum occupancy at any gven tme. We model ths problem as a cooperatve game where the malcous nodes wll collaborate to attack as many secondary networks as possble whle keepng ther costs to a mnmum. As a collaboratve team, the malcous nodes try to maxmze the net payoff rather than ther ndvdual payoffs. We derve the theoretcal expresson of the net payoff as well as the optmal strategy for the malcous nodes. Smulaton results demonstrate that the cooperaton among malcous nodes can remarkably ncrease ther net payoff compared to the noncooperatve attack. To the best of our knowledge, ths work s the frst attempt to analyze and understand the coordnated DoS attack n IEEE networks. The rest of ths paper s organzed as follows. The system model s dscussed n Secton II. In Secton III, we derve the expresson of the net payoff and the optmal strategy for malcous nodes. Secton IV presents the smulaton results and conclusons are drawn n the last Secton. II. SYSTEM MODEL A typcal IEEE cell s a sngle-hop, pont-tomultpont wreless network, n whch a central Base Staton (BS controls the medum access of a number of assocated consumer premse equpments (CPEs. In our model, we consder N avalable spectrum bands not beng used by prmary ncumbents, and n (n N such IEEE secondary networks. For smplcty, we assume that each secondary network transmts n a spectrum band free of nterference

2 of other secondary networks to guarantee hgh qualty-ofservce (QoS. Ths can be acheved va the IEEE selfcoexstence mechansm as presented n [6]. Thus, n out of N spectrum bands are concurrently used by the secondary networks. We refer to these n spectrum bands as busy bands and other N n spectrum bands as vacant bands. Moreover, let there be m (m N malcous nodes amng to attack the secondary networks. They can swtch among N bands but do not have a pror knowledge about whch bands the secondary networks are usng at any gven tme. We assume that the malcous nodes can use the common control channel (CCC to coordnate ther actons [7]. Before we begn the analyss, we frst defne the notatons that wll be used throughout the paper: The sum of payoffs for all malcous nodes. Indvdual payoff The payoff for one malcous node. c Swtchng cost: the energy consumed n swtchng from one spectrum band to another. g Attack gan: the ncentve obtaned by successfully attackng one secondary network. It s the motvaton for the malcous nodes to launch DoS attacks. A. Cooperatve Game Formulaton In the tradtonal non-cooperatve game, all players are assumed selfsh and act n a dstrbuted manner,.e., they make decsons ndependently to maxmze ther ndvdual payoffs. The soluton to the non-cooperatve game s the Nash equlbrum, whch s defned as a strategy set such that no player can ncrease ts ndvdual payoff by changng the strategy unlaterally [8]. However, the non-cooperatve Nash equlbrum just emphaszes the equlbrum among the ndependent players rather than ther common nterests [8]. If all players have the same objectve (e.g., n our case, all malcous nodes am to dsrupt the communcatons of IEEE secondary networks, non-cooperatve Nash equlbrum mght not be the best soluton because t does not take nto account the cooperaton among players. Hence, we study the behavors of malcous nodes from the cooperatve game theoretc pont of vew and nvestgate whether the cooperaton could mprove the benefts for the malcous nodes. Based on the system model, we consder m malcous nodes as the game players. Rather than beng "always greedy and proft seekng", all players are selfless and work as a collaboratve team. Each malcous node has two possble choces: stayng n the current band (savng swtchng cost or swtchng to other bands (expectng to attack another secondary network. If the malcous nodes successfully attack a secondary network, they wll obtan the attack gan, g. On the other hand, every swtch wll ncur a swtchng cost, c. The man assumpton n a cooperatve game s that all players wll reach a grand coalton before the game starts and are not allowed to devate from ths coalton. Otherwse, the players wll act ndvdually n a non-cooperatve way. The challenge n reachng an agreement s to allocate the total utltes to the players farly and effectvely. In our case, we apply Nash Barganng soluton whch provdes farness, unqueness and Pareto-optmzaton [8]. Due to the homogenety of all players, the most effectve way to dvde the utlty s equal allocaton. Thus, the optmzaton problem for the cooperatve game s to fnd a mechansm of swtchng or stayng for the malcous nodes such that the net payoff can be maxmzed. III. ANALYSIS OF NET PAYOFF AND OPTIMAL STRATEGY The pure strateges for the malcous nodes, n our case, are to ether stay n the current band or to swtch to another band. However, f the malcous nodes choose to stay n the same band always, they wll mss opportuntes to attack other secondary networks. On the other hand, f the strategy s to always swtch, ths could lead to some unnecessary costs. Therefore, t s necessary for the malcous nodes to adopt a mxed strategy space to fnd the optmal soluton. Assumng all players make ther moves smultaneously, we defne the mxed-strategy space for the malcous nodes as: S mxed = {(Swtch prob. = p, (Stay prob. = p}. ( That s, the players wll swtch wth probablty p and stay wth probablty p. The net payoff for the malcous nodes s equal to the total attack gan, whch depends on the number of secondary networks beng successfully attacked, mnus total swtchng costs. That n turn depends on how many malcous nodes actually choose to swtch. We consder two cases n ths game: Specal case: The game starts wth all the malcous nodes coexstng n one busy spectrum band. General case: The game starts wth the malcous nodes scattered over the spectrums bands. A. Specal Case In order to maxmze the net payoff, one malcous node wll be selected by the central entty to make sure the secondary network n the current busy band can be successfully attacked, and other m can choose to ether stay or swtch. The malcous nodes stayng n ths spectrum band wll jontly launch DoS attack n ths busy band, whereas the malcous nodes that swtch wll try to attack more secondary networks n other spectrum bands. As a result, the probablty that out of m malcous nodes wll swtch, Q(, follows a bnomal dstrbuton as: ( m Q( = p ( p m, m. (2 Moreover, snce the players have no dea about whch bands are occuped by the secondary networks, some malcous nodes may swtch to vacant bands. Let q be the probablty that the malcous node swtches to a busy band, whch s q = n N. Hence, the probablty that k out of swtchng malcous nodes land n the busy bands, R(k, s calculated as: ( R(k = q k ( q k, k. (3 k

