Mining Web User Behaviors to Detect Application Layer DDoS Attacks

Size: px
Start display at page:

Download "Mining Web User Behaviors to Detect Application Layer DDoS Attacks"

Transcription

1 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL Mining Web User Behaviors o Deec Applicaion Layer DDoS Aacks Chuibi Huang Deparmen of Auomaion, USC Key laboraory of nework communicaion sysem and conrol Hefei, China hcb@mail.usc.edu.cn Jinlin Wang, 2, Gang Wu, Jun Chen 2 2 Insiue of Acousics, Chinese Academy of Sciences Naional Nework New Media Engineering Research Cener Beijing, China {wangjl, chenj}@dsp.ac.cn Absrac Disribued Denial of Service (DDoS) aacks have caused coninuous criical hreas o he Inerne services. DDoS aacks are generally conduced a he nework layer. Many DDoS aack deecion mehods are focused on he IP and CP layers. However, hey are no suiable for deecing he applicaion layer DDoS aacks. In his paper, we propose a scheme based on web user browsing behaviors o deec he applicaion layer DDoS aacks (app-ddos). A clusering mehod is applied o exrac he access feaures of he web objecs. Based on he access feaures, an exended hidden semi-markov model is proposed o describe he browsing behaviors of web user. he deviaion from he enropy of he raining daa se fiing o he hidden semi-markov model can be considered as he abnormaliy of he observed daa se. Finally experimens are conduced o demonsrae he effeciveness of our model and algorihm. Index erms HsMM, web user behaviors, DDoS, DDoS Aacks, clusering I. INRODUCION Disribued Denial of Service (DDoS) aacks have become a serious problem in recen years. Generally, DDoS aacks are carried ou a he nework layer, such as ICMP flooding, SYN flooding and UDP flooding. Wihou advance warning, a DDoS aack can easily exhaus he compuing and communicaion resources of is vicim wihin a shor period of ime []. Because of he seriousness and desruciveness, many sudies have been conduced on his ype of aacks. A lo of effecive schemes have been proposed o proec he nework and equipmen from bandwidh aack, so i is no as efforless as in he pas for aackers o launch he nework layer DDoS aacks. In order o dodge deecion, aackers shif heir offensive sraegies o applicaion-layer aacks and esablish more sophisicaed ypes of DDoS aacks. hey uilize legiimae applicaion layer HP requess from legiimaely conneced nework machines o overwhelm web server. hese aacks are ypically more efficien han CP or UDP-based aacks, requiring fewer nework connecions o achieve heir malicious purposes. he MyDoom worm and he CyberSlam are all insances of his ype aack [2, 3]. he challenges of deecing he app-ddos aacks can be summarized as he following aspecs: he app-ddos aacks make use of higher layer proocols such as HP o pass hrough mos of he curren anomaly deecion sysems designed for low layers. Along wih flooding, App-DDoS races he average reques rae of he legiimae user and uses he same rae for aacking he server, or employs large-scale bone o generae low rae aack flows. his makes DDoS aacks deecion more difficul. Burs raffic and high volume are he common characerisics of App-DDoS aacks and flash crowds. "Flash crowd" refers o he siuaion when a very large number of users simulaneously access a popular Websie, which produces a surge in raffic o he Websie and migh cause he sie o be virually unreachable [4]. I is no easy for curren echniques o disinguish APP-DDoS aacks from flash crowds. From he lieraure, few exiing researches focus on he deecion of app-ddos aacks during he flash crowd even. his paper inroduces he hidden semi-markov model (HsMM) o capure he user browsing paerns during flash crowd and o implemen he app-ddos aacks deecion. Our conribuions in his paper are hreefold: ) We use he clusering mehod o exrac he web objecs' access feaures, which can well porray curren web user browsing behaviors. 2) We apply hidden semi-markov model (HsMM) o describe he dynamics of access feaures and o implemen he deecion of app- DDoS aacks. 3) Experimens based on real raffic are conduced o validae our deecion scheme. he organizaion of he paper is as follows. In he nex secion, we review he relaed work of our research. In 24 ACADEMY PUBLISHER doi:.434/jsw

2 986 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 Secion 3, we explain our model and algorihm o deec he app-ddos aacks. Experimen resuls are presened in secion 4. Finally, we conclude our paper in Secion 5. II. RELAED WORK Mos curren DDoS-relaed researches are conduced on he IP layer or CP layer insead of he applicaion layer. hese mechanisms ypically uilize he specific nework feaures o deec aacks. Mirkovic e al. [5] proposed a defense sysem called D-WARD locaed in edge rouers o monior he asymmery of wo-way packe raes and o deec aacks. Yu e al. [6] discriminaed DDoS aacks from flash crowds by using he flow correlaion coefficien as a similariy meric among suspicious flows. Zhang e al. [7] proposed he Congesion Paricipaion Rae (CPR) meric and a CPRbased approach o deec and filer he CP layer DDos aacks. Cabrera e al. [8] depend on he MIB raffic variables colleced from he sysems of aackers o achieve he early deecion. Yuan e al. [9] capure he raffic paern by using cross correlaion analysis and hen decide where and when a DDoS aack possibly arises. Soule e al. [] used he raffic marix, which represens he raffic sae, o idenify various dynamic aacks a early sage. In [], DDoS aacks were discovered by analyzing he CP packe header agains he well-defined rules and condiions and disinguished he difference beween normal and abnormal raffic. In [2], aackes are deeced by compuing he rae of CP flags o CP packes received a a web server. However, here are lile DDoS defense mehods ha uilize he applicaion layer informaion. In [9], a suspicion assignmen mechanism Ranjan e al. [9] used saisical mehod o deec ime relaed characerisics of HP sessions, such as reques inerarrival ime, session iner-arrival ime and session arrival ime. Yen e al. [2] defended he applicaion DDoS aacks wih consrain random reques aacks by he saisical mehods. Kandula e al. [3] designed a sysem o proec a web cluser from DDoS aacks by (i) opimally dividing ime spen in auhenicaing new cliens and serving auhenicaed cliens (ii) using CAPCHAs designing a probabilisic auhenicaion mechanism, bu he ask of requiring users o solve graphic puzzles causes addiional service delay. As a resul, he graphic puzzle cause annoying legiimae users as well as ac as anoher DDoS aack poins. [6] inroduced a web browsing model represened by he ransiion of he click pages. In a few previous sudies, analysis of user behaviors have been applied in many research fields [3, 5, 7, 2, 22]. III. MODEL PRELIMINARIES AND ASSUMPIONS When deecing he app-ddos aacks, we are faced wih he following challenges: ) aacker may launch an app-ddos aack by mimicking he normal web user access behavior, so he malicious requess differ from he legiimae ones bu no in raffic characerisics. herefore, mos curren deecion mechanisms based on raffic characerisics become invalid 2) Boh he flash crowd and app-ddos aacks are unsable, bursy and huge raffic volume. he app-ddos aackers are increasingly moving away from pure bandwidh flooding o more surrepiious aacks ha hide in normal flash crowd of he websie. I is a challenge o deec he app- DDoS aacks when hey occur during a flash crowd even. o mee he above challenges, we focus on analysis of he user behaviors. In his paper, we assume ha i is impossible for app-aacks o compleely mimic he normal web user behaviors. his assumpion is based on he following consideraion. Generally, web user access behaviors can be described by hree facors: HP reques rae, page reenion ime, and reques sequence. he aackers can mimic he normal access behavior by launching aacks wih similar HP reques rae and reenion ime as he normal users. However, he app- DDoS aacks canno simulae he dynamic process of he web user behavior or he reques sequence, because i is a pre-designed rouine and canno capure he dynamics of he users and he neworks. Anoher assumpion of our paper is ha he user behavior can be described by he disribuion of web objecs populariy. hen he variaion of web objecs populariy could represen he dynamic changing process of user behavior. Since app-ddos aacker is unable o obain hisorical access records from he vicim server, i canno mimic he dynamic of normal user behaviors. We consider he app-ddos aacks as anomaly browsing behavior. Moreover, we also assume ha normal users always access he "ho webpages". However, he aackers access he "cold webpages. herefore, we could build he browsing behavior model for boh aacks and normal user by monioring he dynamic change of he web objecs populariy. Using his model, we could disinguish he app-ddos aack from normal user. IV. MODEL AND DEECION PRINCIPLE A. Hidden Semi-Markov Model Hidden semi-markov model (HsMM) [4] is an exension of hidden Markov model (HMM) [23] wih variable sae duraion. I is a sochasic finie sae machine, specified by λ ( Q, π, A, B, P) where: Q is a discree se of hidden saes wih cardinaliy M, i.e., Q {,..., N}. q Q denoes he sae ha he sysem akes a ime ; π is he iniial sae probabiliy disribuion, i.e., π { π m m Q}, π Pr q m m. q denoes he sae ha he sysem akes a ime and m Q. he iniial sae probabiliy disribuion saisfies π m m ; A is he sae ransiion marix wih probabiliies: a Pr mn q n q m, m, n Q, and he sae ransiion coefficiens saisfy a ; n mn 24 ACADEMY PUBLISHER

