Information Flow Security in Tree-Manipulating Processes

Size: px
Start display at page:

Download "Information Flow Security in Tree-Manipulating Processes"

Transcription

1 TECHNISCHE UNIVERSITÄT MÜNCHEN Lehrstuhl für Informatk II Informaton Flow Securty n Tree-Manpulatng Processes Máté Amadé Kovács Vollständger Abdruck der von der Fakultät für Informatk der Technschen Unverstät München zur Erlangung des akademschen Grades enes genehmgten Dssertaton. Doktors der Naturwssenschaften (Dr. rer. nat.) Vorstzende: Unv.-Prof. Dr. Clauda Eckert Prüfer der Dssertaton: 1. Unv.-Prof. Dr. Helmut Sedl 2. Unv.-Prof. Dr. Markus Müller-Olm Westfälsche Wlhelms-Unverstät Münster De Dssertaton wurde am be der Technschen Unverstät München engerecht und durch de Fakultät für Informatk am angenommen.

2

3 Abstract Ths work descrbes methods to verfy nformaton flow propertes of processes manpulatng tree-structured data. The developed technques can be appled, e.g., to enterprse workflows and web servce technologes, where data s frequently represented n the form of XML documents. These systems are hghly securty crtcal, because they may be n control of mportant processes of organzatons, whle communcatng wth external partners over the network. The frst soluton s a runtme montor. It apples generalzed constant propagaton to overapproxmate the results of secret-dependent branchng constructs n order to prove ther equalty. The second method s a statc analyss that verfes nformaton flow propertes at complaton tme. It reles on relatonal abstract nterpretaton appled to a statcally determned algnment of two copes of the program and regular overapproxmatons of sets of pars of program states. Both methods allow to enforce end-to-end nformaton flow polces only, whch are composed n terms of the ntal and fnal states of computatons. In the thrd part of the thess tree-manpulatng reactve systems are consdered, where nformaton flow polces may change over tme. The postve fragment of the Lnear Temporal Logc s extended wth a modal operator, the so-called hde operator, n order to express that the observable behavor of the system s ndependent of specfc nput values untl a certan pont n tme. A model checkng algorthm s provded to verfy temporal nformaton flow propertes, whch combnes methods of abstract nterpretaton wth model checkng. In order to foster semantc clarty, the algorthms and technques are presented for a small assembly language for tree-manpulaton.

4 Zusammenfassung Dese Arbet beschrebt Methoden, de Informatonsfluss-Egenschaften von Programmen scherstellen können, deren Schwerpunkt de Verarbetung von baumstrukturerten Daten st. De entwckelten Technken können z.b. be Enterprse- Workflow-Systemen und Web-Servce-Technologen engesetzt werden, be denen Daten oft durch XML Dokumente repräsentert werden. Dese Systeme snd scherhetskrtsch, wel se wchtge Prozessabläufe ener Organsaton kontrolleren können, während se mt externen Partnern über das Netzwerk kommunzeren. De erste Methode nutzt enen Laufzet-Montor. En verallgemenerter Konstantenfaltungs-Algorthmus wrd verwendet, um das Ergebns von Verzwegungen, de von gehemzuhaltenden Informatonen abhängen, zu überapproxmeren, damt deren Äquvalenz bewesen werden kann. De zwete Methode verfzert Informatonsfluss-Egenschaften zur Übersetzungszet. Se basert auf relatonaler abstrakter Interpretaton, angewandt auf de statsche Abglechung zweer Kopen des Programms, und regulärer Überapproxmaton von Mengen von Paaren von Programmzuständen. Bede Methoden können ledglch sogenannte end-to-end Informatonsfluss-Egenschaften scherstellen, de n Bezug auf de ersten und letzten Zustände der Ausführung defnert snd. Im drtten Tel deser Dssertaton werden Baummanpulerende reaktve Systeme betrachtet, deren Scherhetsegenschaften sch zur Laufzet ändern können. Scherhetsegenschaften werden n ener Erweterung des postven Tels der lnearen temporalen Logk erfasst, de es ermöglcht, mthlfe des hde Operators de Unabhänggket des beobachtbaren Verhaltens des Systems von bestmmten Werten bs zu enem bestmmten Zetpunkt zu spezfzeren. Im Rahmen deser Arbet wurde en Model-Checkng-Algorthmus für de Analyse derartger Egenschaften entwckelt, der Methoden aus der abstrakten Interpretaton mt Model-Checkng kombnert. Um de semantsche Klarhet zu fördern, werden de Algorthmen und Methoden mthlfe ener klenen Assemblersprache für Baummanpulatonen dargestellt.

5 Contents 1 Introducton 1 2 Runtme Montor Prelmnares Bnary Trees Assembly Language for Tree Manpulaton Informaton Flow Polces The Runtme Montor through an Example Formal Treatment of the Montor Guarantees Related Work Relatonal Abstract Interpretaton Merge over all Twn Computatons Self-Compostons of Control Flow Graphs Provng Nonnterference Case Study Practcal Experments Combnng the Results of Multple Analyses Related Work Model Checkng Transton Systems Temporal Informaton Flow Polces Model Checkng Systems wth Fnte State Space Model Checkng Systems wth Infnte State Space Constructng the Abstract Transton System Constructng an Abstract State Machne Havng Fnte State Space Computng the Result Implementaton Transformng Formulae nto Büch Automata The Verfcaton Procedure Case Studes Related Work Concluson 79

6 v CONTENTS 6 Proofs Proofs for Chapter Proofs for Chapter Proofs for Chapter

7 Chapter 1 Introducton Today companes and organzatons frequently use computer systems to store data and to execute busness logc. These workflow systems bear the rsk of revealng crtcal nformaton through software bugs, attacks, or smple msconfguraton. Snce these systems are frequently used by several prncpals possbly havng conflctng nterests, the conscous desgn and enforcement of nformaton flow polces s of paramount mportance. Conference Management System Revewers Program Commttee Char Authors Fgure 1.1: An magnary conference management system and ts cooperatng partners. As an example, Fgure 1.1 llustrates the users of an magnary conference management system lke EasyChar. The users cooperate n order to successfully execute the workflow of submttng, revewng and decdng about the acceptance of papers. The conference management system tself mantans a document base descrbng the state of the submsson and revew process. The document base stores among others the uploaded documents, the comments and scores gven by the revewers, and a value descrbng whether the submssons have been accepted. Some examples for conflctng nterests n the context of 1