3 Note that, among these k malcous nodes who swtch to busy bands, some may stll land up n the same band. Hence, t s necessary to know the number of busy bands that the malcous nodes have landed n. Thus, the probablty that j out of n secondary networks have been successfully attacked by k malcous nodes, f(j, s gven by (see detals n Appendx-I: f(j = ( n ( k j j ( k+n 2 n 2. (4 Let j be the random varable representng the number of compromsed secondary networks, then, the expected value of j, E(j, s gven by: { k E(j = j= f(j j, k > (5, k = Consoldatng Equatons (2 (5, we derve the expected net payoff, U(p, for the malcous nodes as: ( m ( m U(p = g Q( R(k E(j + c Q(. = k= = (6 The frst term on the rght hand sde (RHS of the equaton represents the expected attack gan and the second term represents the expected swtchng cost for the whole team. Based on the equal allocaton prncple, the common goal for the malcous nodes s to maxmze the net payoff. Thus, the optmal swtchng probablty p s calculated as: B. Generalzed Case p = arg max U(p. (7 p [,] In the generalzed case, the malcous nodes are randomly scattered over the avalable spectrum bands. The central entty plays an mportant role n the decson makng process of the players: Every malcous node senses ts spectrum band (to see whether t s used by a secondary network or not and reports back to the central entty before takng actons. The central entty sends the consoldated pcture back to the malcous nodes. To maxmze the attack gan, the malcous nodes, f they choose to swtch, wll potentally explore other unknown spectrum bands. Based on above assumpton, the malcous nodes can be dvded nto two subgroups: those that stand n the vacant bands and those that are n the busy bands. Those n the vacant bands wll defntely swtch to other spectrum bands because there s no ncentve n contnung to stay n a vacant band. On the other hand, those n the busy bands wll follow a smlar procedure to the specal case,.e., only one malcous node wll be selected to stay n each band and others can freely choose to ether stay or swtch wth a certan probablty. Let us suppose that, n a gven tme slot, the malcous nodes are scattered n L out of N bands, n whch h bands are used by h secondary networks. Thus, h malcous nodes wll be selected to stay n these busy bands. Let r be the random varable representng the number of malcous nodes landng n vacant bands. Therefore, the malcous node who chooses to swtch wll try to reach one of the other N L bands whose status s unknown. Thus, the mxed strategy space n Equaton ( s only appled to m h r malcous nodes. Denotng p as the swtchng probablty for the malcous nodes n the generalzed case and usng the same logc as n the specal case, we have followng expressons: Snce there are h players who defntely stay and r players who defntely swtch, we just consder the rest m h r players. The probablty of out of m h r malcous nodes choosng Swtch, Q (, s calculated as: ( m h r Q ( = p ( p m h r, m h r. (8 Snce swtchng malcous nodes wll explore N L spectrum bands whose status s unknown, n whch n h bands are used by secondary networks, the probablty for them to swtch to the busy bands, q, s q = n h N L. Together wth other r swtchng players, the probablty of k out of + r malcous nodes landng n the busy bands, R (k, s calculated as: ( + r R (k = k q k ( q +r k, k + r. (9 The probablty that j out of n h secondary networks have been successfully attacked s gven by f (j = ( n h ( k j j ( k+n h n h. ( The expected value for j, E (j, s calculated as: { k E (j = j= f (j j, k >, k = ( Consoldatng Equatons (8 (, we derve the net payoff for the malcous nodes n the generalzed case, U (p, as: ( m h r +r U (p = g Q ( R (k E (j + h c = k= ( m h r = Q ( + r. (2 Smlarly, the optmal strategy for the malcous nodes n the generalzed case s gven by: C. Numercal Results p = arg max p [,] U (p (3 Both Equaton (7 and Equaton (3 can be solved numercally. We set the parameter values as g = 5 and c = 2. For example, wth network parameters as: N = 5, n = 3 and m = 2, the numercal results for the specal and generalzed cases are shown n Fg.. As llustrated n Fg., there exsts a maxmum net payoff for the malcous nodes n each case, correspondng to a unque optmal strategy,.e., p = and p = 3 for the specal and generalzed case respectvely.

