How to Maximize User Satisfaction Degree in Multi-service IP Networks

Size: px
Start display at page:

Download "How to Maximize User Satisfaction Degree in Multi-service IP Networks"

Transcription

1 How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA and Abtract Bandwidth allocation i a fundamental problem in communication network. With current network moving toward the Future Internet model, the problem i further intenified a network traffic demanding far from exceed network bandwidth capability. Maintaining a certain uer atifaction degree therefore become a challenge reearch topic. In thi paper, we deal with the problem by propoing BASMIN, a novel bandwidth allocation cheme that aim to maximize network uer happine. We alo defined a new metric for evaluating network uer atifaction degree: network worth. A three-tep evaluation proce i then conducted to compare BASMIN efficiency with other three popular bandwidth allocation cheme. Throughout the tet, we experienced BASMIN advantage over the other; we even found out that one of the mot widely ued bandwidth allocation cheme, in fact, i not effective at all. Keyword: Bandwidth allocation, network management, utility function, uer happine, network worth. I. INTRODUCTION One fundamental problem in the Internet deign i the allocation and management of network reource. When network reource are limited and traffic load become heavier, uing exiting reource efficiently to enure a certain level of QoS (Quality of Service) become a very important iue. Bandwidth wa long conidered the mot important network reource, and the final goal of reource management i to atify the end uer a bet a we can. Thu drive an intereting reearch topic: How to effectively allocate network bandwidth to maximize network uer atifaction degree? To anwer the quetion above, we will firt try to formulate end-uer happine (or atifaction degree). Each uer of an Internet application derive a certain utility from the network performance. End-uer of the Internet are uually not intereted in how much bandwidth that i available for them, but rather what can they obtain from that amount of bandwidth. It i the main metric that indicate how atified will end-uer be with the network performance. The degree of uer atifaction therefore can be tranlated into ome QoS level by uing a utility function. Shenker wa the firt to define the hape of utility function curve for both elatic and real-time traffic flow in [0]. Thee function relate the allocated bandwidth to end-uer atifaction, rating that atifaction on a 0 to cale. According to Shenker, there are only three type of application on the Internet with three pre-defined utility function. However, thi fact doe not hold in a multi-cla network like the Internet. The utility of a ervice i flexible according to uer ubective perception, and to the requirement of application. Beide, we believe that it i eential to take into account the priority level of different kind of application. It i even poible to define a different utility function to each uer of each Internet application. The precie olution to maximize network utility therefore yield an NP-hard problem [3] and attract the networking reearch community in year. A the Internet evolve from a ingle-ervice data network into the multi-ervice intelligent network in early year of the 2t century, the topic of bandwidth allocation tand out to be one of the mot dynamic reearch topic at thi time, and receive numerou attention from the academic community [3, 6 8]. In 200, Rakocevic [3] propoed the Dynamic Bandwidth Allocation cheme in IP network and Kouik Kar et al. [8] propoed a imple rate control algorithm for maximizing total network uer utility. Due to complexity of the problem, both author eek to a imple olution by uing a heuritic algorithm. However, the reult i not quite atifactory ince they can not be applied to a real network environment yet. Recently, the Internet i moving toward the next generation network model. It i more deeply integrated in our phyical environment with the proliferation of high-peed connection and ubiquitou network. In 2005 and 2006, Zheng Wu in [4] propoed another heuritic approach to maximize uer atifaction degree on multiple MPLS path. Later on, Ning Lu extended the topic to wirele network [], uing claic utility function on IP network to olve the problem of QoS in wirele network. All the above work are evaluated uing NS2 with a imple network model, and the reult are praieworthy. In thi reearch, we try to approach the optimal olution to maximize network uer happine by propoing a new Bandwidth Allocation Scheme for Multi-ervice IP Network (BASMIN). For the ret of thi paper, we will briefly decribe the baic evaluation metric the utility function in Section 2. Section 3 will talk about our network model and problem formulation. Detail of BASMIN will be given in Section 4. Section 5 will preent our recorded imulation reult for the firt evaluation phae. And finally, concluion will be given in Section 6.