3 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL b k Pr o v q m, m Q and o k denoes he observed vecor a ime, aking,..., v v, K is he size of he K B is he oupu probabiliies marix m ( ) values from { } observable oupu se. For a given sae m, ( ) ; m b k k P is he sae duraion marix wih probabiliies: p ( d ) Pr τ d q m, m τ denoes he remaining ime of he curren sae q, m Q, d { D},...,, D is he maximum inerval beween any wo consecuive sae ransiions, and he sae duraion coefficiens saisfy p ( d ). d m q, τ akes on value hen, if he pair process ( ) ( m, d ), he semi-markov chain will remain in he curren sae m unil ime + d and ransis o anoher sae a ime + d, for d {,..., D}. I is generally no observable for hese saes. he observable variables are a series of observaions O ( o,..., o ) where o denoes he observable oupu a ime and is he number of samples in he observed sequences. b ( o m a b) represens he observaion sequence from ime a o ime i.e., o : a b. When he condiional ( ) b { } b o independence of oupus is assumed, m ( a b) b bm ( o) a. B. Problem Formulaion We use he hidden semi-markov model o describe he dynamic changing process of web user behaviors. he hidden sae q is used o presen he disribuion of web objecs populariy, namely he user behavior, a ime. In general, he disribuion of web objecs populariy is unobservable. he observable oupu is he web objecs click raes: ci Click () i N c where ci i i is he click number of he ih ime uni, and N is he number of he web server s objecs. p m ( d ) is he user behavior reenion ime disribuion. he change of web user behaviors can be considered as a ransiion of he hidden sae (i.e., from q o q ). We can esimae he parameer wih he following forward and back algorihm [4]. he forward variable is defined as follows: α( m, d) Pr o,( q, τ ) ( m, d). (2) A ransiion ino sae ( q, τ ) ( m, d) akes place eiher from ( q, τ ) ( m, d + ) or from ( q, τ ) ( n,) for some n m. herefore, we could obain he following forward recursion formulas: α( md, ) ( md, + ) b( o) α m ( α ) + ( n,) a b ( o ) p ( d), d (3) nm m m α( md, ) π b( o) p( d). (4) m m m he backward variable is defined as follows: β( m, d) Pr o,( q, τ ) ( m, d). + (5) I can be seen ha when d > he nex sae mus be ( q, τ ) ( m, d ), and when d i mus be + + ( q, τ ) ( n, d' ) for some n m and d '. + + We hus obain he following backward recursion formula: β( md, ) b( o ) β ( md, ), for d > (6) m + + and β( m,) ( ) ( ) (, ) a b o p d β n d mn n + n + (7) n m d Especially when : β ( md, ), d. (8) hree join probabiliy funcions can be expressed in erms of he assumed model parameers and he forward and backward variables defined above: ξ ( m, n) Pr o, q m, q n α ( m,) a b ( o ) p ( d) β( n, d) mn n n d (9) η( m, d) Pr o, q m, q m, τ d α ( n,) a b ( o ) p ( d) β( m, d). nm m m n m () γ ( m) Pr o, q m. () hen, he model parameers can be re-esimaed by he following formulas: ˆ q arg max Pr q m o m M arg max γ ( m ), for,,...,. m M ˆ π m γ ( m ) N n γ ( n) (2) (3) 24 ACADEMY PUBLISHER

