Defining Perfect Location Privacy Using Anonymization
|
|
- Rhoda Mills
- 8 years ago
- Views:
Transcription
1 Defg Perfect Locato Prvacy Usg Aoymzato Zarr otazer Electrcal a Computer Egeerg Departmet Uversty of assachusetts Amherst, assachusetts Emal: seyeehzar@umass.eu Amr Houmasar College of Iformato a Computer Sceces Uversty of assachusetts Amherst, assachusetts Emal: amr@cs.umass.eu Hosse Pshro-Nk Electrcal a Computer Egeerg Departmet Uversty of assachusetts Amherst, assachusetts Emal: pshro@eg.umass.eu Abstract The popularty of moble evces a locato-base servces LBS) has create great cocers regarg the locato prvacy of users of such evces a servces. Aoymzato s a commo techque that s ofte beg use to protect the locato prvacy of LBS users. I ths paper, we prove a geeral formato theoretc efto for locato prvacy. I partcular, we efe perfect locato prvacy. We show that uer certa cotos, perfect prvacy s acheve f the pseuoyms of users s chage after on r 2 ) observatos by the aversary, where N s the umber of users a r s the umber of sub-regos or locatos. I. INTRODUCTION oble evces capable of commucatg over the Iteret wth hgh-precso localzato capablty have become pervasve the past several years. These commucatg moble evces prove a we rage of servces base o the geographc locato of the user. We refer to such servces that use the geographc locato of ther users as locato-base servces LBS). Whle LBSes prove so may servces to ther users thaks to ther urestrcte access to the locato formato of the users, they also mpose sgfcat prvacy threats to them. Some mechasms have bee propose orer to protect locato prvacy of LBS users, [] [7], geerally referre to as locato prvacy protecto mechasms LPP). Toay s LPPs ca be classfe to two ma categores: etty perturbato LPPs [5] [7] mofy the etty of moble users orer to protect ther locato prvacy e.g., through aoymzato techques), other wors they am at mprovg locato prvacy by cocealg the mappg betwee users a locato observatos. Locato perturbato LPPs are the seco category [] [4], [7], whch a ose to moble users locato coorates. Ths ca potetally mprove locato prvacy by returg accurate locato formato to the LBS applcatos. Some LPPs combe both mechasms to aress ths problem, but ths may egrae the performace of a LBS system. Ufortuately, espte prevous stues o locato prvacy, the esg of LPP systems reles o a-hoc algorthmc heurstcs such as ag ose a shufflg ettes. I ths paper, we propose a fuametal, aalytcal stuy of locato prvacy for locato-base servces. We assume the strogest moel for the aversary,.e., a aversary who has complete statstcal kowlege of the users movemets. The, we efe locato prvacy base o the mutual formato betwee the aversary s observato a actual locato ata. Ths allows us to efe perfect locato prvacy where users have provably prvate locatos. The, we show that for r possble.. locatos, f the aversary obtas less tha on r 2 ) observatos per user, the all users have perfect locato prvacy at all tme. We show that perfect locato prvacy s ee achevable f the LPPs are esge approprately. II. RELATED WORK Exstg work o the esg of LPP mechasms ca be classfe to two ma categores of etty perturbato LPPs [5] [7] a locato perturbato LPPs [] [4], [7]. Locato perturbato LPPs a ose to users locato coorates whle etty perturbato LPPs mofy the ettes of moble users. A commo approach use by etty perturbato LPPs s to obfuscate user ettes wth a group of users, a approach kow as k-aoymty [2], [8]. A seco commo approach to etty perturbato LPPs s to exchage users pseuoyms wth specfc areas calle mx-zoes [9], [0]. Freuger et al. show that combg techques from cryptography wth mx-zoes ca result hgher levels of locato prvacy [5]. Also, ashae et al. use game theoretc approaches to mprove the locato prvacy protecto prove by mx-zoes []. Locato cryptography s aother recto take towars protectg locato formato [2]. ay propose locato perturbato LPPs work by replacg each user s locato formato wth a larger rego, a techque kow as cloakg [2], [3], [3], [4]. Aother recto to locato perturbato s clug ummy locatos the set of possble locatos of users [5], [6]. Several works [4], [7] [20] use fferetal prvacy to protect locato prvacy locato formato atasets. Ths sures that the presece of o sgle user coul sgfcatly chage the outcome of the aggregate locato formato.