8 2 CHAPTER 1. INTRODUCTION conference management systems may be the followng: Authors mght be nterested n knowng the dentty of ther revewers. Authors mght wsh to know about ther compettors prevous to the dsclosure of accepted papers. There have already been securty breaches n conference management systems. For nstance HotCRP 40 verson 2.47 had a bug whch exposed comments of revewers to the authors, whch were exclusvely meant for the program commttee. There are well establshed programmng languages and technologes for the mplementaton of process management systems that are responsble for the coordnaton of workflows of organzatons. The famly of standards for web servces (e.g., 37, 20) enables the platform ndependent communcaton of computer programs on a network usng messages n XML 16 format. Based on ths technology, hgh level workflows can be composed from the functonaltes of ndvdual web servces usng the Web Servces Busness Process Executon Language (BPEL) 6. Accordngly, BPEL s desgned to mplement the autonomous busness logc of companes and organzatons that can also communcate wth external, ndependent enttes. Therefore, the nformaton flow securty of these processes may be crucal for organzatons to fulfll ther mssons. Another central aspect of BPEL workflows s that the values of varables are document trees. Even though the goal of BPEL programs s not to carry out complex computatons, stll the language s Turng complete. Data manpulaton can be carred out usng the XML Path Language 14 (XPath), and XSL Transformatons 46 (XSLT). As motvated above, the goal of ths work s to gve methods for the verfcaton and enforcement of nformaton flow propertes of programs manpulatng tree-structured data. We wll llustrate the developed solutons usng examples that mplement fragments of the magnary conference management system sketched n Fgure 1.1. We suppose that the workflow of organzng a conference conssts of a seres of phases. In one phase authors are allowed to upload papers, an other phase s e.g., when the submsson deadlne s passed, and papers are revewed. 1 <f name="if1"> 2 <condton> 3 <!CDATA$phase = "notfy"> 4 </condton> 5 <assgn> <copy> <from>$subdb </from> 6 <to> $toauthors </to> </copy> 7 </assgn> 8 <else> 9 <sequence> 10 <f name="if2"> 11 <condton> <!CDATA$averageScore < 1.5> 12 </condton> 13 <assgn name="evalreject"> 14 <copy> <from>"rejected"</from> 15 <to> $subdb/submssond=$paperid 16 /acceptance/text() 17 </to> </copy>

9 3 18 </assgn> 19 <else> 20 <assgn name="evalaccept"> 21 <copy> <from>"accepted"</from> 22 <to> $subdb/submssond=$paperid 23 /acceptance/text() 24 </to> </copy> 25 </assgn> 26 </else> 27 </f> 28 <assgn> <copy> <from>$subdb </from> 29 <to> $subdb_output </to> </copy> 30 </assgn> 31 </sequence> 32 </else> 33 </f> Lstng 1.1: A BPEL-lke pseudo-code fragment of an magnary conference management system. root submsson submsson d acceptance d acceptance 123 accepted 42 pendng Fgure 1.2: An example database mappng the dentfers of submssons to ther acceptance values. The dotted rngs mark the elements that can be addressed by the XPath expressons at lnes 15 and 22 n Lstng 1.1 dependng on the value of the varable paperid. Lstng 1.1 shows a possble fragment of a document submsson system lke EasyChar mplemented n a BPEL-lke language. A tree-shaped data structure stored n varable subdb s manpulated, whch contans the dentfers and acceptance states of the uploaded papers. The code covers two phases of the revew process. In the phase revew the average scores of papers are processed by the workflow engne. In ths phase, the code s executed each tme a revew s submtted. Based on the value of varable averagescore contanng the average of the scores already submtted for a paper, the program updates the acceptance status of the paper dentfed by the value of varable paperid. In the phase notfy the database s sent to the authors by assgnng t to the varable toauthors. A possble data structure representng a database s llustrated n Fgure 1.2. A smple nformaton flow polcy for the document submsson system could be the followng: The scores of the papers may not be revealed to the authors before the notfcaton phase. (1.1)

10 4 CHAPTER 1. INTRODUCTION The propertes ths work ams to analyze belong to the class of propertes called hyperpropertes 21. A hyperproperty s a statement about multple runs of a system. Semantcally, the requrement n (1.1) refers to at least two executons, the ntal state of whch may dffer n the value of the varable averagescore and the acceptance status of documents n the database. It poses the requrement that authors should not be able to observe any dfference n the outputs of any two executons untl a specfc pont n tme. The polcy n (1.1) llustrates the nature of problems ths work seeks to tackle. The goal of ths work s, therefore, to gve methods to verfy and enforce nformaton flow securty polces on programs manpulatng tree-structured data, as motvated by the BPEL language. The correspondng techncal challenges are the followng: 1. Formalsms are needed that can express nformaton flow polces specfyng the secrecy of subtrees of document trees. Furthermore, algorthms have to be found that can ether enforce the polces durng runtme, or prove them n complaton tme. 2. Enterprse workflows may run for an unbounded perod of tme, whle nformaton flow polces may change n response to events trggered by the envronment. Therefore, formalsms are needed that can express the temporal nature of nformaton flow polces, and algorthms are needed for ther verfcaton or runtme enforcement. Ths work presents the followng contrbutons: In Chapter 2 a runtme montor s ntroduced that enforces nformaton flow polces on tree-manpulatng programs. The runtme montor addresses challenge 1, the focus s on the propertes of programs manpulatng tree-structured documents. The presented soluton s based on the results publshed n 48. In Chapter 3 a statc analyss s developed based on relatonal abstract nterpretaton. The goal of ths analyss s to prove nformaton flow propertes of programs at complaton tme. Agan, Chapter 3 addresses challenge 1. The presented results are based on 49. In Chapter 4 a model checkng algorthm s descrbed that tackles challenge 2. Polces are composed usng the logc Restrcted SecLTL. Restrcted SecLTL extends the postve fragment of the Lnear Temporal Logc wth an addtonal modal operator, the so-called hde operator. The hde operator expresses that the observable behavor of the system s ndependent of specfc peces of secret untl an event occurs. The presented algorthm extends the model checkng procedure of 28 to systems wth unbounded state space. Much effort has been nvested n fndng adequate formalsms that descrbe the functonalty of servce orchestratons and choreography, n partcular, the BPEL 6 language. The majorty of the publcatons n ths topc can be sorted nto two groups. One 42, 74, 73, 61 apples formalsms based on Petr-nets 55 to model workflows, the other 39, 50, 63, 81, 18 prefers algebrac calcul lke the Π-calculus 52 as the bass for nvestgatons. The authors of 3 and 82

11 present securty-related results usng Petr-net based formalsms. A common property of these approaches s that they mostly focus on the control flow of orchestratons, sometmes wth emphass on error handlng, whereas data values undergo severe abstractons: They are ether consdered as atomc values, or completely dsregarded by handlng branchng decsons as nondetermnsm. The goal of ths work s to provde securty guarantees by takng advantage of the propertes of data values. Therefore, we ntroduce an assembly language for tree manpulaton that formalzes busness workflows, and apply program analyss and model checkng technques n order to tackle the challenges lsted above. 5