4 (a p p Fg.. The net payoff for the malcous nodes wth respect to swtchng probablty. (a specal case; (b generalzed case (wth temporary state as: L =, h = 6 and r = 6. IV. SIMULATION RESULTS AND INTERPRETATION In ths secton, we conduct smulatons to evaluate mprovement acheved by the cooperaton among the malcous nodes. We consder N = 5 avalable spectrum bands and also set g = 5 and c = 2. The smulaton results are averaged over, Monte Carlo smulatons. A. Smulatons for the Specal Case We frst conduct the smulaton for the specal case. Fg. 2 shows the theoretcal and smulaton results for the optmal swtchng probablty for the malcous nodes, p, for m malcous nodes. As evdent, the smulaton results matches the theoretcal results closely. Another observaton s that the probablty of swtchng s gradually convergng to wth the ncrease n the number of secondary networks, n. Ths s because, more secondary networks exstng around the spectrum bands mples better chance for the malcous nodes to swtch to the busy bands. Note that the theoretcal results are numercally derved from Equaton (7. (b we fx the number of the malcous nodes as m = 2, and vary the number of the secondary networks. As llustrated n ths fgure, the net payoff obtaned by coordnated attack acheves approxmate 5% mprovement to the non-cooperatve attack. Note that the strategy for the non-cooperatve game s Nash equlbrum strategy, whch, n our case, t s the swtchng probablty for each malcous node (see detals n Appendx-II. Wth the ncrease n the number of secondary networks, the malcous nodes followng the optmal strateges can get greater net payoff as expected Non cooperatve Cooperatve Fg. 3. The comparson of net payoff between the cooperatve and noncooperatve game for the specal case Non cooperatve (Case Non cooperatve (Case 2 Non cooperatve (Case 3 Cooperatve m= (a Theoretcal results Smulaton results m=25 Theoretcal results Smulaton results (c m= (b Theoretcal results Smulaton results m=3 Theoretcal results Smulaton results (d Fg. 2. The optmal probablty of swtchng for the malcous nodes, p, for the specal case wth varyng number of malcous nodes, m, and secondary networks, n. The comparson of the net payoffs between the cooperatve game and non-cooperatve game s shown n Fg. 3, n whch Fg. 4. The comparson of net payoff between the cooperatve and noncooperatve game for the generalzed case. B. Smulatons for the Generalzed Case In the general case, we consder m = 2 malcous nodes wth temporary state as: L =, h = 6, r = 6. When comparng performances of the cooperatve and noncooperatve attacks n the general case, we need to make malcous nodes who have optons to stay or swtch have the same Nash equlbrum pont n the non-cooperatve game such that t s calculable. Hence, we consder three partcular cases for malcous nodes as follows: Case : 4 out of 6 busy bands have multple players (each band wth 2 players and the other 2 busy bands have only one player. Case 2: 2 out of 6 busy bands have multple players (each band wth 5 players and the other 4 busy bands have only one player. Case 3: out of 6 busy bands have multple players (9 players n ths band and the other 5 busy bands have only one player.