2 For stace, Ho et al. [2] propose a fferetally prvate locato patter mg algorthm usg quatree spatal ecomposto. Dewr [22] combe k-aoymty a fferetal prvacy to mprove locato prvacy. Some locato perturbato LPPs are base o eas from fferetal prvacy [4], [23] [26]. For stace, Ares et al. he the exact locato of each user a rego by ag Laplaca strbute ose to acheve a esre level of geo-stgushablty [26]. Several works ame at quatfyg locato prvacy protecto. Shokr et al. [7], [27] efe the expecte estmato error of the aversary as a metrc to evaluate LPP mechasms. O the other ha, a et al. [6] uses ucertaty about users locato formato to quatfy user locato prvacy vehcular etworks. A. Defg Locato Prvacy III. FRAEWORK To vestgate the locato prvacy problem, we frst ee to prove a geerc mathematcal efto for locato prvacy. Coser a etwork cosstg of N users, a suppose that a LPP s use to protect the prvacy of the users. Let A be a aversary who s tereste kowg the locatos of the users as they move. To esure prvacy, we assume the strogest aversary the sese that we assume the aversary has complete statstcal kowlege of the users movemets. That s, through prevous observatos or other sources, the aversary has a complete moel that escrbes the movemet of users as a raom process o the correspog geographc area. Now, startg at tme zero, the users move through the area. I partcular, let X t) be the locato of user at tme t. Aversary A s tereste kowg X t) for =,2,..., N. However, he ca oly observe the aoymze a obfuscate versos of X t) s prouce by the LPP. I partcular, let Y be a collecto of observatos avalable to the aversary. We efe perfect locato prvacy as follows: Defto. User has perfect locato prvacy at tme t wth respect to aversary A, f a oly f lm IX t); Y) = 0, N where I.) shows the mutual formato. The above efto requres that the observatos of the aversary oes ot gve her ay useful formato about the locato of user. It also assumes a large umber of users N ). Ths assumpto s val for almost all applcatos that we coser. I ths paper, to acheve locato prvacy, we use oly aoymzato techques. That s, we perform a raom permutato Π o the set of N users, a the assg the pseuoym Π ) to user. Π : {,2,, N} {,2,, N} Throughout the paper, we assume the permutato Π s chose uformly at raom amog all N! possble permutatos. For smplcty of otatos we sometmes rop the superscrpts, e.g., Π = Π. For =,2,, N let X ) = X ), X 2),, X )) T be a vector whch shows the th user s locatos at tmes,2,,. The aversary observes a permutato of users locato vectors, X ) s, usg the permutato fucto Π. I other wors, the aversary observes where, Y ) = PermX ),X ),,X ) 2 N ; Π ) = X ) Π ),X), Π,X) 2) Π ) = Y ),Y ),,Y ) 2 N ) Y ) Π ) = X) = X ), X 2),, X )) T We trouce two lemmas here that wll be use to prove the ma result through the paper. Lemma. For k =,2,..., let Z k) = Z k), Z k),, Z k) 2 k) ) be a sequece of epeet raom vectors wth sze k) k, such that k) = ak b where a > 0 a 0 < b < are costats. Assume Z k), Z k),, Z k) 2 are epeet screte raom varables wth etcal rage,.e., PZ k) = x) > 0 f a oly f PZ k) j = x) > 0. Further, suppose that ther strbutos F Z k ) coverge to the staar ormal strbuto. I partcular, for each γ > 0, there exsts k 0 N such that f k > k 0, the { } sup F Z k ) x) Φx) : x R, {,2,...,k)} γ Let Y k) be a permute verso of the Z k) uer the raom permutato Π ) : Y k) = PermZ k), Z k) 2,, Z k) ; Π ) ), For > 0 we efe a set A k) as follows: A k) = { y k) : PΠ k) ) = j Y k) = y k) ) < }, The, for ay > 0, we have lm k PYk) A k) ) = Proof. Sketch) Here, the goal s to stuy the cotoal probablty PΠ ) ) = j Y k) = y k) ). I partcular, we wat to stuy the power of a aversary fg the permutate value of,.e., Π k) ), base o the observe ata Y k). To get the ea beh ths lemma, let s assume that Z s have exactly ormal strbuto stea of coserg Z s strbutos covergg to N 0,)). So, all Z s are.. raom varables. If we observe Y k) Z k) N 0,) Y k) = PermZ k), Z k) 2,, Z k) ; Π ) ),