12 6 CHAPTER 1. INTRODUCTION

13 Chapter 2 Runtme Montor In ths chapter we present a runtme montor to enforce end-to-end nformaton flow polces on programs manpulatng tree-structured data. The authors of 66 note that runtme approaches 38, 77, 64 are on the rse, because they can be more permssve than statc solutons, whle provdng the same guarantees. In our case ths statement especally holds, because our montor takes advantage of the fact that durng runtme data nstances are avalable. In prncple, our montor executes programs n parallel to the operatonal semantcs of the language, whle mantanng a state whch only depends on publc data. In other words, the montor carres out a parallel computaton on the publc vew. The computaton of the publc vew s challengng n the case, when the result of a branchng construct, whose condton depends on the secret, s about to be evaluated. In ths case we apply a dataflow analyss procedure, whch s a generalzaton of constant propagaton (see e.g. 68) for handlng sem-structured data. The key dfference s the herarchc nature of lattce elements, whch algns to our purpose of preventng nformaton leakage n tree-manpulatng programs. Moreover, we gan precson by only consderng a modfcaton of a subtree nsde a secret-dependent branch as potentally secret, f t does not occur n the other alternatve as well, and thus must be excluded from the publc vew. In summary, ths chapter provdes the followng nnovatons: A runtme montor s ntroduced to support the specfcaton of nformaton flow polces n terms of tree-lke data and ther enforcement. The enforcement mechansm apples a generalzed varant of constant propagaton n order to compute the publc vew of the state at the end of branchng nstructons. Ths chapter s organzed as follows. In Secton 2.1 we ntroduce the programmng language, and dscuss how nformaton flow polces are composed. In Secton 2.2 we llustrate the ntuton behnd our soluton through an example, a fragment of a hypothetcal paper submsson system. We formalze the approach n Secton 2.3, and n Secton 2.4 we dscuss the guarantees the montor provdes us. Fnally, n Secton 2.5 we relate our work to others. 7

14 8 CHAPTER 2. RUNTIME MONITOR 2.1 Prelmnares Ths secton presents the necessary formalsms, languages and notatons that are the bass of ths work Bnary Trees In order to foster semantc clarty and smplcty, the technques of ths work are elaborated usng a small but powerful assembly language for tree manpulaton. The language s constructed to work wth bnary trees only. Ths s no restrcton n general, snce bnary trees are n one-to-one correspondence wth unranked trees. Unranked trees n turn can be consdered as the natural nternal representaton of XML documents. root submsson d 123 acceptance accepted # # submsson d # 42 acceptance pendng # Fgure 2.1: The bnary representaton of the database n Fgure 1.2. Defnton 1 (Bnary Trees). The set of bnary trees B Σ2,Σ 0 over the fnte set of bnary alphabet elements Σ 2 and the set of nullary alphabet elements Σ 0 s defned by the language: τ ::= σ 0 σ 2 (τ 1, τ 2 ) where σ 0 Σ 0, σ 2 Σ 2 and τ 1, τ 2 B Σ2,Σ 0. The set of nullary alphabet elements Σ 0 does not necessarly need to be fnte. Fgure 2.1 llustrates the bnary representaton of the data structure of Fgure 1.2 constructed usng the frst-chld/next-sblng (FCNS) encodng 22. The bnary tree σ 2 (τ 1, τ 2 ) s nterpreted as an unranked forest, where the root of the leftmost tree s labeled σ 2. Its content s the unranked varant of τ 1, whle the forest on ts rght hand sde s the unranked varant of τ 2. The nullary node labeled # Σ 0 represents the empty forest. Nullary nodes can also be labeled wth basc values lke 42, whch are always between sgns n order to emphasze that they belong to Σ 0. The FCNS encodng maps nullary nodes representng basc values to themselves Assembly Language for Tree Manpulaton The grammar of the assembly language for tree manpulaton s shown n Fgure 2.2. The value of a tree expresson generated by the nontermnal e s ether the content of a varable x, the nullary node #, or a bnary tree composed of a new root labeled σ 2 havng the contents of varables x 1 and x 2 as subtrees. The

15 2.1. PRELIMINARIES 9 (tree expressons) e ::= x # σ 2 (x 1,x 2 ) x/1 x/2 λ t (x 1, x 2,...) (Boolean expressons) b ::= top(x)=σ λ b (x 1, x 2,...) (commands) c ::= skp x:=e f b then {p 1 } else {p 2 } whle b do {p} (program) p ::= ε c;p Fgure 2.2: The grammar of the assembly language for tree manpulaton, where σ 2 Σ 2 and σ Σ 2 {#}. expressons x/1 and x/2 refer to the frst and second subtrees of the tree stored n varable x. In case the chldren of leaves are addressed by x/1 or x/2 an error occurs. It s also possble to carry out an arbtrary computaton based on the values of an arbtrary set of varables usng nterpreted functons λ t (x 1,x 2,...). The only constrant aganst these nterpreted functons s that they must return a nullary node. Boolean expressons generated by the nontermnal b may test the label of the root of the tree stored n a varable, and carry out an arbtrary computaton usng the nterpreted functon λ b (x 1,x 2,...) returnng a Boolean value. Interpreted functons λ t (x 1,x 2,...) and λ b (x 1,x 2,...) are determnstc, they do not have sde effects, and the executon of λ t can also result n the error state. In our examples we wll use nfx operators lke less or equal to =< or equvalence = as nstances for nterpreted functon symbols wth the ntutve semantcs. top(x)=σ s = s f σ Σ 2 {#} and s(x) has root labeled wth σ top(x)=σ s = s f σ Σ 2 {#} and s(x) has root labeled wth some σ σ λ b (x 1,x 2,...) s = s f λ b (s(x 1 ), s(x 2 ),...) holds x:=y s = sx s(y) x:=# s = sx # skp s = s x:=σ 2 (x 1,x 2 ) s = sx σ 2 (s(x 1 ), s(x 2 )) where σ 2 Σ 2 sx τ 1 f s(y) = σ 2 (τ 1,τ 2 ) for some x:=y/1 s = label σ 2, and trees τ 1 and τ 2 otherwse sx τ 2 f s(y) = σ 2 (τ 1,τ 2 ) for some x:=y/2 s = label σ 2, and trees τ 1 and τ 2 otherwse x:=λ t (x 1,x 2,...) s = sx λ t (s(x 1 ), s(x 2 ),...) or f = for assgnments and expressons f Fgure 2.3: State transformers of assgnments and Boolean expressons. States of the form sx τ stand for states, where we have sx τ(y) = s(y) for all y x, and sx τ(x) = τ. A structured program generated by the nontermnal p s a possbly empty