2 II. (a) Elatic traffic Figure. UTILITY-BASED ADAPTIVE QOS Utility wa originally ued in economic and ha been brought to networking reearch by Shenker in [0]. It repreent the level of atifaction of a uer or the performance of an application. A utility function here i a curve mapping bandwidth received by application to their performance a perceived by the uer. It i monotonically non-decreaing. In other word, more bandwidth allocated hould not lead to degraded application performance. The key advantage of the utility function i that it can inherently reflect a uer QoS requirement and quantify the adaptability of an application. The hape of utility function varie according to the application characteritic. We aume in thi reearch that any traffic offered to the network belong to three categorie: Elatic application, Hard Real-Time application and Real-Time application. The utility function preented here i a lightly modified verion of Shenker work. A. Elatic application Traditional data application life file tranfer, , remote login and peer-to-peer are rather tolerant of delay. On an intuitive level, they would appear to have decreaing marginal improvement along with incremental increae in bandwidth. Total U will alway be maximized when no uer are denied acce, therefore admiion control ha no role here. For thi type of application, there i no minimum required bandwidth ince it can tolerate relatively large delay. Elatic traffic utility i modeled uing the following function: kb bmax e U () b () e (c) RT traffic (b) HRT traffic Network traffic utility function. where k i a tunable parameter which determine the hape of utility function and enure that when maximum requeted bandwidth i received, U. But a depicted in Fig. (a), uer atifaction of thi application can hardly reach even when provided with a very high bandwidth. Therefore, we believe that bandwidth allocated to thi application type hould never urpa b max, even in the cae that exceive network bandwidth i available. B. Hard-Real Time application Hard Real-Time (HRT) application are the mot delay enitive one. Thee application need their data to arrive within a given delay bound, require trict end-to-end performance guarantee and do not how any adaptive propertie. A network flow belong to thi application type will not be allowed to enter the network if minimum bandwidth requirement cannot be met; and once accepted, allocated bandwidth will be fixed during lifetime of network eion. More bandwidth allocation hould not lead to performance enhancement while any bandwidth degradation will caue QoS (utility) drop to zero. Example include audio/video phone, video conference and telemedicine. Utility function ued for modeling HRT traffic i: kb bmax e U () b (2) e where b max i the bandwidth required. The general hape of HRT traffic utility i depicted in Fig. (b). C. Real-Time application Real-time (RT) application refer to multimedia application that can adapt to variou network load. In cae of congetion, they can gracefully adut their tranmiion rate uch that the QoS i till acceptable. However, thi type of traffic require network to provide a minimum level of performance guarantee. If allocated bandwidth i reduced below ome threhold, QoS will then become unacceptable. Typical example are interactive multimedia ervice, video on demand and online game. The following utility function i ued to model RT traffic: 2 kb k2 b U () b e (3) rt where k and k 2 are tunable parameter which determine hape of the utility function. It can be oberved from Fig. (c) that marginal utility of additional bandwidth i very light at both high and low bandwidth. Utility i convex at low bandwidth value and tart becoming concave after b min a depicted in Fig. (c). III. A. Network Worth PROBLEM FORMULATION Let u define a new metric: the worth of atified network requet (Network Worth) W k = 2 (i) U k (4) where i i the network priority level. Weight of network requet 2 (i) indicate relative importance of that requet comparing to the other. In thi reearch, it i aumed that there are four priority level, where level i i more important than, for i > ; 4 i,. The priority cheme here i