3 the, by coserg that Z k) s are.. a usg symmetry, probablty of fg the rght permutato fucto base o ths observato s PΠ ) ) = j Y k) = y k) ) =. I the lemma, as Z s strbutos coverge to N 0,), we are ot able to say ths probablty s exactly, but t s close to t. Ths ca be show usg the cotuty of the probablty strbuto fuctos. I partcular, we ca show < PΠ) ) = j Y ) = y ) ) < + wth hgh probablty. Thus, wth hgh probablty PΠ)) = j Y k) = y k) ) < for ay > 0, a that proves the lemma. Lemma 2. Let Y k) = Y k) be the aversary s observatos as efe above. Let us efe Y as, Y = Y k). k= The, gve Y,Y 2,,Y N, we have that Π a Y N are epeet. Proof. Ths s the mmeate result of the fact that Y,Y 2,,Y N ) = Y s a suffcet statstc for p s. I partcular, f Y Y,Π) = f Y Y ) whch meas that Y a Π are epeet gve the average values Y. B. Locato Prvacy for a Smple Two-State oel To get a better sght about the locato prvacy problem, here we coser a smple scearo. Coser a scearo where there are two locatos, locatos 0 a. At ay tme k {0,,2, }, user has probablty p 0,) to be at locato, epeetly from prevous locatos a epeetly from other users locatos. Therefore, X k) Beroullp ). To keep thgs geeral, we assume that p s are raw epeetly from some cotuous esty f P p) o the 0,) terval. Specfcally, f P p) = 0 for all p 0,) a there are δ 2 > δ > 0 such that δ < f P p) < δ 2 for all p 0,). The values of p s are kow to the aversary. Theorem. For two locatos wth above efto a observato vector Y ) f all the followg hols, ) = cn 2 α, whch c,α > 0 a are costat 2) p 0,) 3) p 2, p 3,, p N ) f p, 0 < δ < f p < δ 2 4) P = p, p 2,, p N ) be kow to the aversary the, we have k N, lm IX k); Y ) ) = 0 N Before provg a formal proof for Theorem, let us prove the tuto beh t. Let us look from the aversary s perspectve. The aversary woul lke to obta X k). The aversary, kows the value of p. To obta X k), t suffces that the aversary obtas Π). Sce X k) Beroullp ), to o so, the aversary ca look at the averages Y Π) = Y Π)) + Y Π) 2) Y Π) ). I fact, we show Lemma 2 that Y Π) s prove a suffcet statstcs for ths problem. Now, tutvely, the aversary s successful recoverg Π) f two cotos hol ) Y Π) p. 2) For all, Y Π) s ot too close to p. Now, ote that by the cetral lmt theorem CLT), Y Π) p p p ) N 0,). That s, loosely speakg, we ca wrte Y Π) N p, p ) p ). Coser a terval I 0,) such that p I a the legth of I, legthi), s equal to L N = c N where c > 0 s a arbtrary costat. Note that for ay,2,, N the probablty that p I s larger tha δl N = cδ N. I other wors, by choosg c large eough, we ca guaratee that a large umber of p s be I. O the other ha, ote that we have VarY Π) ) legthi) = = p p ) c N N on 2 ). Note that here, we wll have a large umber of ormal raom varables Y Π) whose expecte values are terval I wth hgh probablty a ther staar evato s much larger tha the terval legth. Thus, stgushg betwee them wll become mpossble for the aversary. I other wors, the probablty that the aversary wll correctly etfy Πl) goes to zero as N goes to fty. That s, the aversary wll most lkely choose a correct value j for Πl). I ths case, sce the locatos of fferet users are epeet, the aversary wll ot obta ay useful formato by lookg at X j k). Proof of Theorem. We efe X X = X k). k=
4 Sce X k) Beroullp ) EX = p, VarX ) = p p ). As, by applyg Cetral Lmt Theorem, X p p p ) = X p p p ) N 0,) a sce Y Π ) = X, the we ca coclue that Y Π) p p p ) N 0,). Next, we efe a raom set J as a set whch clues ces as follows where J = { : p ɛ < p < p + ɛ} ɛ = N α 3 Remember that α s gve by = cn 2 α. Also ote that J. Let us frst f the strbuto of J whch s the umber of elemets J. Note that for N large eough, ) p +ɛ Pr p ɛ < p < p + ɛ = f P p)p. p ɛ Sce δ < f P p) < δ 2, we coclue that ) 2ɛδ < Pr p ɛ < p < p + ɛ < 2ɛδ 2, So we ca wrte Pr ) p ɛ < p < p + ɛ = 2ɛδ. for some δ > 0. We coclue that J BN,2ɛδ) whe N s large eough. I partcular, for the expecte value a varace of J we get E[ J ] = 2ɛδN = 2 N α 3 V ar J ) = 2Nɛδ 2ɛδ) δn = 2δN α 3 a as N, V ar J ) 2δN α 3. Usg Chebyshev s equalty, P { J E[ J ] } > δn α V ar J ) 3 < δ 2 N 2 α 3 V ar J ) δ 2 N 2 α 3 Thus, J > δn α 3 = 2δN α 3 δ 2 N 2 α 3 0, as N wth hgh probablty. I partcular, J, as N Lemma 3. For all J, the strbuto of ormalze raom varable X coverges to ormal strbuto, X p N 0,) a sce we have Y Π ) = X, Y Π) p Proof. Note that, p p < ɛ = N α 3 N 0,). p p, as N. p p ) By kowg that, p p ) a X p = X p + p p p p ) whch we alreay kow that wrte p p ) = X p p p ) + p p p p ) X p p p ) p p p p ) a as N ɛ = N 0,), so we ca ɛ N α 2 N α 3 Same thg hols for Y sce Y Π ) = X. 0. Next we coser the case where Π J ) whch s Π J ) = {Π ) : J } s kow to the aversary ot the vual Π) s, but the whole set Π J )). I ths case, for the aversary to f Π ), she ees to just look to the set J. We show that eve f the aversary kows the set Π J ), her mutual formato goes to zero. For smplcty, we assume that where = J > δn α 3 J = {,2,,}, a let Y ) = Y Π),Y Π2),,Y Π) ). Now for the aversary to f Π), she ca look to set J wth sze rather tha all the N users. To fsh the proof of Theorem, t suffces to show that as N, HX k) Y ) HX k)). To cotue, we frst prove two lemmas. Lemma 4. Let A be as efe Lemma, partcular, we have lm N PY A ) =.