4 988 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 Where { v k } k mn N aˆ ˆ( p d) ξ ( m, n) n m D γ k γ ( n) η ( md, ) d η ( md, ) ( m)( δ o v ) ˆ( ) k b v m k γ ( m)( δ o v ) k is he se of observable values, and if o v, δ( v ), oherwise δ( v ) o k o k. he average enropies AE of observed sequences fiing o he HsMM model are used o deec app- DDoS aacks: Enropy Pr[ o λ] md, (4) (5) (6) Pr[ o,( q, τ ) ( m, d ) λ] (7) ALE ln(pr[ o λ]). (8) C. Clusering Mehod Clusering is he ask of grouping a se of objecs in such a way ha objecs in he same group are more similar o each oher han o hose in oher groups. I is a main ask of exploraory daa mining, and a common echnique for saisical daa analysis used in many fields, including machine learning, paern recogniion, image analysis, informaion rerieval, and bioinformaics. Since he number of web objecs is enormous, i is difficul o deal wih he mulidimensional observed daa wihou mass compuaion when raining he hidden semi- Markov model. hus, we apply clusering mehod o reduce he dimension of observed daa. he specific clusering algorihm is shown in Fig.. We assume he cluser resuls as: C { c, c,..., c 2 M }. (9) Num n, n,..., n. 2 M (2) { } Where C denoes he M classes, and n i denoes he number of he web objecs in c i. hen we calculae he click raes of each class according (). VI. EXPERIMENS We simulae 2 clien nodes which play as normal users from he semifinals of FIFA WorldCup98 [8]. We randomly selec 5% of hese nodes as compromised nodes. Furhermore, we assume he aackers can inercep a small porion of requess from normal web users and make he same reques or "ho" pages o launch he app-ddos aack o he vicim server. Bu we also assume ha he app-ddos aacks canno simulae he dynamic process of he web user behavior or he reques sequence, because i is a pre-designed rouine and canno capure he dynamics of he user and he neworks. hus, when he aack begins, each compromised node replays a snippe of anoher hisorical flash crowd race. he inerval beween wo consecuive aack requess is decided by he aack rae. In our experimens, we simulae consan rae aack and increasing rae aacks. We se he ime uni o 5s and group 2 consecuive observaions ino one sequence. he "moving" sep is one ime uni and a new sequence is formed using he curren observaion and he preceding observaions. Algorihm he K-means Clusering Inpu: Web objecs' click raes daase D Number clusers K Oupu: Se of cluser represenaives C Cluser membership vecor m /*Iniialize cluser represenaives C */ Randomly choose K daa poins from D Use hese K daa poins as iniial se of C repea /*Daa Assignmen*/ Reassign poins in D o close cluser mean Updae m such ha m is cluser ID of ih i poin in D /*Relocaion of means*/ Updae C such ha c is means of poins in jh cluser Unil convergence of objecive funcion 2 N (arg min x-c ) i j i j 2 Figure. he Clusering Algorihm A. Aacks during Flash Crowd he emulaion process lass abou 6 h. he firs 2 h daa are used o rain he model, and he remaining 4 h of daa including a flash crowd even are used for es. he emulaed app-ddos aacks are mixed wih he race chose from he period of [3.5h, 5.5h]. Fig.2 shows he average enropies of observaions varying wih he ime, when consan rae aacks are emulaed. Curve a represens he dynamic enropy varying process of normal flash crowd and curve b represens he dynamic enropy varying process of flash crowd mixed wih consan rae app-ddos aacks. We can see ha he average enropy of observaions does no change much during he flash crowd period of [2h, 3.5h], which implies ha he main web user behaviors do no have obvious varieies during he flash crowd even. j 24 ACADEMY PUBLISHER

5 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL However, during he period of [3.5h, 5.5h], consan rae aacks appear and he average enropy of observaions decreases sharply. In he duraion of consan rae aack, here is significanly deviaion from he average enropy of normal observaions. herefore, we could make use of his phenomenon o deec app-ddos aack. Fig.3 shows he average enropy of observaion varying wih he ime, when increasing rae aacks are emulaed. Curve a represens he dynamic enropy varying process of normal flash crowd and curve b represens he dynamic enropy varying process of flash crowd mixed wih increasing rae app-ddos aacks. As shows in Fig.3, during he period of [3.5h, 5.5h], increasing rae aacks appear and he average enropy of observaions decreases gradually. A he end of increasing rae aacks, he average enropy increases gradually o he value range of he normal case. Similar o he siuaion described above, he average enropy in he duraion increasing rae aacks is significanly smaller han he one in normal flash crowd period. enropy Deecion for consan rae aack a(flash crowd) b(flash crowd wih aack) b a index of ime(*5s) Figure 2. Enropy versus ime of consan rae aack he disribuions of average enropy. I is easy o see ha here exis significan differences in enropy disribuions beween wo groups: he enropies of normal web raffic are larger han -3, bu mos enropies of he raffic conaining aacks are less han -4. herefore, we could make use of his resul o idenify he app-ddos aacks from he normal web raffic when conducing DDoS deecion. As shows in Fig.5, if we ake -2.7 for he hreshold value of normal web raffic s average enropy, he false negaive rae (FNR) is abou 2%, and he deecion rae (DR) is abou 97%. We can see ha he algorihm can correcly deec he app-ddos aacks which happened wih a flash crowd even by making use of he dynamic HsMM models of web user behaviors. Frequence he disribuions of average enropy enropy Figure 4. Disribuions of average enropy FNR DR (-2.7,.97) Normal Aacks Deecion for increase rae aack FNR/DR.6.4 enropy a(flash crowd) b(flash crowd wih aack) b a index of ime(*5s) Figure 3. Enropy versus ime of increasing rae aack B. Performance In he above scenarios, based on he average enropy of observaions fiing o he HsMM model, we can deec he abnormiy caused by he DDoS aack. Fig.4 shows.2 (-2.7,.2) enropy Figure 5. Cumulae disribuion of average enropies VII. CONCLUSION In his paper, we applied he hidden semi-markov model o describe he web user behaviors which can be represened by he click raes of web objecs. By raining he observed daa of normal web raffic wih forward and backward algorihm, we obain he hidden semi-markov model parameers. he average enropies of observed sequences fiing o he HsMM model are used o deec app-ddos aacks. he experimens show ha here is obvious obviaion from he average enropies of normal 24 ACADEMY PUBLISHER