3 baed on the weighting contant cheme that wa ued in [4]. The goal of thi reearch now i to maximize W. B. Problem tatement Conider a network coniting of a et L of unidirectional link, where a link l L ha capacity c l. The network i hared by a et S of unicat eion ( uer) we aume here all end-uer requet are unicat. Let L L denote the et of link ued by eion S. Alo let S l S denote the et of eion that ue link l L. Each eion ha a minimum required tranmiion rate b min 0, and a maximum required tranmiion rate b max <. For HRT application, we only care for b max, their b min i actually b max. For RT application, both b max and b min have to be defined. A RT flow i only accepted to the network with it allocation lie within [b min, b max ]. For elatic application, their b min by default i 0, therefore only the upper boundary b max hould be defined. Each eion ha a pre-defined utility function U :. Utility function here will be one of the three function defined in Section 2. One thing to notice i that even though two application belong to a ame category (e.g.: elatic application), their utility function are not necearily the ame (becaue of different defined parameter). We define the bandwidth range B = [b min, b max ]. Thu eion ha a utility U (b ) when it i tranmitting at the rate b, where b B. Our obective i to maximize the um of uer atifaction degree (utilitie) over all the eion. The problem can be poed a: max() U b (5) S But a we mentioned before, it will not be fair to treat all requet at the ame weight; therefore we will not try to maximize total network utility, but total worth of network atified requet. Bae on (4) and alo conider the link capacity contraint, we can rewrite the problem a: Subect to max() W b (6) S b cl l L Sl IV. (7) b B S (8) BASMIN Baed on network utility function and problem tatement above, we propoe BASMIN (Bandwidth Allocation Scheme for Multi-ervice IP Network), a bandwidth allocation cheme that aim to the goal of maximizing total worth of all network requet. BASMIN conit of two component: the dynamic bandwidth allocation procedure and the load balancing algorithm. A. Dynamic bandwidth allocation procedure The purpoe of thi component i to accept/reect a pecific network requet and allocate the appropriate network bandwidth once a network requet i accepted. The network edge router maintain one table which record information of all application of all type including the traffic type, conumed bandwidth, it time in the network, it path, it priority level ( i) and it utility function (maximum and minimum bandwidth requeted b max, b min, parameter k, k and k 2 ). When a new connection requet come, the edge router firt claifie thi requet into one of the three predefined categorie: HRT/RT/Elatic tranmiion. Denote the capacity for path p a C p, the bandwidth conumed by all application on path p a R p. The available bandwidth on path p i defined a A p = C p R p. Our heuritic for bandwidth allocation conit of three tep: Step. Admiion control. Thi tep erve a the firt barrier of the network. Admiion control proce will run at network edge router. The miion here i to quickly make a deciion to whether accept/reect a pecific network requet without any afterward information about the network requet. Thi tep i only applied to HRT and RT traffic ince they require a minimum amount of network bandwidth to achieve an acceptable performance. There i no guarantee QoS for elatic traffic, therefore we may bypa their admiion control but thi doe not neceary mean that we accept any elatic requet into the network, they till poibly be reected at Step 2 of thi proce. When a new network connection requet arrive, the new edge router check if there exit a path p with A b. Ye new flow i accepted, go to Step 2. No aume that all exiting application whoe w i new maller that w are preempted and all remaining RT/HRT application take their minimal amount of bandwidth b min, all elatic application take b =, where i the increment ize; then check if there exit a path p again. o Ye new flow i accepted, go to Step 2. o No new flow i reected, procedure terminated. Step 2. Path election. Thi tep i only a calculation tep. We do not really do the bandwidth allocation at thi tep; however, information calculated here i eential for the later tep. Miion aigned to thi tep i to find the bet path to accommodate the new flow, in the cae there are many available path. For each path that can accommodate the new flow, execute the following conequently: Allocate the new flow with the bandwidth amount b min if it i RT, if it i HRT or elatic. p min