5 In each case mentoned above, the malcous nodes n the busy bands are equvalent and thus have the same Nash equlbrum strategy, whch can be calculated followng the same logc gven n Appendx II. Fg. 4 shows the smulaton results of the comparson of net payoffs between the cooperatve and non-cooperatve attacks wth varyng number of secondary networks. Smlar to the general case, the cooperatve attack n the generalzed case also clearly outperforms the non-cooperatve attack from the malcous nodes perspectve. V. CONCLUSION In ths paper, we nvestgated the mpact of coordnated DoS attacks on IEEE networks from the perspectve of malcous nodes. Usng the concept of cooperatve game theory, we modeled the malcous nodes as a collaboratve team amng to maxmze ther net payoff by dsruptng the communcatons of good secondary networks. We analytcally derved the theoretcal expresson of net payoff and numercally obtaned the optmal strateges for the malcous nodes group from two dfferent perspectves. Smulaton results demonstrated that by takng the coordnated approach, the malcous nodes can acheve as hgh as -5% more net payoff than that f they do not cooperate. ACKNOWLEDGEMENT Ths work s partally supported by NSF Trustworthy Computng wth grant number 978 and NIJ NJ-IJ. APPENDIX I DERIVATION OF PROBABILITY f(j f(j s the probablty that j out n secondary networks are successfully attacked by k malcous nodes who swtch to these n busy bands and s gven by f(j = X Y Z, where X: Number of ways n whch j out of n secondary networks can be selected, whch s ( n j. Y : Number of ways n whch a group of k malcous nodes can brng down exactly j secondary networks. Ths s equvalent to the number of dstnct postve ntegervalued vector (x, x 2,, x j satsfyng x + x x j = k, whch s ( k j [9]. Z: Number of ways n whch k malcous nodes can dstrbute n n busy bands. Ths s equvalent to the number of dstnct nonnegatve nteger-valued vectors (x, x 2,, x n satsfyng x + x x n = k, whch s ( k+n 2 n 2 [9]. Therefore, f(j s gven by: f(j = ( n ( k j j ( k+n 2 n 2. (4 APPENDIX II THE MIXED-STRATEGY NASH EQUILIBRIUM OF THE NON-COOPERATIVE GAME FOR THE SPECIAL CASE In the non-cooperatve game, each malcous node s selfsh and can choose to swtch or stay ndependently. We assume that f more than one malcous nodes jontly attack the same secondary network n a spectrum band, each of them can get the average attack gan. For example, f 3 malcous nodes land n the same busy band, each can obtan g/3 attack gan. Wthout loss of generalty, we consder one typcal player, s, and the same reasonng apples to all other players. ( Expected payoff for the player s to stay: Let us denote θ as the swtchng probablty and so the probablty that out of other m malcous nodes wll also stay, Q stay (, s calculated as: ( m Q stay ( = ( θ θ m, m. (5 Thus, the expected payoff for player s to stay s gven by: E(stay = m = Q stay ( g +. (6 ( Expected payoff for the player s to swtch: The probablty that out of other m malcous nodes wll also swtch wth player s, Q swtch, s calculated as: ( m Q swtch ( = θ ( θ m, m. (7 Note that the probablty for the player s to swtch to the busy bands s also q = n N. Moreover, the probablty that exactly j out of players swtch to the same band wth player s, H(j, s calculated as: ( H(j = j (N j (N 2 N j. (8 Thus, the expected payoff for player s to swtch s gven by: E(swtch = m = j= q Q swtch ( H(j g c. (9 j + Consoldatng ( and (, the mxed-strategy Nash equlbrum for the malcous nodes, θ, s obtaned by mposng E(stay = E(swtch, whch can be solved numercally. REFERENCES [] F. C. Commsson, Spectrum polcy task force report, IEEE Transactons on Informaton Forenscs and Securty, pp. 2 55, Nov 22. [2] C. R. Stevenson, G. Chounard, Z. Le, W. Hu, S. J. Shellhammer, and W. Caldwell, IEEE 82.22: The frst cogntve rado wreless regonal area network standard, IEEE Communcaton Magazne, Jan. 29. [3] K. Ban and J.-M. J. Park, Securty vulnerabltes n IEEE 82.22, WICON 8, pp. 9, 28. [4] T. Clancy and N. Goergen, Securty n cogntve rado networks: Threats and Mtgaton, CrownCom 28, pp. 8, May 28. [5] R. Chen, J.-M. Park, and J. Reed, Defense aganst prmary user emulaton attacks n cogntve rado networks, Selected Areas n Communcatons, IEEE Journal on, vol. 26, no., pp , Jan. 28. [6] S. Sengupta, R. Chandramoul, S. Brahma, and M. Chatterjee, A game theoretc framework for dstrbuted self-coexstence among IEEE networks, IEEE GLOBECOM, Dec. 28. [7] I. F. Akyldz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, Next generaton/dynamc spectrum access/cogntve rado wreless networks: a survey, Comput. Netw., vol. 5, no. 3, pp , 26. [8] R. Myerson, Game Theory: Analyss of Conflct. Harvard Unv., 997. [9] S. Ross, A Frst Course n Probablty. Prentce Hall, 7 edton, 25.