5 If for all y A, we have HX k) Y = y ) HX k)) as N. The, we have lm HX k) Y ) = HX k)). N Proof. We have HX k) Y ) = HX k) Y = y )PY = y ) y = HX k) Y = y )PY = y ) + y A y A HX k) Y = y )PY = y ). Now ote that the seco sum coverges to zero sce HX k) Y = y ) HX k)) a lm N PY A ) = 0. O the other ha, the frst sum coverges to HX k)) by the assumptos of the lemma. Lemma 4 allows us to coser oly the observatos Y = y for Y A. Lemma 5. Assume P = p, p 2,, p N ) s observe. We efe q N as the probablty that the frst user s state locato) at tme k,.e., X k) =, gve the observato vector Y a the set ΠJ ). q N = PX k) = Y,ΠJ )) Sce Y a ΠJ ) are raom, q N s a raom varable. We have q N p. Proof. Ths lemma s the result of the prevous lemma. We have q N = PX k) = Y = y,πj )). Frst, ote that gve set ΠJ ), we ca gore Y for ΠJ ), so we smply replace N wth to show ths. By applyg the Law of Total Probablty we get j ΠJ ) = PX k) = Π) = j,y ) = y ),ΠJ )) PΠ) = j Y ) = y ),ΠJ )) [y ) j k)=] PΠ) = j Y) = y ) ). j= Wth the same reasog as Lemma 4, t oly suffces to coser Y ) = y ) for y ) A. Also, by Lemma 2 f we efe Y as, Y = Y k). k= the gve Y,Y 2,,Y, we have Π a Y are epeet. Thus, PΠ) = j Y ) = y ) ) = PΠ) = j Y ) = y ) ). But by Lemma 3, Y p N 0,). Ths alog wth Lemma tells us that wth hgh probablty PΠ) = j Y ) = y ) ) +. We obta q N [y j k)=] PΠ) = j Y) = y ) ) so we get j j A ) [y j k)=] q + j A ) [y j k)=] Now, ote that Y j K) are Beroullp Π j) ) a sce we are summg over, by Law of Large Number a p Π j) p the we have [Y j k)=] p, as N j a coserg that we ca wrte )p q N + )p where ca be mae arbtrarly small so that q N p. Thus, X k) = Y = y,πj )) Beroullp ). We alreay kow that X k) Beroullp ). It meas that kowg Y = y,πj ) oes ot chage the strbuto. I other wors the etropy of X k) Y = y,πj )) coverges to HX k)). HX k) Y,ΠJ ))) HX k)) a we kow that cotog oes ot crease etropy, so, HX k) Y,ΠJ ))) HX k)) HX k) Y,ΠJ ))) HX k) Y ) HX k) Y ) HX k)) a sce HX k) Y,ΠJ ))) HX k)) a fally we ca wrte HX k) Y ) HX k)) IX k); Y ) 0, as N whch completes the proof of Theorem.