4 If there i till available bandwidth, reaccept/increae bandwidth of preempted/degraded flow in the lat tep according to the decreaing order of their worth increment tep: W = 2 (i) U (b) where U (b) i derivative of the utility function at bandwidth b. The proce will be repeated until there i no more bandwidth or all flow reached their b max. Apply the load balancing algorithm (will be dicued later in Section 4.2.) and calculate total worth on each link. Compare the new and old value of total network requet worth for each path W and find the path p with max p network worth increment W then go to Step 3. p Step 3. Bandwidth allocation. Thi i an execution tep baed on reult calculated from Step 2. We will put the new flow into path p and allocate bandwidth among all flow on thi path accordingly to the load balancing algorithm. B. Load Balancing Algorithm Given a path p, all current network traffic flow on p and a new network requet, the goal here i to relocate bandwidth among all traffic flow to maximize the total network worth on thi path. The algorithm contain four tep:. For each flow on path p, allocate it the amount b of min bandwidth, i.e. let b. Calculate R p and A p, if A p = x min 0 or all procee already reach their maximum bandwidth ( x b, max ) the proce i terminated. Otherwie, go to next tep. () i 2. Calculate the potential worth increment w 2 u '() x for each. Find with the larget w. If there i more than one, chooe any one. 3. For flow choen from previou tep, increae it bandwidth by an increment ize, if A p > then go to next tep. If A p, increae the bandwidth of flow by A p. 4. Update A p = A p, return to Step. bmin N/A 2 N/A 3 Mbp 4 N/A 5 N/A 6 N/A TABLE I. bmax 30 Kbp 256 Kbp 4 Mbp 20 Kbp 52 Kbp 5 Mbp TRAFFIC PROFILES IN OUR SIMULATION Data Volume Kbyte 0 00 Utility Func., b , b 0.03, b , b b 2.66 e b network ytem due to it implicity. There i no admiion control or reource reervation here. All traffic flow are accepted to the network and receive a equal hare of the network capacity. However in our experiment, we will improve bet effort a little bit by limiting bandwidth allocated to a flow ( b max ). Thu we improved the cheme effectivene by never over-aigning network bandwidth to a traffic requet. Complete partitioning: Thi i alo a widely ued bandwidth allocation cheme in mid-ize network becaue of it implicity. Bandwidth portion for each application type are arbitrary fixed by network adminitrator. There i no admiion control for incoming network traffic flow, all flow within a ame cla will be allocated the ame equal amount of bandwidth. In thi experiment, we fix the line portion a 0% for HRT, 40% for RT and 50% for elatic traffic. Trunk reervation: Thi cheme wa originally propoed by Ren P. Liu [2]. Admiion control i applied for all traffic clae. An incoming elatic flow i accepted into the network only if the utility level for RT traffic flow at that moment i greater than or equal to ome pre-defined i e e e 4.6b b b 0 4 Example Voice ervice & Audio phone Video-phone & Video conf. Interac. Multimedia & VoD , Paging & Fax Remote Login & Data on Demand File Tranfer & Retrieval Service * N/A = not available / no need to be defined V. IMPLEMENTATION AND EVALUATON In order to evaluate the efficiency of BASMIN, we would like to conduct the experiment of comparing BASMIN with other bandwidth allocation cheme. For thi pecific purpoe in mind, we built a imulator uing Java. Simulation i carried out on the level of flow, with network flow from all traffic clae arie a a Poion proce, and have the duration/ize exponentially ditributed. The traffic i differentiated into the three maor clae with ix repreentative application profile a decribed in Table. BASMIN i implemented along with other three bandwidth allocation cheme for performance comparion purpoe: Bet effort (complete haring): Being the implet cheme; yet Bet effort i very popular and widely ued in many mall Figure 2. Network Simulator in action