6 99 JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 observaions in he duraion of app-ddos aacks. In order o reduce he amoun of calculaion in raining HsMM model, we apply clusering mehod o reduce he dimension of observed daa. In addiion, in fuure we can consider how o cope wih he app-ddos aacks launched by requesing dynamic webpage. ACKNOWLEDGMEN his work and relaed experimen environmen is suppored by he Naional High echnology Research and Developmen Program of China under Gran No. 2AAA2, he Naional Key echnology R&D Program under Gran No. 22BAH8B4 and he Sraegic Prioriy Research Program of he Chinese Academy of Sciences under Gran No. XDA632. We are sincerely graeful o heir suppor. REFERENCES [] C. Douligeris, A. Mirokosa, DDoS aacks and denfense mechanisms: Classificaion and sae-of-he-ar, Compuer Neworks: he In. J. Compuers and elecommunicaions Neworking, v 44, n 5, p , Apr 24. [2] Inciden Noe IN-24- W32/Novarg. A virus, CER. [Online]. Available: hp:// IN-24-.hml [3] S. Kandula, D. Kaabi, M. Jacob, A. W. Berger, Boz-4- Sale:Surviving Organized DDoS Aacks ha Mimic Flash Crowds, MI, ech. Rep. R-969, 24[Online]. Available: hp:// [4] Yi. Xie, Shunzheng. Yu, Monioring he applicaion-layer DDoS aacks for popular websies, IEEE/ACM ransacions on Neworking, v 7, n, February 29. [5] J. Mirkovic, G. Prier, P. Reiher, Aacking DDoS a he source, In Proc. In. Conf. Nework Proocols, p 32-32, 22. [6] Shui. Yu, Wanlei. Zhou, Weijia. Jia, Song. Guo, Discriminaing DDoS aacks from flash crowds using flow correlaion coefficien, IEEE ransacions on Parallel and Disribued Sysem, v 23, n 6, June 22. [7] Changwang. Zhang, Zhiping. Cai, Weifeng Chen, Flow level deecion and filering of low-rae DDoS, Compuer Neworks, v 56, n 5, p , Ocober 22. [8] J. B. D. Cabrera, L. Lewis, X. Qin, W. Lee, R. K. Prasanh, B. Ravichandran, R. K. Mehra, Proacive deecion of disribued denial of service aacks using MIB raffic variables a feasibiliy sudy, In Proc. IEEE/IFIP In. Symp. Inegr. New. Manag., p , May 2. [9] J. Yuan, K. Mills, Monioring he macroscopic effec of DDoS flooding aacks, IEEE rans. Dependable and Secure Compuing, v 2, n 4, p , Ocober 22. [] A. Soule, K. Salamaian, N. af, Combining filering and saisical mehod for anomaly deecion, In Proceedings of Inerne Measuremen Conference, p , 25. [] L. Limwiwakul, A. Rungsawangr, Disrubied denial of service deecion using CP/IP header and raffic measuremen analysis, In Proc. In. Symp. Commun. Inf. echnol., Sappoo, Japan, p 65-6, Ocober 24. [2] S. Noh, C. Lee, K. Choi, G. Jung, Deecing Disribued Denial of Service (DDoS) aacks hrough inducive learning, Lecure Noes in Compuer Science, v 269, p , 23. [3] Jun. Cai, Shunzheng. Yu, Yu. Wang, he communiy analysis of user behaviors nework for web raffic, Journal of Sofware, v 6, n, p , 2. [4] S. Z. Yu, H. Kobayashi, An efficien forward-back algorihm for an explici duraion hidden Markov model. IEEE Signal Process. Le., v, n, p -4, Jan 23. [5] Hui. Chen, Relaionship beween moivaion and behavior of SNS User, Journal of Sofware, v 7, n 6, p , 22. [6] Y. Xie, S. Yu, A large-scale hidden semi-markov model for anomaly deecion on user browsing behaviors, IEEE ransacion on Neworking, v 7, n, February 29. [7] Wei. Yu, Shijun. Li, Yunlu. Zhang, Zhuo Zhang, Mining users similariy of ineres in web communiy, Journal of Compuers, v 6, n, p , 2. [8] [Online]. Available: hp://ia.ee.lbl.gov/hml/races.hml. [9] S. Ranjan, R. Swaminahan, M. Uysal, E. Knighly, DDoS-resilien scheduling o couner applicaion layer aacks under imperfec deecion, In Proceedings of IEEE INFOCOM, April 26. [2] Qingzhang. Chen, Yanqing. Ou, Hang. Sun, Design and implemen of cusomer communicaion behavior analysis sysem, Journal of Sofware, v 6, n 8, p , 2. [2] W. Yen, M.-F. Lee, Defending applicaion DDoS wih consrain random reques aacks, In Proc. Asia-Pacific Conf. Commun., Perh, Wesern Ausralia, p , Ocober 25. [22] Xiaohua. Hu, ao. Mu, Weihui. Dai, Hongzhi. Hu, Genghui. Dai, Analysis of browsing behaviors wih an colony clusering algorihm, Journal of Compuers, v 7, n 2, p , 22. [23] L. R. Rabiner, A uorial on hidden markov models and seleced applicaions in speech recongniion, In Proc. of IEEE, v 77, n 2, p , February ACADEMY PUBLISHER

DDoS Attacks Detection Model and its Application

DDoS Attacks Detection Model and its Application DDoS Aacks Deecion Model and is Applicaion 1, MUHAI LI, 1 MING LI, XIUYING JIANG 1 School of Informaion Science & Technology Eas China Normal Universiy No. 500, Dong-Chuan Road, Shanghai 0041, PR. China

More information

Task is a schedulable entity, i.e., a thread

Task is a schedulable entity, i.e., a thread Real-Time Scheduling Sysem Model Task is a schedulable eniy, i.e., a hread Time consrains of periodic ask T: - s: saring poin - e: processing ime of T - d: deadline of T - p: period of T Periodic ask T

More information

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005

Measuring macroeconomic volatility Applications to export revenue data, 1970-2005 FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a

More information

Trends in TCP/IP Retransmissions and Resets

Trends in TCP/IP Retransmissions and Resets Trends in TCP/IP Reransmissions and Reses Absrac Concordia Chen, Mrunal Mangrulkar, Naomi Ramos, and Mahaswea Sarkar {cychen, mkulkarn, msarkar,naramos}@cs.ucsd.edu As he Inerne grows larger, measuring

More information

Improvement of a TCP Incast Avoidance Method for Data Center Networks

Improvement of a TCP Incast Avoidance Method for Data Center Networks Improvemen of a Incas Avoidance Mehod for Daa Cener Neworks Kazuoshi Kajia, Shigeyuki Osada, Yukinobu Fukushima and Tokumi Yokohira The Graduae School of Naural Science and Technology, Okayama Universiy

More information

Model-Based Monitoring in Large-Scale Distributed Systems

Model-Based Monitoring in Large-Scale Distributed Systems Model-Based Monioring in Large-Scale Disribued Sysems Diploma Thesis Carsen Reimann Chemniz Universiy of Technology Faculy of Compuer Science Operaing Sysem Group Advisors: Prof. Dr. Winfried Kalfa Dr.

More information

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS

TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.

More information

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS

DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS Hong Mao, Shanghai Second Polyechnic Universiy Krzyszof M. Osaszewski, Illinois Sae Universiy Youyu Zhang, Fudan Universiy ABSTRACT Liigaion, exper

More information

Towards Intrusion Detection in Wireless Sensor Networks

Towards Intrusion Detection in Wireless Sensor Networks Towards Inrusion Deecion in Wireless Sensor Neworks Kroniris Ioannis, Tassos Dimiriou and Felix C. Freiling Ahens Informaion Technology, 19002 Peania, Ahens, Greece Email: {ikro,dim}@ai.edu.gr Deparmen

More information

Automatic measurement and detection of GSM interferences

Automatic measurement and detection of GSM interferences Auomaic measuremen and deecion of GSM inerferences Poor speech qualiy and dropped calls in GSM neworks may be caused by inerferences as a resul of high raffic load. The radio nework analyzers from Rohde

More information

Distributing Human Resources among Software Development Projects 1

Distributing Human Resources among Software Development Projects 1 Disribuing Human Resources among Sofware Developmen Proecs Macario Polo, María Dolores Maeos, Mario Piaini and rancisco Ruiz Summary This paper presens a mehod for esimaing he disribuion of human resources

More information

Chapter 8: Regression with Lagged Explanatory Variables

Chapter 8: Regression with Lagged Explanatory Variables Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One

More information

Multiprocessor Systems-on-Chips

Multiprocessor Systems-on-Chips Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,

More information

The Application of Multi Shifts and Break Windows in Employees Scheduling

The Application of Multi Shifts and Break Windows in Employees Scheduling The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance

More information

Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams

Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams IEEE Inernaional Conference on Mulimedia Compuing & Sysems, June 17-3, 1996, in Hiroshima, Japan, p. 151-155 Consan Lengh Rerieval for Video Servers wih Variable Bi Rae Sreams Erns Biersack, Frédéric Thiesse,