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Economic Models for Cloud Service Markets

Economic Models for Cloud Service Markets Economc Models for Cloud Servce Markets Ranjan Pal and Pan Hu 2 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de Abstract. Cloud computng

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance

Allocating Collaborative Profit in Less-than-Truckload Carrier Alliance J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage Analyzng Self-Defense Investments n Internet Securty Under Cyber-Insurance Coverage Ranjan Pal Department of Computer Scence Unv. of Southern Calforna Emal: rpal@usc.edu Leana Golubchk Department of Computer

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

RESEARCH DISCUSSION PAPER

RESEARCH DISCUSSION PAPER Reserve Bank of Australa RESEARCH DISCUSSION PAPER Competton Between Payment Systems George Gardner and Andrew Stone RDP 2009-02 COMPETITION BETWEEN PAYMENT SYSTEMS George Gardner and Andrew Stone Research

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Optmal Revocatons n Ephemeral Networks

Optmal Revocatons n Ephemeral Networks Optmal Revocatons n Ephemeral Networks: A Game-Theoretc Framework Igor Blogrevc, Mohammad Hossen Manshae, Maxm Raya and Jean-Perre Hubaux Laboratory for computer Communcatons and Applcatons (LCA1), EPFL,

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076

More information

Optimization of Resource Allocation in Wireless Systems Based on Game Theory

Optimization of Resource Allocation in Wireless Systems Based on Game Theory Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al

More information

Evolution of Internet Infrastructure in the 21 st century: The Role of Private Interconnection Agreements

Evolution of Internet Infrastructure in the 21 st century: The Role of Private Interconnection Agreements Evoluton of Internet Infrastructure n the 21 st century: The Role of Prvate Interconnecton Agreements Rajv Dewan*, Marshall Fremer, and Pavan Gundepud {dewan, fremer, gundepudpa}@ssb.rochester.edu Smon

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Economic Models for Cloud Service Markets Pricing and Capacity Planning

Economic Models for Cloud Service Markets Pricing and Capacity Planning Economc Models for Cloud Servce Markets Prcng and Capacty Plannng Ranjan Pal 1 and Pan Hu 2 1 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de

More information

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative.