6 C. Exteso to r States locatos) Here we exte the results to a scearo whch we have r 2 locatos or regos, locatos 0,,,r. At ay tme k {0,,2, }, user has probablty p j 0,) to be at locato j, epeetly from prevous locatos a epeetly from other users locatos. We assume that p j s for j = 0,,,r 2) are raw epeetly from some r mesoal cotuous esty f P p) o the 0,) r. Specfcally, f P p) = 0 for all p 0,) r a there are δ 2 > δ > 0 such that δ < f P p) < δ 2 for all p {p 0, p,, p r 2 ) 0,) r : p 0 +p + +p r 2 }. The values of p j s are fxe a o ot chage as tme goes o. We the ca state the followg theorem. Theorem 2. For r locatos wth above efto a observato vector Y ) f all the followg hols, ) = cn r 2 α, whch c,α > 0 a are costat 2) p 0,) 3) p 2, p 3,, p N ) f p, 0 < δ < f p < δ 2 4) P = p, p 2,, p N ) be kow to the aversary the, we have k N, lm IX k); Y ) ) = 0 N Theorem 2 ca be prove usg smlar eas trouce the proof of Theorem. We omt the proof ue to space lmtato. IV. CONCLUSION I ths paper, we efe perfect locato prvacy base o the mutual formato betwee the aversary s observato formato a the actual user s locato ata. The we smplfe the problem to two-state locatos wth N umber of users a umber of aversary s observatos. We erve the relato betwee a N. We showe that perfect locato prvacy s achevable f cn 2 α. We the extee our moel to r-state locatos a obtae cn r 2 α to have perfect locato prvacy. REFERENCES [] R. Shokr, G. Theoorakopoulos, C. Trocoso, J.-P. Hubaux, a J.- Y. Le Bouec, Protectg locato prvacy: optmal strategy agast localzato attacks, Proceegs of the 202 AC coferece o Computer a commucatos securty. AC, 202, pp [2]. Gruteser a D. Gruwal, Aoymous usage of locato-base servces through spatal a temporal cloakg, Proceegs of the st teratoal coferece o oble systems, applcatos a servces. AC, 2003, pp [3] B. Hoh,. Gruteser, H. Xog, a A. Alrabay, Preservg prvacy gps traces va ucertaty-aware path cloakg, Proceegs of the 4th AC coferece o Computer a commucatos securty. AC, 2007, pp [4] N. E. Boreabe, K. Chatzkokolaks, a C. Palamess, Optmal geostgushable mechasms for locato prvacy, Proceegs of the 204 AC SIGSAC Coferece o Computer a Commucatos Securty. AC, 204, pp [5] J. Freuger,. Raya,. Félegyház, P. Papamtratos, a J.-P. Hubaux, x-zoes for locato prvacy vehcular etworks, [6] Z. a, F. Kargl, a. Weber, A locato prvacy metrc for v2x commucato systems, Saroff Symposum, SARNOFF 09. IEEE. IEEE, 2009, pp. 6. [7] R. Shokr, G. Theoorakopoulos, J.-Y. Le Bouec, a J.-P. Hubaux, Quatfyg locato prvacy, Securty a Prvacy SP), 20 IEEE Symposum o. IEEE, 20, pp [8] L. Sweeey, k-aoymty: A moel for protectg prvacy, Iteratoal Joural of Ucertaty, Fuzzess a Kowlege-Base Systems, vol. 0, o. 05, pp , [9] A. R. Beresfor a F. Stajao, Locato prvacy pervasve computg, IEEE Pervasve computg, o., pp , [0] J. Freuger, R. Shokr, a J.-P. Hubaux, O the optmal placemet of mx zoes, Prvacy ehacg techologes. Sprger, 2009, pp []. H. ashae, Q. Zhu, T. Alpca, T. Bacşar, a J.-P. Hubaux, Game theory meets etwork securty a prvacy, AC Computg Surveys CSUR), vol. 45, o. 3, p. 25, 203. [2] G. Ghta, P. Kals, A. Khoshgozara, C. Shahab, a K.-L. Ta, Prvate queres locato base servces: aoymzers are ot ecessary, Proceegs of the 2008 AC SIGOD teratoal coferece o aagemet of ata. AC, 2008, pp [3]. Werke, P. Skvortsov, F. Dürr, a K. Rothermel, A classfcato of locato prvacy attacks a approaches, Persoal a Ubqutous Computg, vol. 8, o., pp , 204. [4] Y. Ca a G. Xu, Cloakg wth footprts to prove locato prvacy protecto locato-base servces, Ja. 205, us Patet App. 4/472,462. [Ole]. Avalable: US [5] H. Ko, Y. Yaagsawa, a T. Satoh, A aoymous commucato techque usg ummes for locato-base servces, Pervasve Servces, ICPS 05. Proceegs. Iteratoal Coferece o. IEEE, 2005, pp [6] H. Lu, C. S. Jese, a. L. Yu, Pa: prvacy-area aware, ummybase locato prvacy moble servces, Proceegs of the Seveth AC Iteratoal Workshop o Data Egeerg for Wreless a oble Access. AC, 2008, pp [7] J. Lee a C. Clfto, Dfferetal etfablty, Proceegs of the 8th AC SIGKDD teratoal coferece o Kowlege scovery a ata mg. AC, 202, pp [8] K. Chatzkokolaks, C. Palamess, a. Stroat, Geostgushablty: A prcple approach to locato prvacy, Dstrbute Computg a Iteret Techology. Sprger, 205, pp [9] H. H. Nguye, J. Km, a Y. Km, Dfferetal prvacy practce, Joural of Computg Scece a Egeerg, vol. 7, o. 3, pp , 203. [20] A. achaavajjhala, D. Kfer, J. Abow, J. Gehrke, a L. Vlhuber, Prvacy: Theory meets practce o the map, Data Egeerg, ICDE IEEE 24th Iteratoal Coferece o. IEEE, 2008, pp [2] S.