More information

Real-time Particle Filters

Real-time Particle Filters Real-ime Paricle Filers Cody Kwok Dieer Fox Marina Meilă Dep. of Compuer Science & Engineering, Dep. of Saisics Universiy of Washingon Seale, WA 9895 ckwok,fox @cs.washingon.edu, mmp@sa.washingon.edu Absrac

More information

The naive method discussed in Lecture 1 uses the most recent observations to forecast future values. That is, Y ˆ t + 1

The naive method discussed in Lecture 1 uses the most recent observations to forecast future values. That is, Y ˆ t + 1 Business Condiions & Forecasing Exponenial Smoohing LECTURE 2 MOVING AVERAGES AND EXPONENTIAL SMOOTHING OVERVIEW This lecure inroduces ime-series smoohing forecasing mehods. Various models are discussed,

More information

CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments

CPU Provisioning Algorithms for Service Differentiation in Cloud-based Environments CPU Provisioning Algorihms for Service Differeniaion in Cloud-based Environmens Kosas Kasalis, Georgios S. Paschos, Yannis Viniois, Leandros Tassiulas Absrac This work focuses on he design, analysis and

More information

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt

Statistical Analysis with Little s Law. Supplementary Material: More on the Call Center Data. by Song-Hee Kim and Ward Whitt Saisical Analysis wih Lile s Law Supplemenary Maerial: More on he Call Cener Daa by Song-Hee Kim and Ward Whi Deparmen of Indusrial Engineering and Operaions Research Columbia Universiy, New York, NY 17-99

More information

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES

USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were

More information

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE

PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees

More information

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999 TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision

More information

The Transport Equation

The Transport Equation The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be

More information

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR

MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR The firs experimenal publicaion, which summarised pas and expeced fuure developmen of basic economic indicaors, was published by he Minisry

More information

Communication Networks II Contents

Communication Networks II Contents 3 / 1 -- Communicaion Neworks II (Görg) -- www.comnes.uni-bremen.de Communicaion Neworks II Conens 1 Fundamenals of probabiliy heory 2 Traffic in communicaion neworks 3 Sochasic & Markovian Processes (SP

More information

Distributed Echo Cancellation in Multimedia Conferencing System

Distributed Echo Cancellation in Multimedia Conferencing System Disribued Echo Cancellaion in Mulimedia Conferencing Sysem Balan Sinniah 1, Sureswaran Ramadass 2 1 KDU College Sdn.Bhd, A Paramoun Corporaion Company, 32, Jalan Anson, 10400 Penang, Malaysia. sbalan@kdupg.edu.my

More information

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand

Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand 36 Invesmen Managemen and Financial Innovaions, 4/4 Marke Liquidiy and he Impacs of he Compuerized Trading Sysem: Evidence from he Sock Exchange of Thailand Sorasar Sukcharoensin 1, Pariyada Srisopisawa,

More information

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS

WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS Shuzhen Xu Research Risk and Reliabiliy Area FM Global Norwood, Massachuses 262, USA David Fuller Engineering Sandards FM Global Norwood, Massachuses 262,

More information

ARCH 2013.1 Proceedings

ARCH 2013.1 Proceedings Aricle from: ARCH 213.1 Proceedings Augus 1-4, 212 Ghislain Leveille, Emmanuel Hamel A renewal model for medical malpracice Ghislain Léveillé École d acuaria Universié Laval, Québec, Canada 47h ARC Conference

More information

Morningstar Investor Return

Morningstar Investor Return Morningsar Invesor Reurn Morningsar Mehodology Paper Augus 31, 2010 2010 Morningsar, Inc. All righs reserved. The informaion in his documen is he propery of Morningsar, Inc. Reproducion or ranscripion

More information

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS

SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS Hao Wu and Qinfen Zheng Cenre for Auomaion Research Dep. of Elecrical and Compuer Engineering Universiy of Maryland, College Park, MD-20742 {wh2003, qinfen}@cfar.umd.edu

More information

Capacitors and inductors

Capacitors and inductors Capaciors and inducors We coninue wih our analysis of linear circuis by inroducing wo new passive and linear elemens: he capacior and he inducor. All he mehods developed so far for he analysis of linear

More information

Stochastic Optimal Control Problem for Life Insurance

Stochastic Optimal Control Problem for Life Insurance Sochasic Opimal Conrol Problem for Life Insurance s. Basukh 1, D. Nyamsuren 2 1 Deparmen of Economics and Economerics, Insiue of Finance and Economics, Ulaanbaaar, Mongolia 2 School of Mahemaics, Mongolian

More information

Chapter 7. Response of First-Order RL and RC Circuits

Chapter 7. Response of First-Order RL and RC Circuits Chaper 7. esponse of Firs-Order L and C Circuis 7.1. The Naural esponse of an L Circui 7.2. The Naural esponse of an C Circui 7.3. The ep esponse of L and C Circuis 7.4. A General oluion for ep and Naural

More information

Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio Networks

Spectrum-Aware Data Replication in Intermittently Connected Cognitive Radio Networks Specrum-Aware Daa Replicaion in Inermienly Conneced Cogniive Radio Neworks Absrac The opening of under-uilized specrum creaes an opporuniy for unlicensed users o achieve subsanial performance improvemen

More information

How To Optimize Time For A Service In 4G Nework

How To Optimize Time For A Service In 4G Nework Process Opimizaion Time for a Service in 4G Nework by SNMP Monioring and IAAS Cloud Compuing Yassine El Mahoi Laboraory of Compuer Science, Operaions Research and Applied Saisics. Téouan, Morocco Souad

More information

Journal Of Business & Economics Research September 2005 Volume 3, Number 9

Journal Of Business & Economics Research September 2005 Volume 3, Number 9 Opion Pricing And Mone Carlo Simulaions George M. Jabbour, (Email: jabbour@gwu.edu), George Washingon Universiy Yi-Kang Liu, (yikang@gwu.edu), George Washingon Universiy ABSTRACT The advanage of Mone Carlo

More information

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer

Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer Recen Advances in Business Managemen and Markeing Analysis of Pricing and Efficiency Conrol Sraegy beween Inerne Reailer and Convenional Reailer HYUG RAE CHO 1, SUG MOO BAE and JOG HU PARK 3 Deparmen of

More information

Why Did the Demand for Cash Decrease Recently in Korea?