16 10 CHAPTER 2. RUNTIME MONITOR sequence of commands. A command can be ether the empty command skp, an assgnment x:=e, whch updates the value of the varable x wth the value of the tree expresson e, a condtonal executon of alternatve programs f, or an teraton whle. In ths chapter the semantcs of the language s defned by the transton relaton cfg ρ cfg between confguratons of the form p, s, where p s the program to be executed on the state s. In case of fnal confguratons, where p = ε we smply wrte s nstead of ε, s. The state s : (X B Σ2,Σ 0 ) { } s a mappng from the set of varables X of the program to bnary trees B Σ2,Σ 0, or the error state, denoted by, symbolzng that a runtme error has occurred durng the executon. The functonalty of basc state transformers correspondng to assgnments and Boolean expressons s defned n Fgure 2.3. Note that even though the negaton operator ( ) s not avalable for programmers accordng to the grammar, t occurs n the semantcs. The transformers n Fgure 2.3 are also gong to be used n later sectons, where the semantcs of the programmng language s defned usng control flow graphs. There, the applcaton of the negaton operator s necessary. On the other hand, the absence of the negaton operator does not decrease the expressveness of the programmng language and smplfes the notaton. E: s = c, s ρ A: s x:=e, s ρ x:=e s S: c, s ρ s c;p, s ρ p, s WT: s b s = s p, s ρ s whle b do {p}, s ρ whle b do {p}, s IT: IF: WF: s b s = s whle b do {p}, s ρ s s b s = s p tt, s ρ s f b then {p tt } else {p ff }, s ρ s s b s = s p ff, s ρ s f b then {p tt } else {p ff }, s ρ s Fgure 2.4: The semantcs of the programmng language. The semantcs of the programmng language s shown n Fgure 2.4. In the condton parts of the rules we use the relaton ρ, whch denotes the reflexve and transtve closure of ρ. A central rule of the semantcs s S, whch s responsble for executng a program, n other words a sequence of commands. The remanng rules defne the effects of ndvdual commands. Due to rule E, the error state s not modfed by any command. Instead, t s passed over to the next command n the sequence, or to the fnal confguraton. In case the state s not erroneous, the executon of an assgnment s specfed by rule A. The rules WT and WF execute teratons, IT and IF execute condtonal selectons of alternatve programs as t s usual n other structured programmng languages. Because here we are concerned wth end-to-end nformaton flow polces, we assume that nput values of computatons are gven n the ntal confguraton,

17 2.1. PRELIMINARIES 11 and the result s presented n the fnal confguraton. We assume furthermore, that each varable carres a value n the ntal state, therefore, no error can be trggered by a varable access. 1 // 1. Selectng the phase: 2 f top(phase)=notfy then { 3 toauthors := subdb; 4 } 5 else { 6 7 // 2. Intalzaton: 8 empty := #; 9 submssonsrev := #; 10 submssons := subdb/1; // 3. Branchng based on condtonal value: 13 f averagescore < 1.5 then { // 4/tt. Searchng the elements to be modfed: 16 found := false(empty,empty); 17 whle top(found)=false do { 18 d := submssons/1; 19 dval := d/1; 20 f dval = paperid then { 21 found := true(empty,empty); 22 } else { 23 submssonsrev := submsson(d,submssonsrev); 24 submssons := submssons/2; 25 }; 26 }; // 5/tt. Modfyng the acceptance value dependng on 29 // averagescore: 30 acceptanceval := rejected ; // 6/tt. Reconstructng the data structure of the submsson: 33 acceptance := acceptance(acceptanceval,empty); 34 d := d(dval,acceptance); 35 submssons := submssons/2; 36 submssons := submsson(d,submssons); // 7/tt. Reconstructng the data structure of the database: 39 stop := false(empty,empty); 40 whle top(stop)=false do { 41 f top(submssonsrev)=submsson then { 42 d := submssonsrev/1; 43 submssons := submsson(d,submssons); 44 submssonsrev := submssons/2; 45 } else { 46 stop := true(empty,empty); 47 }; 48 }; } else {

18 12 CHAPTER 2. RUNTIME MONITOR // 4/ff. Searchng the elements to be modfed: 53 found := false(empty,empty); 54 whle top(found)=false do { 55 d := submssons/1; 56 dval := d/1; 57 f dval = paperid then { 58 found := true(empty,empty); 59 } else { 60 submssonsrev := submsson(d,submssonsrev); 61 submssons := submssons/2; 62 }; 63 }; // 5/ff. Modfyng the acceptance value dependng on 66 // averagescore: 67 acceptanceval := accepted ; // 6/ff. Reconstructng the data structure of the submsson: 70 acceptance := acceptance(acceptanceval,empty); 71 d := d(dval,acceptance); 72 submssons := submssons/2; 73 submssons := submsson(d,submssons); // 7/ff. Reconstructng the data structure of the database: 76 stop := false(empty,empty); 77 whle top(stop)=false do { 78 f top(submssonsrev)=submsson then { 79 d := submssonsrev/1; 80 submssons := submsson(d,submssons); 81 submssonsrev := submssons/2; 82 } else { 83 stop := true(empty,empty); 84 }; 85 }; 86 }; // 8. Presentng the result. 89 subdb := root(submssons,empty); 90 subdb_output := subdb; 91 }; Lstng 2.1: The mplementaton of the functonalty of the pseudo code of Lstng 1.1 n the assembly language for tree manpulaton. Lstng 2.1 shows the mplementaton of the functonalty of the pseudo code of Lstng 1.1 n the assembly language for tree manpulaton. The program assumes that the bnary representaton of a database lke that n Fgure 2.1 s gven n the varable subdb, and the modfed database at the end of the computaton s stored n varable subdb Output. The dentfer of the paper, the acceptance value of whch s to be updated s stored n varable paperid, the average of the scores already submtted for the paper s stored n varable averagescore. Each tme the program s executed, frst the actual phase of the revew process s determned based on the value of phase. In case we are n the revew phase,

19 2.1. PRELIMINARIES 13 the program modfes the database based on the average score correspondng to the specfed paper. In the phase notfy, the program assgns the database to the varable toauthors, whch s vsble by the authors. The code tself s dvded nto 12 separate sectons. In the frst secton the actual phase s determned. The second secton ntalzes some varables that wll be necessary later on durng the computaton. In partcular, the varable submssons s ntalzed wth the frst chld of the tree stored n varable subdb. The thrd secton s a branchng decson based on the value of averagescore. The correspondng Boolean expresson averagescore < 1.5 at lne 13 s an example of an nterpreted Boolean functon λ b. The functonaltes of the branches are very smlar, because they mplement a tree manpulaton specfed by dentcal XPath expressons at lnes 15 and 22 n Lstng 1.1. We tred to emphasze the correspondence of some fragments of code n the two branches. Therefore, for example, the secton responsble for queryng the submsson dentfed by paperid s numbered 4/tt n the postve branch and 4/ff n the negatve branch. Accordngly, the fourth secton s the query n both of the branches, whch selects the submsson wth dentfer as t s stored n varable paperid. In each teraton of the loops at lnes 17 and 54, the head of the lst of submssons s examned, whether t corresponds to the document wth the rght dentfer. If not, then the head s appended to the lst submssonsrev. Accordngly, submssonsrev contans a prefx of the ntal value of submssons n reverse order. The examnaton of dentfers s carred out by the branchng constructs at lnes 20 and 57, where the Boolean expresson s dval = paperid. Ths expresson s an other example of an nterpreted Boolean expresson λ b. The ffth secton assgns a value to the varable acceptanceval dependng on the average of scores gven. Next, the data structure for the actual paper s reassembled n both of the branches and appended to submssons. The seventh secton reconstructs the orgnal order of papers n the database submssons usng submssonsrev. By ths last teraton the database s reconstructed so that only the acceptance value of the approprate submsson s modfed. Note that the lst of trees as t s stored n varable submssons at the end of secton 7 corresponds to a bnary forest. The second chld of the root of the bnary representaton of an unranked tree s always #. Therefore, by the frst lne of secton 8 the bnary representaton of the unranked database s restored, and the second lne assgns t to the output varable Informaton Flow Polces In the semnal paper 26 Dennng made the observaton, that nformaton flow polces must be necessarly composable n terms of lattces. Our nformaton flow polces consderng trees adhere to ths observaton. The smplest nformaton flow lattce s low hgh specfyng that peces of nformaton classfed hgh must not be observed by prncpals classfed low. In ths work we group the peces of nformaton and the prncpals partcpatng n the actvtes of workflows nto these two groups as well. In ths work we consder programs manpulatng tree-shaped data, therefore, nformaton flow polces classfy nodes n trees. Our technques can enforce nformaton flow polces, where the secrecy level of nodes does not decrease on the paths from the root to the leaves. A polcy s defned n terms of publc vews correspondng to the elements of the nformaton flow lattce. The publc vew