-S. Ho a S. Rua, Dfferetal prvacy for locato patter mg, Proceegs of the 4th AC SIGSPATIAL Iteratoal Workshop o Securty a Prvacy GIS a LBS. AC, 20, pp [22] R. Dewr, Local fferetal perturbatos: Locato prvacy uer approxmate kowlege attackers, oble Computg, IEEE Trasactos o, vol. 2, o. 2, pp , 203. [23] K. Chatzkokolaks,. E. Arés, N. E. Boreabe, a C. Palamess, Broaeg the scope of fferetal prvacy usg metrcs. Prvacy Ehacg Techologes. Sprger, 203, pp [24] R. Shokr, Optmal user-cetrc ata obfuscato, arxv preprt arxv: , 204. [25] K. Chatzkokolaks, C. Palamess, a. Stroat, Locato prvacy va geo-stgushablty, AC SIGLOG News, vol. 2, o. 3, pp , 205. [26]. E. Arés, N. E. Boreabe, K. Chatzkokolaks, a C. Palamess, Geo-stgushablty: Dfferetal prvacy for locato-base systems, Proceegs of the 203 AC SIGSAC coferece o Computer & commucatos securty. AC, 203, pp [27] R. Shokr, G. Theoorakopoulos, G. Daezs, J.-P. Hubaux, a J.-Y. Le Bouec, Quatfyg locato prvacy: the case of sporac locato exposure, Prvacy Ehacg Techologes Sprger, 20, pp.
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
More informationAbraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
More informationIDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,
More informationSTATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ
More informationMaximization of Data Gathering in Clustered Wireless Sensor Networks
Maxmzato of Data Gatherg Clustere Wreless Sesor Networks Taq Wag Stuet Member I We Hezelma Seor Member I a Alreza Seye Member I Abstract I ths paper we vestgate the maxmzato of the amout of gathere ata
More informationANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
More informationA Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
More informationPreprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
More informationAPPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
More informationEnergy-efficient resource allocation for OFDMA two-way relay networks with imperfect CSI
Chag et al. EURASIP Joural o Wreless Commucatos a Networkg 015 015:5 DOI 10.1186/s13638-015-0455-6 RESEARCH Ope Access Eergy-effcet resource allocato for OFDMA two-way relay etworks wth mperfect CSI Zheg
More information6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
More informationNumerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
More informationADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
More informationAn Effectiveness of Integrated Portfolio in Bancassurance
A Effectveess of Itegrated Portfolo Bacassurace Taea Karya Research Ceter for Facal Egeerg Isttute of Ecoomc Research Kyoto versty Sayouu Kyoto 606-850 Japa arya@eryoto-uacp Itroducto As s well ow the
More informationAn Operating Precision Analysis Method Considering Multiple Error Sources of Serial Robots
MAEC Web of Cofereces 35, 02013 ( 2015) DOI: 10.1051/ mateccof/ 2015 3502013 C Owe by the authors, publshe by EDP Sceces, 2015 A Operatg Precso Aalyss Metho Coserg Multple Error Sources of Seral Robots
More informationSecurity Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
More informationThe Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
More informationAn Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
More informationOn Error Detection with Block Codes
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,
More informationStatistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
More information1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
More informationLow-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.
More informationApplications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
More informationOn formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal
More informationChapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
More informationT = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
More informationON SLANT HELICES AND GENERAL HELICES IN EUCLIDEAN n -SPACE. Yusuf YAYLI 1, Evren ZIPLAR 2. yayli@science.ankara.edu.tr. evrenziplar@yahoo.