Why Did the Demand for Cash Decrease Recently in Korea? Why Did he Demand for Cash Decrease Recenly in Korea? Byoung Hark Yoo Bank of Korea 26. 5 Absrac We explores why cash demand have decreased recenly in Korea. The raio of cash o consumpion fell o 4.7% in

More information

An Agent-based Bayesian Forecasting Model for Enhanced Network Security

An Agent-based Bayesian Forecasting Model for Enhanced Network Security An Agen-based Forecasing Model for Enhanced Nework Securiy J. PIKOULAS, W.J. BUCHANAN, Napier Universiy, Edinburgh, UK. M. MANNION, Glasgow Caledonian Universiy, Glasgow, UK. K. TRIANTAFYLLOPOULOS, Universiy

More information

The Grantor Retained Annuity Trust (GRAT)

The Grantor Retained Annuity Trust (GRAT) WEALTH ADVISORY Esae Planning Sraegies for closely-held, family businesses The Granor Reained Annuiy Trus (GRAT) An efficien wealh ransfer sraegy, paricularly in a low ineres rae environmen Family business

More information

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C.

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Finance and Economics Discussion Series Divisions of Research & Saisics and Moneary Affairs Federal Reserve Board, Washingon, D.C. The Effecs of Unemploymen Benefis on Unemploymen and Labor Force Paricipaion:

More information

Chapter 8 Student Lecture Notes 8-1

Chapter 8 Student Lecture Notes 8-1 Chaper Suden Lecure Noes - Chaper Goals QM: Business Saisics Chaper Analyzing and Forecasing -Series Daa Afer compleing his chaper, you should be able o: Idenify he componens presen in a ime series Develop

More information

Chapter 1.6 Financial Management

Chapter 1.6 Financial Management Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1

More information

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya.

Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya. Principal componens of sock marke dynamics Mehodology and applicaions in brief o be updaed Andrei Bouzaev, bouzaev@ya.ru Why principal componens are needed Objecives undersand he evidence of more han one

More information

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS

ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS R. Caballero, E. Cerdá, M. M. Muñoz and L. Rey () Deparmen of Applied Economics (Mahemaics), Universiy of Málaga,

More information

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor

Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor Deecion of DDoS Aac in SIP Environmen wih Non-parameric CUSUM Sensor Luigi Alcuri Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering luigi.alcuri@i.unipa.i Piero Cassarà

More information

A Robust Defense Scheme for the Detection of Distributed Denial of Service Attack through Web Proxy System

A Robust Defense Scheme for the Detection of Distributed Denial of Service Attack through Web Proxy System ISSN (Online) : 2319-8753 ISSN (Prin) : 2347-6710 Inernaional Journal o Innovaive Research in Science, Engineering an Technology Volume 3, Special Issue 3, March 2014 2014 Inernaional Conerence on Innovaions

More information

Option Put-Call Parity Relations When the Underlying Security Pays Dividends

Option Put-Call Parity Relations When the Underlying Security Pays Dividends Inernaional Journal of Business and conomics, 26, Vol. 5, No. 3, 225-23 Opion Pu-all Pariy Relaions When he Underlying Securiy Pays Dividends Weiyu Guo Deparmen of Finance, Universiy of Nebraska Omaha,

More information

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches

A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches A Scalable and Lighweigh QoS Monioring Technique Combining Passive and Acive Approaches On he Mahemaical Formulaion of CoMPACT Monior Masai Aida, Naoo Miyoshi and Keisue Ishibashi NTT Informaion Sharing

More information

Making a Faster Cryptanalytic Time-Memory Trade-Off

Making a Faster Cryptanalytic Time-Memory Trade-Off Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland philippe.oechslin@epfl.ch

More information

Performance Center Overview. Performance Center Overview 1

Performance Center Overview. Performance Center Overview 1 Performance Cener Overview Performance Cener Overview 1 ODJFS Performance Cener ce Cener New Performance Cener Model Performance Cener Projec Meeings Performance Cener Execuive Meeings Performance Cener

More information

DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR

DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR Invesmen Managemen and Financial Innovaions, Volume 4, Issue 3, 7 33 DOES TRADING VOLUME INFLUENCE GARCH EFFECTS? SOME EVIDENCE FROM THE GREEK MARKET WITH SPECIAL REFERENCE TO BANKING SECTOR Ahanasios

More information

Load Prediction Using Hybrid Model for Computational Grid

Load Prediction Using Hybrid Model for Computational Grid Load Predicion Using Hybrid Model for Compuaional Grid Yongwei Wu, Yulai Yuan, Guangwen Yang 3, Weimin Zheng 4 Deparmen of Compuer Science and Technology, Tsinghua Universiy, Beijing 00084, China, 3, 4

More information

Task-Execution Scheduling Schemes for Network Measurement and Monitoring

Task-Execution Scheduling Schemes for Network Measurement and Monitoring Task-Execuion Scheduling Schemes for Nework Measuremen and Monioring Zhen Qin, Robero Rojas-Cessa, and Nirwan Ansari Deparmen of Elecrical and Compuer Engineering New Jersey Insiue of Technology Universiy

More information

Efficient big data processing strategy based on Hadoop for electronic commerce logistics

Efficient big data processing strategy based on Hadoop for electronic commerce logistics Absrac Efficien big daa processing sraegy based on Hadoop for elecronic commerce logisics Jiaojin Ci Insiue of Economy and Managemen, Nanyang Normal Universiy,Nanyang, 473061, China Corresponding auhor

More information

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation

A Note on Using the Svensson procedure to estimate the risk free rate in corporate valuation A Noe on Using he Svensson procedure o esimae he risk free rae in corporae valuaion By Sven Arnold, Alexander Lahmann and Bernhard Schwezler Ocober 2011 1. The risk free ineres rae in corporae valuaion

More information

Strategic Optimization of a Transportation Distribution Network

Strategic Optimization of a Transportation Distribution Network Sraegic Opimizaion of a Transporaion Disribuion Nework K. John Sophabmixay, Sco J. Mason, Manuel D. Rossei Deparmen of Indusrial Engineering Universiy of Arkansas 4207 Bell Engineering Cener Fayeeville,

More information

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks

A Distributed Multiple-Target Identity Management Algorithm in Sensor Networks A Disribued Muliple-Targe Ideniy Managemen Algorihm in Sensor Neworks Inseok Hwang, Kaushik Roy, Hamsa Balakrishnan, and Claire Tomlin Dep. of Aeronauics and Asronauics, Sanford Universiy, CA 94305 Elecrical

More information

INTRODUCTION TO FORECASTING

INTRODUCTION TO FORECASTING INTRODUCTION TO FORECASTING INTRODUCTION: Wha is a forecas? Why do managers need o forecas? A forecas is an esimae of uncerain fuure evens (lierally, o "cas forward" by exrapolaing from pas and curren

More information

A Universal Pricing Framework for Guaranteed Minimum Benefits in Variable Annuities *

A Universal Pricing Framework for Guaranteed Minimum Benefits in Variable Annuities * A Universal Pricing Framework for Guaraneed Minimum Benefis in Variable Annuiies * Daniel Bauer Deparmen of Risk Managemen and Insurance, Georgia Sae Universiy 35 Broad Sree, Alana, GA 333, USA Phone:

More information

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework

SPEC model selection algorithm for ARCH models: an options pricing evaluation framework Applied Financial Economics Leers, 2008, 4, 419 423 SEC model selecion algorihm for ARCH models: an opions pricing evaluaion framework Savros Degiannakis a, * and Evdokia Xekalaki a,b a Deparmen of Saisics,