5 parameter : If [U rt (b rt (t)) ] then accept the incoming elatic flow, ele reect it; where b i (t) i the bandwidth allocated the traffic flow belonging to traffic cla i at the moment t of the incoming flow. To make a fair comparion between the four bandwidth allocation cheme, we firt conduct an experiment on Total network worth v. Network bandwidth (Fig. 2). Having the ame traffic flow a decribe in Table, we try increae the total bandwidth of network line, thu expecting increment in total network worth. Our propoed cheme BASMIN eaily overthrow Bet effort and Complete partitioning and have a light performance advantage over Trunk reervation a the total network bandwidth increae. The reult trongly proved that our Load balancing algorithm work well in trying to find the bet cenario to allocate network bandwidth and maximizing network uer happine. Fig. 3 i the econd tet for BASMIN, thi time we focu on Average connection worth within a fixed total ytem bandwidth C p = 2 Mbp and an incremented traffic arrival rate. Average connection worth i calculated a: Figure 3. Figure 4. A T dur W [()] b t dt w 0 Tdur Network bandwidth v. Network worth Traffic rate v. Avg. connection worth (9) Figure 5. Traffic arrival rate v. Link utilization level where T dur i the duration of the network eion. Obviouly, A w reflect atifaction degree of each uer in the network, not the total network atifaction degree. It i noteworthy to keep in mind that our algorithm goal i to maximize total network worth W () b, not A w. However, S in the Average connection worth tet, BASMIN till be able to achieve a uperior reult comparing to Bet effort and Complete partitioning. The very nature of Trunk reervation i to accept network connection only if thi connection can bring the network a certain amount of atifaction; therefore it i expectable that they put up the bet reult in thi tet. Thi reult can be explained by the different policie ued BASMIN and Trunk reervation: BASMIN trie to pleae all the uer of the network, while Trunk reervation trie to pleae each uer of the network. Main target for the final tet would be checking link utilization level of each cheme. Mean link utilization i defined a the mean amount of bandwidth being ued on the network. Thi metric will how which cheme i able to ue more of the available bandwidth pace. In fact, it will be pointle to udge the efficiency of a cheme in atifying end uer by looking at their link utilization level. However, thi metric i one of the conventional metric that i widely ued in evaluating network reource allocation policie that why we think it i a good experiment to be conducted. Bet effort with no traffic admiion control mechanim i expected to yield the highet link utilization level amongt the four and the reult in Fig. 4 i quite traightforward. It i alo intereting to look at the performance of Complete partitioning; it ha the wort performance ince the cheme wa unable to adapt to the dynamic network tate. We got a little urprie by the fact that Trunk reervation hold a better performance over BASMIN. In fact, Trunk reervation doe not put any limitation on elatic bandwidth. Including the fact that elatic traffic i dominant in our network traffic profile (3 over 6 traffic profile Table ), Trunk reervation therefore cannot yield the better atifaction degree but have a higher link utilization level comparing to BASMIN.