ON SLANT HELICES AND ENERAL HELICES IN EUCLIDEAN -SPACE Yusuf YAYLI Evre ZIPLAR Departmet of Mathematcs Faculty of Scece Uversty of Akara Tadoğa Akara Turkey yayl@sceceakaraedutr Departmet of Mathematcs
More informationHow To Make A Supply Chain System Work
Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr
More informationGreen Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
More informationProactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos
More informationModels for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information
JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,
More informationThe Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
More informationISyE 512 Chapter 7. Control Charts for Attributes. Instructor: Prof. Kaibo Liu. Department of Industrial and Systems Engineering UW-Madison
ISyE 512 Chapter 7 Cotrol Charts for Attrbutes Istructor: Prof. Kabo Lu Departmet of Idustral ad Systems Egeerg UW-Madso Emal: klu8@wsc.edu Offce: Room 3017 (Mechacal Egeerg Buldg) 1 Lst of Topcs Chapter
More informationSimple Linear Regression
Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8
More informationA DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
More informationAverage Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
More informationConversion of Non-Linear Strength Envelopes into Generalized Hoek-Brown Envelopes
Covero of No-Lear Stregth Evelope to Geeralzed Hoek-Brow Evelope Itroducto The power curve crtero commoly ued lmt-equlbrum lope tablty aaly to defe a o-lear tregth evelope (relatohp betwee hear tre, τ,
More informationRUSSIAN ROULETTE AND PARTICLE SPLITTING
RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate
More informationAutomated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
More informationEfficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
More informationA Single Machine Scheduling with Periodic Maintenance
A Sgle Mache Schedulg wth Perodc Mateace Fracsco Ágel-Bello Ada Álvarez 2 Joaquí Pacheco 3 Irs Martíez Ceter for Qualty ad Maufacturg, Tecológco de Moterrey, Eugeo Garza Sada 250, 64849 Moterrey, NL, Meco
More informationThe impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
More informationA Hierarchical Latent Variable Model for Data Visualization
IEEE ASACIOS O PAE AAYSIS AD MACHIE IEIGECE, VO. 0, O. 3, MACH 998 8 A Herarchcal atet Varable Moel for Data Vsualzato Chrstopher M. Bshop a Mchael E. ppg Abstract Vsualzato has prove to be a powerful
More informationOptimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
More informationDynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
More informationn. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.
UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.
More informationOptimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z
More informationMaintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
More informationA New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
More informationNetwork dimensioning for elastic traffic based on flow-level QoS
Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto
More informationImpact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *
Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty
More informationOnline Appendix: Measured Aggregate Gains from International Trade
Ole Appedx: Measured Aggregate Gas from Iteratoal Trade Arel Burste UCLA ad NBER Javer Cravo Uversty of Mchga March 3, 2014 I ths ole appedx we derve addtoal results dscussed the paper. I the frst secto,
More informationBayesian Network Representation
Readgs: K&F 3., 3.2, 3.3, 3.4. Bayesa Network Represetato Lecture 2 Mar 30, 20 CSE 55, Statstcal Methods, Sprg 20 Istructor: Su-I Lee Uversty of Washgto, Seattle Last tme & today Last tme Probablty theory
More informationSpeeding up k-means Clustering by Bootstrap Averaging
Speedg up -meas Clusterg by Bootstrap Averagg Ia Davdso ad Ashw Satyaarayaa Computer Scece Dept, SUNY Albay, NY, USA,. {davdso, ashw}@cs.albay.edu Abstract K-meas clusterg s oe of the most popular clusterg
More informationRQM: A new rate-based active queue management algorithm
: A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew
More informationReinsurance and the distribution of term insurance claims
Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace
More informationFractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
More informationSettlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
More informationConstrained Cubic Spline Interpolation for Chemical Engineering Applications
Costraed Cubc Sple Iterpolato or Chemcal Egeerg Applcatos b CJC Kruger Summar Cubc sple terpolato s a useul techque to terpolate betwee kow data pots due to ts stable ad smooth characterstcs. Uortuatel
More informationProceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
More informationAn Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques
Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs
More informationChapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization
Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve
More informationRelaxation Methods for Iterative Solution to Linear Systems of Equations
Relaxato Methods for Iteratve Soluto to Lear Systems of Equatos Gerald Recktewald Portlad State Uversty Mechacal Egeerg Departmet gerry@me.pdx.edu Prmary Topcs Basc Cocepts Statoary Methods a.k.a. Relaxato
More informationCommon p-belief: The General Case
GAMES AND ECONOMIC BEHAVIOR 8, 738 997 ARTICLE NO. GA97053 Commo p-belef: The Geeral Case Atsush Kaj* ad Stephe Morrs Departmet of Ecoomcs, Uersty of Pesylaa Receved February, 995 We develop belef operators
More informationProjection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
More informationIP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
More informationNumerical Comparisons of Quality Control Charts for Variables
Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa
More informationWe investigate a simple adaptive approach to optimizing seat protection levels in airline
Reveue Maagemet Wthout Forecastg or Optmzato: A Adaptve Algorthm for Determg Arle Seat Protecto Levels Garrett va Ryz Jeff McGll Graduate School of Busess, Columba Uversty, New York, New York 10027 School
More informationThe Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk
The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet
More informationCompressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
More informationCredibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
More informationDECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
More informationUsing Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network
Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College
More informationOn Savings Accounts in Semimartingale Term Structure Models
O Savgs Accouts Semmartgale Term Structure Models Frak Döberle Mart Schwezer moeyshelf.com Techsche Uverstät Berl Bockehemer Ladstraße 55 Fachberech Mathematk, MA 7 4 D 6325 Frakfurt am Ma Straße des 17.