More information

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783

Stock Trading with Recurrent Reinforcement Learning (RRL) CS229 Application Project Gabriel Molina, SUID 5055783 Sock raing wih Recurren Reinforcemen Learning (RRL) CS9 Applicaion Projec Gabriel Molina, SUID 555783 I. INRODUCION One relaively new approach o financial raing is o use machine learning algorihms o preic

More information

Tomographic Clustering To Visualize Blog Communities as Mountain Views

Tomographic Clustering To Visualize Blog Communities as Mountain Views Tomographic Clusering To Visualize Blog Communiies as Mounain Views Belle L. Tseng NEC Laboraories America 10080 N. Wolfe Road, SW3-350 Cuperino, CA 95014 USA +1-408-863-6008 belle@sv.nec-labs.com Junichi

More information

A Bayesian Approach for Personalized Booth Recommendation

A Bayesian Approach for Personalized Booth Recommendation 2011 Inernaional Conference on Social Science and Humaniy IPED vol. (2011) (2011) IACSI Press, Singapore A Bayesian Approach for Personalized Booh ecommendaion Ki Mok Ha 2bcreaor@khu.ac.kr Il Young Choi

More information

Distributed Online Localization in Sensor Networks Using a Moving Target

Distributed Online Localization in Sensor Networks Using a Moving Target Disribued Online Localizaion in Sensor Neworks Using a Moving Targe Aram Galsyan 1, Bhaskar Krishnamachari 2, Krisina Lerman 1, and Sundeep Paem 2 1 Informaion Sciences Insiue 2 Deparmen of Elecrical Engineering-Sysems

More information

Real Time Bid Optimization with Smooth Budget Delivery in Online Advertising

Real Time Bid Optimization with Smooth Budget Delivery in Online Advertising Real Time Bid Opimizaion wih Smooh Budge Delivery in Online Adverising Kuang-Chih Lee Ali Jalali Ali Dasdan Turn Inc. 835 Main Sree, Redwood Ciy, CA 94063 {klee,ajalali,adasdan}@urn.com ABSTRACT Today,

More information

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1

Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1 Absrac number: 05-0407 Single-machine Scheduling wih Periodic Mainenance and boh Preempive and Non-preempive jobs in Remanufacuring Sysem Liu Biyu hen Weida (School of Economics and Managemen Souheas Universiy

More information

CHARGE AND DISCHARGE OF A CAPACITOR

CHARGE AND DISCHARGE OF A CAPACITOR REFERENCES RC Circuis: Elecrical Insrumens: Mos Inroducory Physics exs (e.g. A. Halliday and Resnick, Physics ; M. Sernheim and J. Kane, General Physics.) This Laboraory Manual: Commonly Used Insrumens:

More information

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar

Analogue and Digital Signal Processing. First Term Third Year CS Engineering By Dr Mukhtiar Ali Unar Analogue and Digial Signal Processing Firs Term Third Year CS Engineering By Dr Mukhiar Ali Unar Recommended Books Haykin S. and Van Veen B.; Signals and Sysems, John Wiley& Sons Inc. ISBN: 0-7-380-7 Ifeachor

More information

Q-SAC: Toward QoS Optimized Service Automatic Composition *

Q-SAC: Toward QoS Optimized Service Automatic Composition * Q-SAC: Toward QoS Opimized Service Auomaic Composiion * Hanhua Chen, Hai Jin, Xiaoming Ning, Zhipeng Lü Cluser and Grid Compuing Lab Huazhong Universiy of Science and Technology, Wuhan, 4374, China Email:

More information

Niche Market or Mass Market?

Niche Market or Mass Market? Niche Marke or Mass Marke? Maxim Ivanov y McMaser Universiy July 2009 Absrac The de niion of a niche or a mass marke is based on he ranking of wo variables: he monopoly price and he produc mean value.

More information

Working Paper No. 482. Net Intergenerational Transfers from an Increase in Social Security Benefits

Working Paper No. 482. Net Intergenerational Transfers from an Increase in Social Security Benefits Working Paper No. 482 Ne Inergeneraional Transfers from an Increase in Social Securiy Benefis By Li Gan Texas A&M and NBER Guan Gong Shanghai Universiy of Finance and Economics Michael Hurd RAND Corporaion

More information

Enhanced TCP SYN Attack Detection

Enhanced TCP SYN Attack Detection Enhanced TCP SYN Aack Deecion Vrizlynn L. L. Thing vl@doc.ic.ac.uk Morris Sloman m.sloman@doc.ic.ac.uk Naranker Dulay n.dulay@doc.ic.ac.uk Deparmen of Compuing Imperial College London 80 Queen s Gae, London,

More information

Hotel Room Demand Forecasting via Observed Reservation Information

Hotel Room Demand Forecasting via Observed Reservation Information Proceedings of he Asia Pacific Indusrial Engineering & Managemen Sysems Conference 0 V. Kachivichyanuul, H.T. Luong, and R. Piaaso Eds. Hoel Room Demand Forecasing via Observed Reservaion Informaion aragain

More information

Botnet Economics: Uncertainty Matters

Botnet Economics: Uncertainty Matters Bone Economics: Uncerainy Maers Zhen Li Deparmen of Economics and Managemen Albion College Email:zli@albion.edu Qi Liao, Aaron Sriegel Deparmen of Compuer Science and Engineering Universiy of Nore Dame

More information

Exploring Imputation Techniques for Missing Data in Transportation Management Systems

Exploring Imputation Techniques for Missing Data in Transportation Management Systems Exploring Impuaion Techniques for Missing Daa in Transporaion Managemen Sysems Brian L. Smih Assisan Professor Universiy of Virginia Deparmen of Civil Engineering P. O. Box 400742 Charloesville, VA 22904-4742

More information

MTH6121 Introduction to Mathematical Finance Lesson 5

MTH6121 Introduction to Mathematical Finance Lesson 5 26 MTH6121 Inroducion o Mahemaical Finance Lesson 5 Conens 2.3 Brownian moion wih drif........................... 27 2.4 Geomeric Brownian moion........................... 28 2.5 Convergence of random

More information

Individual Health Insurance April 30, 2008 Pages 167-170

Individual Health Insurance April 30, 2008 Pages 167-170 Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve

More information

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment

Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment Vol. 7, No. 6 (04), pp. 365-374 hp://dx.doi.org/0.457/ijhi.04.7.6.3 Research on Invenory Sharing and Pricing Sraegy of Mulichannel Reailer wih Channel Preference in Inerne Environmen Hanzong Li College

More information

Hedging with Forwards and Futures

Hedging with Forwards and Futures Hedging wih orwards and uures Hedging in mos cases is sraighforward. You plan o buy 10,000 barrels of oil in six monhs and you wish o eliminae he price risk. If you ake he buy-side of a forward/fuures