6 Throughout the three tet, we are very diappointed with reult of Complete partitioning. Complete partitioning i widely ued in many mid-ize network uch a companie, chool, laboratorie with a ingle adminitrator network model. An adminitrator will arbitrary aign a fixed portion of network bandwidth for each application profile and network application will hare an equally amount of network bandwidth a long a they have a ame profile. However, a experimented in thi reearch, thi bandwidth allocation cheme turned out to be not a good idea at all, epecially in the cae of dynamic future network. VI. CONCLUSION The main contribution of thi reearch i BASMIN, a bandwidth allocation cheme that aim to maximize overall network uer happine. In order to experiment the new method efficiency, we alo built a network imulator and compare BASMIN with other three cheme. Throughout the three conducted experiment tet, BASMIN howed olid performance in maximizing uer atifaction degree. Alo note that we defined a new metric (network worth) to meaure uer happine intead of uing the traditional metric (network utility) a other reearche. The evaluation proce alo expoed weakne of one of the mot current widely ued bandwidth allocation cheme. Baed on praieworthy reult o far, we are now thinking about expanding BASMIN with a traffic rerouting mechanim to clean up network traffic and leave more room for incoming network requet. BASMIN and the new traffic rerouting mechanim will then be evaluated in an MPLS network environment. Promiing reult are being achieved and they will be publihed in a near future. ACKNOWLEDGMENT Thi reearch i the output of the Reearch on the Optimal Network Bandwidth Allocation Method for Each Service Cla. The author would like to end pecial gratitude to KREN of MEST for their ponorhip and technical upport during the reearch proce. Beide, many of our lab-mate and anonymou reviewer contributed in thi reearch in different way, we would like to thank them all for their aitance and comment. REFERENCES [] Ning Lu and John Bigham, An optimal bandwidth adaptation algorithm for multi-cla traffic in wirele network, Proc. of 3rd ACM International Conference on QoS in Heterogeneou Wired/Wirele Network, [2] Ning Lu and John Bigham, Utility-maximization bandwidth adaptation for multi-cla traffic QoS proviioning in wirele network, Proc. of ACM Q2SWinet 05, Montreal, Quebec, Canada, Oct [3] Saad Biaz, Technique for dynamic and prioritized bandwidth allocation on incoming link, Technical Report # CSSE02-0, Auburn Univerity, Mar [4] Zheng Wu and Qinghe Yin, A heuritic for bandwidth allocation and management to maximize uer atifaction degree on multiple MPLS path, Proc. of 3rd IEEE Conumer Communication and Networking Conference, [5] Sourav Pal, Mainak Chatteree and Saal K. Da, A two-level reource management cheme in wirele network baed on ueratifaction, Mobile Computing and Communication Review, Vol. 9, No. 4, [6] Daniel A. Menaéc, Rodrigo Foneca, Virgilio A. F. Almeida and Marco A. Mende, Reource management policie for e-commerce erver, ACM SIGMETRICS Performance Evaluation Review, Vol. 27, No. 4, Mar [7] Pranav Dharwadkar, Howard Jay Siegel and Edwin K. P. Chong, A heuritic for Dynamic Bandwidth Allocation with Preemption and Degradation for Prioritized Requet, Proc. of ACM 2t International Conference on Ditributed Computing Sytem, 200. [8] Kouhik Kar, Sawati Sarkar and Leandro Taiula, A imple rate control algorithm for maximizing total uer utility, Proc. of IEEE INFOCOM 200. [9] Vladica Stanic and Michael Devetikioti, Dynamic utility-baed bandwidth allocation policie: the cae of overloaded network, Proc. of IEEE International Conference on Communication, June [0] Scott Shenker, Fundamental Deign Iue for the Future Internet, IEEE Journal on Selected Area in Communication, Vol. 3, No. 7, Sep. 995 [] S. Kehav, An Engineering Approach to Computer Networking: ATM Network, the Internet, and the Telephone Network. Addion- Weley 997. [2] Ren P. Liu and Peter J. Moylan, Dynamic trunk reervation for teletraffic link, IEEE Global Telecommunication Conference GLOBECOM 95, Nov [3] Vaelin Rakocevic, Dynamic Bandwidth Allocation in Multi-cla IP Network uing Utility Function, PhD. Thei, Univerity of London, 200. [4] M. D. They, N. B. Beck, H. J. Siegel and M. Jurczyk, Evaluation of expanded heuritic in a heterogeneou ditributed data taging network, Proc. of The 9th Heterogeneou Computing Workhop (HCW 2000), May 2000, pp [5] Calin Curecu and S. Nadm-Tehrani, Time-aware utility-baed QoS optimization, Proc. of The 5 th Euromicro Conference on Real-Time Sytem [6] Shafigh, A.R.S., Noroozi, F. and Khodabandeh, Z.A.H.R., Dynamic bandwidth allocation with minimum long fluctuation, Proc. of IEEE 8 th International Conference on Advanced Communication Technology, [7] Cheng-Shang Chang and Zhen Liu, A bandwidth haring theory for a large number of HTTP-like connection, IEEE/ACM Tranaction on Networking, Vol. 2, No. 5, Oct [8] Yeungmoon Kwon and Byoungchul Ahn. A dynamic CPU bandwidth partitioning cheme for multimedia real-time ytem, Proc. of IEEE PACRIM, [9] Tobia Hark and Tobia Pochwatta, Utility fair congetion control for real-time traffic, Proc. of IEEE INFOCOM [20] Jang-Won Lee, Ravi R. Mazumdar and Ne B. Shroff, Non-convex optimization and rate control for multi-cla ervice in the Internet, IEEE/ACM Tranaction of Networking, Vol. 3, No. 4, Aug [2] Changhee Joo and Saewoong Bahk, Weighted fair bandwidth allocation and active queue management for adaptive flow, Proc. of The IEEE 9th International Conference on Communication Sytem. [22] S. Jha and M. Haan, Java implementation of policy-baed bandwidth management, International Journal of Network Management, [23] Yonghe Yan, Adel El-Atawy and Ehab Al-Shaer, Fair Bandwidth Allocation under Uer Capacity Contraint, Proc. of IEEE/IFIP 0th Network Operation and Management Sympoium, [24] Deng Pan and Yuanyuan Yang, Max-min fair bandwidth allocation algorithm for packet witche, Proc. of IEEE IPDPS 2007.