More informationFinito: A Faster, Permutable Incremental Gradient Method for Big Data Problems
Fto: A Faster, Permutable Icremetal Gradet Method for Bg Data Problems Aaro J Defazo Tbéro S Caetao Just Domke NICTA ad Australa Natoal Uversty AARONDEFAZIO@ANUEDUAU TIBERIOCAETANO@NICTACOMAU JUSTINDOMKE@NICTACOMAU
More informationImpact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
More informationVIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN
Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE
More informationThe Popularity Parameter in Unstructured P2P File Sharing Networks
The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN
More informationChapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
More informationProperties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
More informationNear Neighbor Distribution in Sets of Fractal Nature
Iteratoal Joural of Computer Iformato Systems ad Idustral Maagemet Applcatos. ISS 250-7988 Volume 5 (202) 3 pp. 59-66 MIR Labs, www.mrlabs.et/jcsm/dex.html ear eghbor Dstrbuto Sets of Fractal ature Marcel
More informationThe simple linear Regression Model
The smple lear Regresso Model Correlato coeffcet s o-parametrc ad just dcates that two varables are assocated wth oe aother, but t does ot gve a deas of the kd of relatoshp. Regresso models help vestgatg
More informationA Key-Policy Attribute-Based Broadcast Encryption
444 The Iteratoa rab Joura of Iformato Techooy Vo. 0 o. 5 September 0 Key-Pocy ttrbute-base Broacast Ecrypto J Su Yupu Hu a Leyou ha Departmet of ppcato Mathematcs X a Uversty of Techooy Cha Key Lab of
More informationA multi-layer market for vehicle-to-grid energy trading in the smart grid
A mult-layer market for vehcle-to-grd eergy tradg the smart grd Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad To cte ths verso: Albert Y.S. Lam, Logbo Huag, Aloso Slva, Wald Saad. A mult-layer market
More informationOptimizing Software Effort Estimation Models Using Firefly Algorithm
Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly
More informationModels of migration. Frans Willekens. Colorado Conference on the Estimation of Migration 24 26 September 2004
Models of mgrato Fras Wllekes Colorado Coferece o the Estmato of Mgrato 4 6 Setember 004 Itroducto Mgrato : chage of resdece (relocato Mgrato s stuated tme ad sace Cocetual ssues Sace: admstratve boudares
More informationUsing the Geographically Weighted Regression to. Modify the Residential Flood Damage Function
World Evrometal ad Water Resources Cogress 7: Restorg Our Natural Habtat 7 ASCE Usg the Geographcally Weghted Regresso to Modfy the Resdetal Flood Damage Fucto L.F Chag, ad M.D. Su Room, Water Maagemet
More informationCyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
More informationFast, Secure Encryption for Indexing in a Column-Oriented DBMS
Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that
More informationUSEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT
USEFULNESS OF BOOTSTRAPPING IN PORTFOLIO MANAGEMENT Radovaov Bors Faculty of Ecoomcs Subotca Segedsk put 9-11 Subotca 24000 E-mal: radovaovb@ef.us.ac.rs Marckć Aleksadra Faculty of Ecoomcs Subotca Segedsk
More informationAn IG-RS-SVM classifier for analyzing reviews of E-commerce product
Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha
More informationA COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS
A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS
More informationBasic statistics formulas
Wth complmet of tattcmetor.com, the te for ole tattc help Set De Morga Law Bac tattc formula Meaure of Locato Sample mea (AUB) c A c B c Commutatvty & (A B) c A c U B c A U B B U A ad A B B A Aocatvty
More informationTHE McELIECE CRYPTOSYSTEM WITH ARRAY CODES. MATRİS KODLAR İLE McELIECE ŞİFRELEME SİSTEMİ
SAÜ e Blmler Dergs, 5 Clt, 2 Sayı, THE McELIECE CRYPTOSYSTEM WITH ARRAY CODES Vedat ŞİAP* *Departmet of Mathematcs, aculty of Scece ad Art, Sakarya Uversty, 5487, Serdva, Sakarya-TURKEY vedatsap@gmalcom
More informationLoad Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
More informationHow To Value An Annuity
Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%
More information3.6. Metal-Semiconductor Field Effect Transistor (MESFETs)
.6. Metal-Semcouctor Fel Effect rator (MESFE he Metal-Semcouctor-Fel-Effect-rator (MESFE cot of a couctg chael potoe betwee a ource a ra cotact rego a how the Fgure.6.1. he carrer flow from ource to ra
More informationA particle Swarm Optimization-based Framework for Agile Software Effort Estimation
The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah
More informationThe Time Value of Money
The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto
More informationDynamic Service and Data Migration in the Clouds
2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg
More information