20 14 CHAPTER 2. RUNTIME MONITOR correspondng to a lattce element ξ can be obtaned by replacng the greatest subtrees, the roots of whch have secrecy level hgher than ξ wth a leaf labeled. In our case, where the nformaton flow lattce conssts of two elements, the nformaton flow polcy s defned by a sngle publc vew correspondng to the element low. The vew correspondng to hgh s not necessary because that s dentcal to the entre document wthout nodes labeled. root 123 submsson d acceptance # # submsson d # 42 acceptance # Fgure 2.5: The polcy specfyng that the acceptance values of the submssons n the data structure of Fgure 2.1 are secret. As an example, let us compose an nformaton flow polcy specfyng that the acceptance values of submssons n the database of Fgure 2.1 are secret. Ths s done by the polcy n Fgure 2.5, where the leaves labeled wth the acceptance values are replaced wth nullary nodes labeled. Informaton flow polces for programs realzng a functon from the ntal state to the fnal state are frequently defned n terms of these states. We call these polces end-to-end nformaton flow polces, n order to emphasze ther dfference to temporal nformaton flow polces characterzng the sequence of values exchanged between a system and ts envronment durng the executon. 2.2 The Runtme Montor through an Example Smlarly to other runtme montors, e.g., 77, 38, 66, 64, n order to enforce nformaton flow propertes, we extend the confguraton of the semantcs of the language wth an addtonal member. The new member D : (X B Σ2,Σ 0 { }) {,, }, referred to as the montor state, assgns to every varable ether a bnary tree havng the extra nullary alphabet element, or s one of the symbols, and. Intutvely, D(x) stores the publc vew of the value of the varable x n the correspondng real state s. The montor recalculates D n parallel to each transton of the operatonal semantcs, and at the end the fnal montor state s presented as the result of the computaton for prncpals belongng to the securty lattce element low. 1 empty:=#; 2 f top(author)=a_mustermann then { 3 f top(topc)=databases then { 4 rev2:=conflct(empty,rev2); 5 rev1:=lstelem(doc,rev1); 6 } 7 else { 8 rev2:=conflct(empty,rev2);

21 2.2. THE RUNTIME MONITOR THROUGH AN EXAMPLE 15 9 rev3:=lstelem(doc,rev3); 10 }; 11 } 12 else { 13 skp; 14 }; Lstng 2.2: Branchng on a secret value. In the next paragraphs, we nformally llustrate the functonalty of the runtme montor by an example. The code fragment n Lstng 2.2 could be part of a paper submsson system dstrbutng the papers to revewers. Let us suppose that revewer 2 declared a conflct of nterest wth the author A. Mustermann, and therefore the dstrbuton system s not allowed to send nformaton to hm about the content. Therefore, from the pont of vew of revewer 2, the topc of the paper of A. Mustermann s secret too. Let us suppose that the runtme montor reaches lne 3 of the code n Lstng 2.2 wth montor state: D 0 = {..., topc, rev1 #, rev2 lstelem(document(...), #),...} Because the condtonal expresson depends on the secret, constant propagaton s carred out on ths branchng command. We can dentfy the value wth the top element of constant propagaton expressng that the value s not constant and therefore, may leak nformaton about the secret. After executng the branches we get: D then = {..., rev1 lstelem(document(...), #), rev2 conflct(#, lstelem(document(...), #)),...} D else = {..., rev1 #, rev2 conflct(#, lstelem(document(...), #)),...} After the jon computaton we have: D = {..., rev1, rev2 conflct(#, lstelem(document(...), #)),...} Computng the jon of two states can be done by replacng the values of varables at postons where they dffer, wth the symbol. In ths way, t s guaranteed that the montor state s ndependent of the secret after the branchng construct. For the jon computaton, therefore, t s not necessary to replace author author = author M. Smth author M. Smth author M. Smth author J. Doe author R. Mles author author R. Mles J. Doe Fgure 2.6: The jon on document trees, where the leaves labeled # are omtted for the sake of smplcty. the entre value of a varable wth f the two values dffer only for certan subtrees. Fgure 2.6 llustrates the jon computaton for the values of varable authors n montor states D then and D else n a stuaton lke that. The varable contans a lst of authors and ther documents that they submtted. Let us suppose that the order of two authors has been exchanged n one of the two

22 16 CHAPTER 2. RUNTIME MONITOR secret-dependent condtonal branches n order to leak nformaton. By computng the jon, we only need to replace those members of the lst whch were exchanged, but we can leave the others as they are. In ths way, we take the sem-structured nature of data nto account and gan addtonal precson. Another advantage of our approach s the followng. Because n the code fragment of Lstng 2.2 the varable rev2 s assgned n a secret branch, many nformaton flow analyzers would consder ts value secret. The solutons motvated by the type system of Volpano et al. 78 lke Jf 56, 4, SIF 19 and Paralocks 17 do so because the varable rev2 has been assgned n an envronment, where the program counter depends on the secret and therefore s hgh. Smlarly behave runtme montors 77, 38, 66, 64 for the same reason. The program slcng 43 based solutons lke Joana 41 do so, because of the control dependence edges from the condtonal expressons to assgnments. Our dea s based on the observaton that n the fnal confguraton the value of the varable rev2 s ndependent of the value of topc. Ths could happen, perhaps, because the program notced by the embeddng branchng decson, that the content of the paper s secret and behaved correctly. Accordngly, the observaton of rev2 does not gve us nformaton on the secret value. Our runtme montor would consder the value of rev2 as publc, because t determnes the confdental parts of values by means of the jon computaton after extng from branchng commands dependng on secret values. There are approaches based on bsmulaton, e.g. 51, 47, allowng publc assgnments n secret branches, f the equvalence of the publc effects of these branches s proved. Because program equvalence s n general undecdable, these solutons rely on syntactc approxmatons. In our soluton f programs p and q are equvalent, they do not read confdental varables, and they termnate, then the result of f secret=0 then {p} else {q} s recognzed publc regardless of the syntactc representaton of p and q. In the next secton we formally elaborate the deas ntroduced here. 2.3 Formal Treatment of the Montor In order to descrbe the runtme montor formally, we need some more defntons. In the followng, we regard a tree τ as a mappng from ts postons Pos(τ) to the alphabet Σ = Σ 2 Σ 0 { }, where the doman s a prefx closed subset of {1, 2}. Accordngly, we use the notaton τ(π) to refer to the alphabet element at poston π of the tree τ. If a node π of τ has successors, then τ(π) Σ 2, otherwse τ(π) Σ 0 { }. We denote the subtrees rooted at the frst and the second chld of the root of τ wth τ/1 and τ/2 respectvely. Defnton 2 (Preorder of Trees). If τ 1, τ 2 B Σ2,Σ 0 { } then τ 1 τ 2 holds f one of the followng s true: τ 2 (ε) =. τ 2 (ε) and τ 1 (ε) = τ 2 (ε), furthermore, f τ 1 (ε) Σ 2 then τ 1 /1 τ 2 /1 and τ 1 /2 τ 2 /2. In Defnton 2 the symbol occurs as an addtonal nullary element, whch represents a secret subtree n the publc vew. Smlarly to the state, the montor state can also be erroneous, denoted by, meanng that the executon reached an nconsstent stuaton. It s also possble that the error state tself depends