Problem Set 3. a) We are asked how people will react, if the interest rate i on bonds is negative. Queston roblem Set 3 a) We are asked how people wll react, f the nterest rate on bonds s negatve. When

More information

Necessary Of A Retaler-Operator

Necessary Of A Retaler-Operator Decentralzed Inventory Sharng wth Asymmetrc Informaton Xnghao Yan Hu Zhao 1 xyan@vey.uwo.ca zhaoh@purdue.edu Rchard Ivey School of Busness The Unversty of Western Ontaro Krannert School of Management Purdue

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,

More information

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks

Fuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Internet can be trusted and that there are no malicious elements propagating in the Internet. On the contrary, the

Internet can be trusted and that there are no malicious elements propagating in the Internet. On the contrary, the Prcng and Investments n Internet Securty 1 A Cyber-Insurance Perspectve Ranjan Pal, Student Member, IEEE, Leana Golubchk, Member, IEEE, arxv:submt/0209632 [cs.cr] 8 Mar 2011 Abstract Internet users such

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression.

Lecture 3: Annuity. Study annuities whose payments form a geometric progression or a arithmetic progression. Lecture 3: Annuty Goals: Learn contnuous annuty and perpetuty. Study annutes whose payments form a geometrc progresson or a arthmetc progresson. Dscuss yeld rates. Introduce Amortzaton Suggested Textbook

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

Pricing Internet Access for Disloyal Users: A Game-Theoretic Analysis

Pricing Internet Access for Disloyal Users: A Game-Theoretic Analysis Prcng Internet Access for Dsloyal Users: A Game-Theoretc Analyss Gergely Bczók, Sándor Kardos and Tuan Anh Trnh Hgh Speed Networks Lab, Dept. of Telecommuncatons & Meda Informatcs Budapest Unversty of

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Cooperatives and Payment Schemes

Cooperatives and Payment Schemes Cooperatves and Payment Schemes Peter Bogetoft & Henrk B. Olesen Cooperatves and Payment Schemes Lessons from theory and examples from Dansh agrculture Copenhagen Busness School Press 2007 Cooperatves

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Small pots lump sum payment instruction

Small pots lump sum payment instruction For customers Small pots lump sum payment nstructon Please read these notes before completng ths nstructon About ths nstructon Use ths nstructon f you re an ndvdual wth Aegon Retrement Choces Self Invested

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Section 5.3 Annuities, Future Value, and Sinking Funds

Section 5.3 Annuities, Future Value, and Sinking Funds Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Far and Effcent User-Network Assocaton Algorthm for Mult-Technology Wreless Networks Perre Coucheney, Cornne Touat and Bruno Gaujal INRIA Rhône-Alpes and LIG, MESCAL project, Grenoble France, {perre.coucheney,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Towards a Formal Framework for Multi-Objective Multi-Agent Planning

Towards a Formal Framework for Multi-Objective Multi-Agent Planning Towards a Formal Framework for Mult-Objectve Mult-Agent Plannng Abdel-Illah Mouaddb, Matheu Boussard, Maroua Bouzd Maréchal Jun, Campus II BP 5186 Computer Scence Department 14032 Caen Cedex, France (mouaddb,mboussar,bouzd@nfo.uncaen.fr

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

This paper concerns the evaluation and analysis of order

This paper concerns the evaluation and analysis of order ORDER-FULFILLMENT PERFORMANCE MEASURES IN AN ASSEMBLE- TO-ORDER SYSTEM WITH STOCHASTIC LEADTIMES JING-SHENG SONG Unversty of Calforna, Irvne, Calforna SUSAN H. XU Penn State Unversty, Unversty Park, Pennsylvana

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Ths artcle appeared n a ournal publshed by Elsever. The attached copy s furnshed to the author for nternal non-commercal research educaton use, ncludng for nstructon at the authors nsttuton sharng wth

More information

Supply network formation as a biform game

Supply network formation as a biform game Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

Cross-Selling in a Call Center with a Heterogeneous Customer Population

Cross-Selling in a Call Center with a Heterogeneous Customer Population OPERATIONS RESEARCH Vol. 57, No. 2, March Aprl 29, pp. 299 313 ssn 3-364X essn 1526-5463 9 572 299 nforms do 1.1287/opre.18.568 29 INFORMS Cross-Sellng n a Call Center wth a Heterogeneous Customer Populaton

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information