Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation
|
|
|
- Linette Miles
- 10 years ago
- Views:
Transcription
1 2009 Sixth IFIP Iteratioal Coferece o Network ad Parallel Computi Modeli the Propaatio Process of Topoloy-Aware Worms A Iovative Loic Matrix Formulatio Xia Fa School of Maaemet ad Iformatio Systems Cetral Queeslad Uiversity, Australia [email protected] Ya Xia School of Maaemet ad Iformatio Systems Ceter for Itelliet ad Networked Systems Cetral Queeslad Uiversity, Australia [email protected] Abstract This paper presets a study o modeli the propaatio process of topoloy-aware worms. Topoloy-aware worms are more itelliet ad adaptive to etwork topoloies tha other worms, thus are more difficult to cotrol. Due to the complexity of the problem, o existi work has solved the problem of modeli the propaatio of topoloy-aware worms. Our major cotributios i this paper are firstly, we propose a iovative loic matrix formulatio of the propaatio process of topoloy-aware worms; ad secodly, we fid, from the applicatios of the formulatio i our experimets, the impacts of two differet topoloies, amely the simple radom raph topoloy ad the pseudo power law topoloy, o a P2P worm s mea coverae rate i the P2P overlay etwork. The proposed iovative loic matrix formulatio, which is a discrete time determiistic propaatio model of topoloy-aware worms, ca traslate the propaatio process of topoloy-aware worms ito a sequece of loic matrix operatios. Its effectiveess ad efficiecy are demostrated by its applicatios i our experimets. 1. Itroductio Worms ca be classified accordi to the techiques by which they discover ew tarets to ifect. Scai, which etails probi a set of addresses to idetify vulerable hosts [1], is the most widely employed techique by worms. Scai could be implemeted differetly, which leads to several differet types such as radom scai, localized scai [2], sequetial scai [3], routable scai [4], selective scai [4], importace scai [5, 6], ad topoloical scai, which was employed by the Morris Iteret Worm of 1988 as its taret discovery techique [7]. Worms employi all other types of scai except topoloical scai amo the above types do ot eed to have ay kowlede o topoloy of the etwork they ited to propaate across. O the other had, worms employi topoloical scai must have the more or the less iformatio o the etwork they ited to propaate over, or have the capability to discover that iformatio if they do ot have it i advace. Therefore, worms employi topoloical scai are also called topoloy-aware worms. A typical example of topoloy-aware worms is a worm attacki a flaw i a Peer-to-Peer (P2P) applicatio ad propaati across the P2P etwork by etti lists of peers from its victims ad directi its subsequet attacks to those peers. This sort of topoloy-aware worm is called P2P worm. The Slapper worm [8] of 2003 was a typical example of P2P worms. The subsequet appearace of variatios of the Slapper worm (the Slapper.B worm a.k.a. Ciik ad the Slapper.C worm a.k.a. Ulock) idicates that exploit code, viruses ad worms are becomi icreasily complex ad sophisticated [8]. They are posi a serious challee to etwork security. Due to the recet popularity of P2P systems with icreasi umber of users, P2P systems ca be a potetial vehicle for worms to achieve faster propaatio across the Iteret. Worm propaatio o top of P2P systems could result i siificat damaes as illustrated by [9]. I order to fid a effective ad efficiet coutermeasure aaist the propaatio of topoloyaware worms i eeral, ad P2P worms i particular, we must fully uderstad their propaatio process. I this paper, we propose a iovative loic matrix formulatio of the propaatio process of topoloy /09 $25.00 $ IEEE DOI /NPC
2 aware worms, which ca be used to describe the propaatio process of this type of worms. 2. Related work Mathematical models developed to model propaatio of ifectious diseases have bee adapted to model propaatio of worms [10]. I epidemioloy area, both determiistic ad stochastic models exist for modeli the spreadi of ifectious diseases [11-14]. I etwork security area, both determiistic ad stochastic models of worms based o their respective couterpart i epidemioloy area have emered. Determiistic models of worms could be further divided ito two cateories cotiuous time ad discrete time. Stochastic models of active worms are based o the theory of stochastic processes. All of them are discrete time i ature. I the classical simple epidemic model [11-14], all hosts stay i oe of the oly two states at ay time susceptible (deoted by S ) or ifectious (deoted by I ), ad thus it is also called the SI model. Staiford et al. preseted a propaatio model for the Code-RedI v2 worm [15], which is essetially the above classical simple epidemic model. The classical eeral epidemic model (Kermack-McKedrick model) [11-14] improves the classical simple epidemic model by cosideri removal of ifectious hosts due to patchi. The two-factor worm model [10] exteds the classical eeral epidemic model by accouti for removal of susceptible hosts due to patchi ad cosideri the pairwise rate of ifectio as a variable rather tha a costat. The discrete time determiistic Aalytical Active Worm Propaatio (AAWP) model [16] takes ito accout the time a ifectious host takes to ifect other hosts, which is a importat factor for the spread of active worms [17]. Sice propaatio of active worms is a discrete evet process, this model of active worms is more accurate tha its cotiuous time couterparts i the determiistic reime. Rohloff ad Basar preseted a stochastic desitydepedet Markov jump process propaatio model [18] for worms employi the radom scai approach draw from the field of epidemioloy [12, 19]. Sellke et al. preseted a stochastic Galto-Watso Markov brachi process model [20] to characterize the propaatio of worms employi the radom scai approach. A more detailed survey o modeli the propaatio process of worms ca be foud i [21]. The formulatio proposed i this paper is a discrete time determiistic propaatio model of topoloyaware worms. 