23 2.3. FORMAL TREATMENT OF THE MONITOR 17 D f D(x)(ε) = σ M top(x)=σ Dx σ(, ) f D(x) = and σ Σ D = 2 Dx σ f D(x) = and σ Σ 0 otherwse M top(x)=σ D = { D f D(x)(ε) σ f D(x)(ε) = σ (2.1) (2.2) M x:=y D = Dx D(y) M x:=# D = Dx # M x:=σ 2 (x 1,x 2 ) D = Dx σ 2 (D(x 1 ), D(x 2 )) where σ 2 Σ 2 M skp D = D (2.3) M x:=y/1 D = M x:=y/2 D = Dx τ 1 f D(y) = σ 2 (τ 1,τ 2 ) for some σ 2 f D(y) = otherwse Dx τ 2 f D(y) = σ 2 (τ 1,τ 2 ) for some σ 2 f D(y) = otherwse (2.4) M λ b (x 1,x 2,...) D = D where D = {D s D : λ b (x 1,x 2,...) s D } M x:=λ t (x 1,x 2,...) D = D where D = {D s D : x:=λ t (x 1,x 2,...) s D } M f D = D f D {,, } for all assgnments and Boolean expressons f (2.5) (2.6) (2.7) Fgure 2.7: Montor state transformers of assgnments and Boolean expressons.

24 18 CHAPTER 2. RUNTIME MONITOR on the secret. Ths happens for nstance, f one condtonal branch of a decson dependng on the secret exhbts an error, whle the other does not. We have ntroduced the top element to represent ths case. For the montor state, a data flow analyss wll be performed to approxmate the publc vew after a secretdependent branchng construct. For ths analyss, a bottom element (denotng unreachablty) comes n handy to obtan a complete lattce (see Defnton 3). Defnton 3 (Complete Lattce of Montor States). The complete lattce of montor states s D = (X B Σ2,Σ 0 { }) {,, }. For any D 1, D 2 D the relaton D 1 D 2 holds f one of the followng s true: D 1 = D 2 = D 1 = and D 2 = If D 1, D 2 {,, } then for all varables x t holds that D 1 (x) D 2 (x) accordng to Defnton 2. The dea of the montored executon s to carry out the state transformatons on the real state and on the montor state n parallel. For each assgnment or Boolean expresson f the functon f s carred out on the real state s, and the functon M f s carred out on the montor state D. The functon M f s defned so that whenever s D then f s M f D holds too. The ntutve meanng of the relaton between the real state and the montor state s that they agree on publc values, and ths s the property our montor guarantees along the run. The state transformers for montor states are shown n Fgure 2.7, where the effects of Boolean expressons are dsplayed by formulae (2.1) and (2.2). Boolean expressons are transformatons on the montor state just as tree expressons are. Bascally, a Boolean expresson b holds on the montor state D (.e., M b D = D) f there s potentally a state s where s D and b s = s. In the other case the result s, whch represents unreachablty. In (2.1) however, addtonal modfcatons are carred out on the montor state. The content of the varable x s transformed to the greatest tree that does not equal to, for whch the Boolean expresson holds. The purpose of the transformaton s to enhance precson whle preservng soundness. 1 f top(x)=σ 2 then { 2 y:=x/2; } else {... }; Consder the lstng above havng an assgnment y:=x/2 n the postve branch of a branchng construct. Snce the condton tests the label of the root of the tree n x for the symbol σ 2 Σ 2, t s mpossble that the root of the value n x at lne 2 s labeled wth an element of Σ 0. Therefore, the montor state after the assgnment does not need to represent the error state, whch cannot happen for any real state anyway. On the other hand, soundness s preserved by the fact that the montor state of the negatve branch s not modfed by the Boolean expresson (2.2). Therefore, the fnal montor states of both branches are n the desrable relaton wth all possble real states, gven that the relaton was also present ntally.

25 2.3. FORMAL TREATMENT OF THE MONITOR 19 The montor state transformers correspondng to assgnments as shown by (2.3) and (2.4) are almost dentcal to the real state transformers n Fgure 2.3. The only dfference s n (2.4), where there s an addtonal case for the stuaton, when the chldren of a leaf wth label are addressed. Dependng on the secret, the result of the expresson on the correspondng real state may possbly be but t s not necessary. Therefore, the montor state must be swtched to, n order to ndcate that the occurrence of the error state may depend on confdental nformaton. CA: D {, } x:=e, n, (s, D) γ ( x:=e s, M x:=e D) CCE: D {, } c, s ρ s c, n, (s, D) γ (s, D) CS: c, n, (s, D) γ (s, D ) c;p, n, (s, D) γ p, n, (s, D ) CIT: CIF: D {, } M b D = p tt, n, (s, D) γ (s, D ) f b then {p tt } else {p ff }, n, (s, D) γ (s, D ) D {, } M b D = p ff, n, (s, D) γ (s, D ) f b then {p tt } else {p ff }, n, (s, D) γ (s, D ) CWT: D {, } M b D M b D f b then {p tt } else {p ff }, s ρ s (f b then {p tt } else {p ff }), s, D µ D CIH: f b then {p tt } else {p ff }, n, (s, D) γ (s, D ) D {, } M b D = p, n, (s, D) γ (s, D ) whle b do {p}, n, (s, D) γ whle b do {p}, n, (s, D ) CWF: D {, } M b D = whle b do {p}, n, (s, D) γ (s, D) CWH: D {, } M b D M b D whle b do {p}, s ρ s (whle b do {p})(n), D µ D whle b do {p}, n, (s, D) γ (s, D ) Fgure 2.8: The montored semantcs. The transformers correspondng to nterpreted functons λ b and λ t are specfed by (2.5) and (2.6). Snce the real semantcs of these functons are unknown, the equatons only specfy the condtons that need to be fulflled by all possble sound runtme montors. Accordngly, the resultng montor state D needs to be greater or equal to all possble resultng real states. An addtonal requrement aganst D s that t needs to be the least among those that fulfll the prevous requrement. Ths way, the resultng montor state s the smallest among those that are sound wth respect to the concrete state transformer. The semantcs of the montored executon s defned n the form of relatons cfg γ cfg between confguratons of the form p, n, (s, D), where p s a pro-