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME

TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME TIME SERIES ANALYSIS AND TRENDS BY USING SPSS PROGRAMME RADMILA KOCURKOVÁ Sileian Univerity in Opava School of Buine Adminitration in Karviná Department of Mathematical Method in Economic Czech Republic

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE

SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE SELF-MANAGING PERFORMANCE IN APPLICATION SERVERS MODELLING AND DATA ARCHITECTURE RAVI KUMAR G 1, C.MUTHUSAMY 2 & A.VINAYA BABU 3 1 HP Bangalore, Reearch Scholar JNTUH, Hyderabad, India, 2 Yahoo, Bangalore,

More information

2. METHOD DATA COLLECTION

2. METHOD DATA COLLECTION Key to learning in pecific ubject area of engineering education an example from electrical engineering Anna-Karin Cartenen,, and Jonte Bernhard, School of Engineering, Jönköping Univerity, S- Jönköping,

More information

Morningstar Fixed Income Style Box TM Methodology

Morningstar Fixed Income Style Box TM Methodology Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

A Duality Model of TCP and Queue Management Algorithms

A Duality Model of TCP and Queue Management Algorithms A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Mobility Improves Coverage of Sensor Networks

Mobility Improves Coverage of Sensor Networks Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service johann.poechl@iemen.com www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

Multi-Objective Optimization for Sponsored Search

Multi-Objective Optimization for Sponsored Search Multi-Objective Optimization for Sponored Search Yilei Wang 1,*, Bingzheng Wei 2, Jun Yan 2, Zheng Chen 2, Qiao Du 2,3 1 Yuanpei College Peking Univerity Beijing, China, 100871 (+86)15120078719 wangyileipku@gmail.com

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS

Chapter 10 Stocks and Their Valuation ANSWERS TO END-OF-CHAPTER QUESTIONS Chapter Stoc and Their Valuation ANSWERS TO EN-OF-CHAPTER QUESTIONS - a. A proxy i a document giving one peron the authority to act for another, typically the power to vote hare of common toc. If earning

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units

Despeckling Synthetic Aperture Radar Images with Cloud Computing using Graphics Processing Units Depeckling Synthetic Aperture Radar Image with Cloud Computing uing Graphic Proceing Unit Matej Keneman 1, Dušan Gleich, Amor Chowdhury 1 1 Margento R & D d.o.o., Gopovetka ceta 84, Maribor, Slovenia matej.keneman@gmail.com

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

Trusted Document Signing based on use of biometric (Face) keys

Trusted Document Signing based on use of biometric (Face) keys Truted Document Signing baed on ue of biometric (Face) Ahmed B. Elmadani Department of Computer Science Faculty of Science Sebha Univerity Sebha Libya www.ebhau.edu.ly elmadan@yahoo.com ABSTRACT An online

More information

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds

Growing Self-Organizing Maps for Surface Reconstruction from Unstructured Point Clouds Growing Self-Organizing Map for Surface Recontruction from Untructured Point Cloud Renata L. M. E. do Rêgo, Aluizio F. R. Araújo, and Fernando B.de Lima Neto Abtract Thi work introduce a new method for

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

Achieving Quality Through Problem Solving and Process Improvement

Achieving Quality Through Problem Solving and Process Improvement Quality Aurance Methodology Refinement Serie Achieving Quality Through Problem Solving and Proce Improvement Second Edition By Lynne Miller Franco Jeanne Newman Gaël Murphy Elizabeth Mariani Quality Aurance

More information

Proceedings of Power Tech 2007, July 1-5, Lausanne

Proceedings of Power Tech 2007, July 1-5, Lausanne Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006

Imagery Portal Workshop #2 Department of Administrative Services, Executive Building Salem, Oregon May 11, 2006 ry Portal Workhop #2 Department of Adminitrative Service, Executive Building Salem, Oregon May 11, 2006 Workhop Purpoe: dicu the outcome of the phae 1 coping proce for development of an imagery portal

More information

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware

Optimizing a Semantic Comparator using CUDA-enabled Graphics Hardware Optimizing a Semantic Comparator uing CUDA-enabled Graphic Hardware Aalap Tripathy Suneil Mohan, Rabi Mahapatra Embedded Sytem and Codeign Lab codeign.ce.tamu.edu (Preented at ICSC 0, September 9, 0 in

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,

More information