More information

How To Calculate Price Elasiciy Per Capia Per Capi

How To Calculate Price Elasiciy Per Capia Per Capi Price elasiciy of demand for crude oil: esimaes for 23 counries John C.B. Cooper Absrac This paper uses a muliple regression model derived from an adapaion of Nerlove s parial adjusmen model o esimae boh

More information

Term Structure of Prices of Asian Options

Term Structure of Prices of Asian Options Term Srucure of Prices of Asian Opions Jirô Akahori, Tsuomu Mikami, Kenji Yasuomi and Teruo Yokoa Dep. of Mahemaical Sciences, Risumeikan Universiy 1-1-1 Nojihigashi, Kusasu, Shiga 525-8577, Japan E-mail:

More information

APPLICATION OF THE KALMAN FILTER FOR ESTIMATING CONTINUOUS TIME TERM STRUCTURE MODELS: THE CASE OF UK AND GERMANY. January, 2005

APPLICATION OF THE KALMAN FILTER FOR ESTIMATING CONTINUOUS TIME TERM STRUCTURE MODELS: THE CASE OF UK AND GERMANY. January, 2005 APPLICATION OF THE KALMAN FILTER FOR ESTIMATING CONTINUOUS TIME TERM STRUCTURE MODELS: THE CASE OF UK AND GERMANY Somnah Chaeree* Deparmen of Economics Universiy of Glasgow January, 2005 Absrac The purpose

More information

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test

Time Series Analysis Using SAS R Part I The Augmented Dickey-Fuller (ADF) Test ABSTRACT Time Series Analysis Using SAS R Par I The Augmened Dickey-Fuller (ADF) Tes By Ismail E. Mohamed The purpose of his series of aricles is o discuss SAS programming echniques specifically designed

More information

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613.

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613. Graduae School of Business Adminisraion Universiy of Virginia UVA-F-38 Duraion and Convexiy he price of a bond is a funcion of he promised paymens and he marke required rae of reurn. Since he promised

More information

Vector Autoregressions (VARs): Operational Perspectives

Vector Autoregressions (VARs): Operational Perspectives Vecor Auoregressions (VARs): Operaional Perspecives Primary Source: Sock, James H., and Mark W. Wason, Vecor Auoregressions, Journal of Economic Perspecives, Vol. 15 No. 4 (Fall 2001), 101-115. Macroeconomericians

More information

Ecotopia: An Ecological Framework for Change Management in Distributed Systems

Ecotopia: An Ecological Framework for Change Management in Distributed Systems Ecoopia: An Ecological Framework for Change Managemen in Disribued Sysems Tudor Dumiraş 1, Daniela Roşu 2, Asi Dan 2, and Priya Narasimhan 1 1 ECE Deparmen, Carnegie Mellon Universiy, Pisburgh, PA 15213,

More information

The Greek financial crisis: growing imbalances and sovereign spreads. Heather D. Gibson, Stephan G. Hall and George S. Tavlas

The Greek financial crisis: growing imbalances and sovereign spreads. Heather D. Gibson, Stephan G. Hall and George S. Tavlas The Greek financial crisis: growing imbalances and sovereign spreads Heaher D. Gibson, Sephan G. Hall and George S. Tavlas The enry The enry of Greece ino he Eurozone in 2001 produced a dividend in he

More information

Cointegration: The Engle and Granger approach

Cointegration: The Engle and Granger approach Coinegraion: The Engle and Granger approach Inroducion Generally one would find mos of he economic variables o be non-saionary I(1) variables. Hence, any equilibrium heories ha involve hese variables require

More information

Predicting Stock Market Index Trading Signals Using Neural Networks

Predicting Stock Market Index Trading Signals Using Neural Networks Predicing Sock Marke Index Trading Using Neural Neworks C. D. Tilakarane, S. A. Morris, M. A. Mammadov, C. P. Hurs Cenre for Informaics and Applied Opimizaion School of Informaion Technology and Mahemaical

More information

A Re-examination of the Joint Mortality Functions

A Re-examination of the Joint Mortality Functions Norh merican cuarial Journal Volume 6, Number 1, p.166-170 (2002) Re-eaminaion of he Join Morali Funcions bsrac. Heekung Youn, rkad Shemakin, Edwin Herman Universi of S. Thomas, Sain Paul, MN, US Morali

More information

Secure Election Infrastructures Based on IPv6 Clouds

Secure Election Infrastructures Based on IPv6 Clouds Secure Elecion Infrasrucures Based on IPv6 Clouds Firs IPv6-only OpenSack Cloud used o deliver producion services is de-ployed by Nephos6, Cikomm and SnT-Universiy of Luxembourg. Laif Ladid, Presiden,

More information

How To Predict A Person'S Behavior

How To Predict A Person'S Behavior Informaion Theoreic Approaches for Predicive Models: Resuls and Analysis Monica Dinculescu Supervised by Doina Precup Absrac Learning he inernal represenaion of parially observable environmens has proven

More information

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b

LIFE INSURANCE WITH STOCHASTIC INTEREST RATE. L. Noviyanti a, M. Syamsuddin b LIFE ISURACE WITH STOCHASTIC ITEREST RATE L. oviyani a, M. Syamsuddin b a Deparmen of Saisics, Universias Padjadjaran, Bandung, Indonesia b Deparmen of Mahemaics, Insiu Teknologi Bandung, Indonesia Absrac.

More information

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary

Random Walk in 1-D. 3 possible paths x vs n. -5 For our random walk, we assume the probabilities p,q do not depend on time (n) - stationary Random Walk in -D Random walks appear in many cones: diffusion is a random walk process undersanding buffering, waiing imes, queuing more generally he heory of sochasic processes gambling choosing he bes

More information

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality

A Natural Feature-Based 3D Object Tracking Method for Wearable Augmented Reality A Naural Feaure-Based 3D Objec Tracking Mehod for Wearable Augmened Realiy Takashi Okuma Columbia Universiy / AIST Email: okuma@cs.columbia.edu Takeshi Kuraa Universiy of Washingon / AIST Email: kuraa@ieee.org

More information

DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED METRICS

DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED METRICS DETECTION OF APPLICATION LAYER DDOS ATTACKS USING INFORMATION THEORY BASED METRICS S. Renuka Devi and P. Yogesh Department of Information Science and Technology, College of Engg. Guindy, Anna University,

More information

Chapter 5. Aggregate Planning

Chapter 5. Aggregate Planning Chaper 5 Aggregae Planning Supply Chain Planning Marix procuremen producion disribuion sales longerm Sraegic Nework Planning miderm shorerm Maerial Requiremens Planning Maser Planning Producion Planning

More information

CLASSIFICATION OF REINSURANCE IN LIFE INSURANCE

CLASSIFICATION OF REINSURANCE IN LIFE INSURANCE CLASSIFICATION OF REINSURANCE IN LIFE INSURANCE Kaarína Sakálová 1. Classificaions of reinsurance There are many differen ways in which reinsurance may be classified or disinguished. We will discuss briefly

More information