26 20 CHAPTER 2. RUNTIME MONITOR States n synchrony. 4 s D Montored executon usng rules γ. Generalzed constant propagaton usng rules µ. Jon computaton. Fgure 2.9: A montored executon of the example program at Lstng 2.2, where the numbers of edges dentfy the lne n the code they stand for. In partcular, the meanng of 3 s that the negated verson of the Boolean expresson of lne 3 s executed. gram to be executed and s s the state of the executon. The member D s the publc vew of the state s, whch we call the montor state, s s called the real state. The member n s a natural number nfluencng the precson of the montor when computng the publc effect of branchng constructs. Larger values correspond to enhanced precson and longer computaton tme. In the ntal confguraton p 0, n, (s 0, D 0 ) t holds that s 0 D 0. Furthermore, there are no trees wth nodes labeled n the contents of s 0. The transton rules of the montored semantcs are shown n Fgure 2.8, and a montored executon of the program n Lstng 2.2 s llustrated n Fgure 2.9. As long as the montored semantcs does not execute a branchng construct, the condton of whch depends on the secret, the montored executon carres out the transformatons on s and D smultaneously. Accordngly, assgnments are executed n parallel on s and on D as t s defned by rule CA. If the montor state D {,, }, then t s smply propagated to the next command n the sequence usng rule CCE. The truth values of Boolean expressons are determned based on the montor state. If M b D =, then we assume b to be true. Accordngly, snce the content of the varable author does not depend on the secret, lne 2 of Lstng 2.2 s executed on the montor and the real state usng rule CIT n Fgure 2.8. In case M b D and M b D smultaneously, we execute a branchng construct, the condton of whch may depend on the secret. In ths case, accordng to rules CIH and CWH, the result of the branchng command on the real state s computed usng the orgnal semantcs of Fgure 2.4, the resultng montor state s computed usng a generalzed constant propagaton algorthm. Ths s vsualzed n Fgure 2.9, where multple branches of a branchng construct are executed on the montor state usng rules µ. At the common fnal node of the branches the results of the branches are joned n order to compute the result of the whole branchng construct. The parameter n n the confguraton of the montored executon s used by the generalzed constant propagaton algorthm. Assume that the command c n the confguraton c;p, n, (s, D) s a branchng construct, the condton of whch depends on the secret. In ths case we apply the generalzed constant

27 2.3. FORMAL TREATMENT OF THE MONITOR 21 propagaton on the command c(n), whch we construct based on c by replacng all occurrences of the command whle b do {p} n the program text of c by whle(n) b do {p}. MCE: D {,, } c, D µ D MA: D {,, } x:=e, D µ M x:=e D MS: c, D µ D c;p, D µ p, D MI: p tt, M b D µ D tt p ff, M b D µ D ff D {,, } D = D tt D ff f b then {p tt } else {p ff }, D µ D MWT: D {,, } M b D = n > 0 p, M b D µ D whle(n) b do {p}, D µ whle(n 1) b do {p}, D MWF: D {,, } M b D = whle(n) b do {p}, D µ D MWH: MWX: (M b D M b D ) n 0 D {,, } p, M b D µ D 1 D = D 1 D D D whle(n) b do {p}, D µ whle(n 1) b do {p}, D (M b D M b D ) n 0 D {,, } p, M b D µ D 1 D = D 1 D D D whle(n) b do {p}, D µ D Fgure 2.10: Generalzed constant propagaton. The generalzed constant propagaton algorthm s defned n Fgure 2.10, whch s bascally the rule-based formalzaton of a syntax-drected fxed-pont computaton algorthm on the program text as t s presented n 15. The lattce s the set of possble montor states accordng to Defnton 3. The rules defnng the functonalty of assgnment (MA), sequental executon of commands (MS), and the propagaton of the states, and (MCE) are very smlar to rules A, S and E of the orgnal semantcs. The only dfference s at rule MCE, whch propagates the states and unmodfed as well. The rule MI s responsble for computng the montor state transformaton correspondng to an f command. It evaluates both branches wth ntal states M b D and M b D and then jons the results. The rules MWT, MWF, MWH and MWX are used to compute the publc effect of teratons. If the parameter n s less or equal to zero, or the condton b s secret-dependent, then a fxed pont s computed by rules MWH and MWX. If, however, the condton s ndependent of the secret, and n s greater than zero, the montor executes the body of the loop teratvely by applyng rules MWT and MWF. At the same tme ths mght not termnate. So the purpose of n s

28 22 CHAPTER 2. RUNTIME MONITOR to allow the user to specfy how many tmes the montor should apply the rule MWT before swtchng to the fxed pont computaton. In partcular, settng the parameter n to zero n the ntal confguraton of the montored executon p, n, (s, D) amounts to choosng to omt the applcaton of rules MWT and MWF, and use only the fxed pont computaton offered by rules MWH and MWX. At the same tme ths mght result n an unnecessarly naccurate montor state. Because the complete lattce of Defnton 3 has the ascendng chan condton, as Theorem 1 states below, the fxed pont computaton always termnates. Theorem 1. If there s an s so that s D and p, s ρ s, then there s a D so that p, n, (s, D) γ (s, D ). Proof. The dea behnd the proof s the followng: If there s no branchng construct executed havng a secret-dependent condton along the montored executon, then the state transtons are carred out smultaneously on the real state and on the montor state. In the case of a branchng construct havng a secret-dependent condton, the publc effect s computed by the algorthm n Fgure The only rule, whch could be appled an unbounded number of tmes s MWH, but because the lattce of Defnton 3 has the ascendng chan condton, the fxed pont computaton termnates. For the detaled proof of ths case please refer to Lemma 3 n Secton Guarantees In ths secton we formally dscuss the guarantees provded by the runtme montor. Smlarly to other language-based nformaton flow controllng solutons 27, 56, 4, 65, 64, 41, 38, 77, our approach enforces a varant of termnatonnsenstve nonnterference 7 talored for our computatonal model. Accordngly, we do not consder covert channels lke the tmng channel, the heat channel, or the memory consumpton channel, or any other channel that could result from the propertes of a specfc mplementaton or runtme envronment. Defnton 4 (Termnaton-Insenstve Nonnterference 1 ). Program p satsfes termnaton-nsenstve nonnterference relatve to the ntal and fnal publc vews D and D f and only f for all s 1, s 2 D t s true that f p, s 1 ρ s 1 and p, s 2 ρ s 2 then s 1 D and s 2 D hold too. In ths case we say that D s an approprate fnal publc vew correspondng to the program p and the ntal publc vew D. The montored executon p, n, (s, D) γ (s, D ) computes a par (s, D ) based on (s, D), where D s an approprate fnal publc vew correspondng to p and D. We may consder the publc vew D as an ndstngushablty relaton between 1 There s an algebracally equvalent and smpler formulaton to ths defnton: Program p satsfes termnaton-nsenstve nonnterference relatve to D and D, f for all s D from p, s ρ s t follows that s D.

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

Section 5.4 Annuities, Present Value, and Amortization

Section 5.4 Annuities, Present Value, and Amortization Secton 5.4 Annutes, Present Value, and Amortzaton Present Value In Secton 5.2, we saw that the present value of A dollars at nterest rate per perod for n perods s the amount that must be deposted today

More information

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.

1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1. HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Some literature also use the term Process Control

Some literature also use the term Process Control A Formal Approach for Internal Controls Complance n Busness Processes Koumars Namr 1, Nenad Stojanovc 2 1 SAP Research Center CEC Karlsruhe, SAP AG, Vncenz-Preßntz-Str.1 76131 Karlsruhe, Germany Koumars.Namr@sap.com

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Joe Pimbley, unpublished, 2005. Yield Curve Calculations

Joe Pimbley, unpublished, 2005. Yield Curve Calculations Joe Pmbley, unpublshed, 005. Yeld Curve Calculatons Background: Everythng s dscount factors Yeld curve calculatons nclude valuaton of forward rate agreements (FRAs), swaps, nterest rate optons, and forward

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and

POLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

A Probabilistic Theory of Coherence

A Probabilistic Theory of Coherence A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want

More information

1. Measuring association using correlation and regression

1. Measuring association using correlation and regression How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

The University of Texas at Austin. Austin, Texas 78712. December 1987. Abstract. programs in which operations of dierent processes mayoverlap.

The University of Texas at Austin. Austin, Texas 78712. December 1987. Abstract. programs in which operations of dierent processes mayoverlap. Atomc Semantcs of Nonatomc Programs James H. Anderson Mohamed G. Gouda Department of Computer Scences The Unversty of Texas at Austn Austn, Texas 78712 December 1987 Abstract We argue that t s possble,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Strategy Machines. Representation and Complexity of Strategies in Infinite Games

Strategy Machines. Representation and Complexity of Strategies in Infinite Games Strategy Machnes Representaton and Complexty of Strateges n Infnte Games Von der Fakultät für Mathematk, Informatk und Naturwssenschaften der RWTH Aachen Unversty zur Erlangung des akademschen Grades enes

More information

Real-Time Process Scheduling

Real-Time Process Scheduling Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Software project management with GAs

Software project management with GAs Informaton Scences 177 (27) 238 241 www.elsever.com/locate/ns Software project management wth GAs Enrque Alba *, J. Francsco Chcano Unversty of Málaga, Grupo GISUM, Departamento de Lenguajes y Cencas de

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Lecture 3: Force of Interest, Real Interest Rate, Annuity

Lecture 3: Force of Interest, Real Interest Rate, Annuity Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and

More information

CHAPTER 14 MORE ABOUT REGRESSION

CHAPTER 14 MORE ABOUT REGRESSION CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Simple Interest Loans (Section 5.1) :

Simple Interest Loans (Section 5.1) : Chapter 5 Fnance The frst part of ths revew wll explan the dfferent nterest and nvestment equatons you learned n secton 5.1 through 5.4 of your textbook and go through several examples. The second part

More information

Towards Specialization of the Contract-Aware Software Development Process

Towards Specialization of the Contract-Aware Software Development Process Towards Specalzaton of the Contract-Aware Software Development Process Anna Derezńska, Przemysław Ołtarzewsk Insttute of Computer Scence, Warsaw Unversty of Technology, Nowowejska 5/9, 00-665 Warsaw, Poland

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers

Multiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )

Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA ) February 17, 2011 Andrew J. Hatnay ahatnay@kmlaw.ca Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs

More information

A Simple Approach to Clustering in Excel

A Simple Approach to Clustering in Excel A Smple Approach to Clusterng n Excel Aravnd H Center for Computatonal Engneerng and Networng Amrta Vshwa Vdyapeetham, Combatore, Inda C Rajgopal Center for Computatonal Engneerng and Networng Amrta Vshwa

More information

Period and Deadline Selection for Schedulability in Real-Time Systems

Period and Deadline Selection for Schedulability in Real-Time Systems Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Using Series to Analyze Financial Situations: Present Value

Using Series to Analyze Financial Situations: Present Value 2.8 Usng Seres to Analyze Fnancal Stuatons: Present Value In the prevous secton, you learned how to calculate the amount, or future value, of an ordnary smple annuty. The amount s the sum of the accumulated

More information

where the coordinates are related to those in the old frame as follows.

where the coordinates are related to those in the old frame as follows. Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

Complete Fairness in Secure Two-Party Computation

Complete Fairness in Secure Two-Party Computation Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

Ring structure of splines on triangulations

Ring structure of splines on triangulations www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall

Staff Paper. Farm Savings Accounts: Examining Income Variability, Eligibility, and Benefits. Brent Gloy, Eddy LaDue, and Charles Cuykendall SP 2005-02 August 2005 Staff Paper Department of Appled Economcs and Management Cornell Unversty, Ithaca, New York 14853-7801 USA Farm Savngs Accounts: Examnng Income Varablty, Elgblty, and Benefts Brent

More information

LIFETIME INCOME OPTIONS

LIFETIME INCOME OPTIONS LIFETIME INCOME OPTIONS May 2011 by: Marca S. Wagner, Esq. The Wagner Law Group A Professonal Corporaton 99 Summer Street, 13 th Floor Boston, MA 02110 Tel: (617) 357-5200 Fax: (617) 357-5250 www.ersa-lawyers.com

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Latent Class Regression. Statistics for Psychosocial Research II: Structural Models December 4 and 6, 2006

Latent Class Regression. Statistics for Psychosocial Research II: Structural Models December 4 and 6, 2006 Latent Class Regresson Statstcs for Psychosocal Research II: Structural Models December 4 and 6, 2006 Latent Class Regresson (LCR) What s t and when do we use t? Recall the standard latent class model

More information

From Selective to Full Security: Semi-Generic Transformations in the Standard Model

From Selective to Full Security: Semi-Generic Transformations in the Standard Model An extended abstract of ths work appears n the proceedngs of PKC 2012 From Selectve to Full Securty: Sem-Generc Transformatons n the Standard Model Mchel Abdalla 1 Daro Fore 2 Vadm Lyubashevsky 1 1 Département

More information

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S

How To Know The Components Of Mean Squared Error Of Herarchcal Estmator S S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information