3. The proposed iovative formulatio At the beii of this sectio, we exted defiitio of a matrix to allow its elemets to be variables or costats of loic type; ad term such kid of matrices loic matrices. Several operatios of loic matrices are defied. The, topoloy ad state of a etwork are represeted by its topoloy loic matrix ad state loic matrix, respectively. Fially, a iovative loic matrix formulatio of the propaatio process of topoloy-aware worms is derived from first priciple Loic matrices ad their operatios We exted defiitio a matrix to allow variables or costats of loic type as its elemets. The value of a variable of loic type ca oly be oe of the oly two loic costats True (deoted by T ) or False (deoted by F ). Therefore, a loic matrix could be defied as a two-dimesioal array of elemets T ad F oly. If a loic matrix has oly oe row or oe colum, we ca also call it a loic row vector or loic colum vector, respectively. We defie deree of a variable l of loic type (deoted by de(l ) ) as 1 whe its value is T, ad 0 whe F ; ad defie deree of a loic matrix L (deoted by de(l ) ) as the total umber of its elemets whose value is T. Accordi to the above defiitios, deree of a loic matrix L could be worked out by summi deree of its each elemet l, that is, de( L ) = de( l). (1) Two loic matrices A ad B ca be added if ad oly if their dimesios are the same, that is, they all have the same umber of rows ad colums. The resultat S = A + B is a loic matrix of the same dimesio with its elemet s ij (lies i the i -th row ad the j -th colum) bei the results of loic OR of the correspodi elemets a ij ad b ij of the two loic matrices to be added. It ca be defied mathematically as follows s = ij a ij OR b ij. (2) It could be easily derived that deree of the resultat loic matrix S caot be less tha that of both loic matrices A ad B to be added; ad that deree of the resultat loic matrix caot be reater tha sum of deree of each loic matrix to be added, that is, de( ) de( ) de( ) de( ) ; (3) A S A + B 183
3 ad de( B ) de( S) de( A) + de( B). (4) A loic matrix A ca be multiplied by aother loic matrix B if ad oly if their ier dimesios are the same, that is, umber of colums of the multiplicad loic matrix (the left oe) is equal to umber of rows of the multiplier loic matrix (the riht oe). Mutatio law, which applies to loic matrix additio, does ot apply to loic matrix multiplicatio. The product = is a loic matrix of the same umber of P A B rows as A ad the same umber of colums as B. We defie value of elemet p (lies i the i -th row ad ij the j -th colum) of the product to be determied by the followi equatio p ij = a ik k = 1 AND b kj, (5) where AND stads for loic AND operatio, deotes ier dimesios of the multiplicad ad multiplier loic matrices, ad = k 1 represets loic OR operatio of all those resultats of loic AND operatios whe k from 1 to, iclusive. Now the stae for later discussio has bee set. I the ext two sub-sectios, we will itroduce the cocepts of a etwork s topoloy loic matrix ad state loic matrix, respectively; ad derive our iovative loic matrix formulatio of the propaatio process of topoloy-aware worms from first priciple Loic matrix represetatios Accordi to the traditioal raph theory, a computer etwork could be represeted by a directed raph G, with its set of vertices V represeti all computers coected to form the etwork, ad its set of directed edes E represeti all directed liks amo these computers. A directed lik from computer i to computer j meas computer i is able to sed messaes to computer j, but computer j is ot able to sed messaes to computer i. Topoloy of a computer etwork cosisti of computers could be represeted by a by square t (lies i the i -th row ad matrix with its elemet ij the j -th colum) idicati whether there is a directed lik from computer i to computer j. Uder the traditioal directed raph theory, the umeric costat 1 is used to idicate there is a directed lik, ad 0 to idicate there is ot. We, i this paper, propose a differet approach to idicati the existece or ot of a directed lik. The loic costat T is used to idicate there is a directed lik, ad F to idicate there is ot. Therefore, topoloy of a computer etwork cosisti of computers could be represeted by a by loic square matrix T. We term it topoloy loic matrix of the etwork. Each row of the topoloy loic matrix of a computer etwork forms a loic row vector, which is a loic vector represetatio of outboud lik(s) of a particular computer beloi to the etwork. We call this loic vector the computer s topoloy out-deree loic vector. Each colum of the topoloy loic matrix of a computer etwork forms a loic colum vector, which is a loic vector represetatio of iboud lik(s) of a particular computer beloi to the etwork. We call this loic vector the computer s topoloy i-deree loic vector. For example, the i -th row of a topoloy loic matrix represets outboud lik(s) of computer i, ad the j -th colum of a loic matrix represets iboud lik(s) of computer j. It ca be easily derived that values of topoloy ideree ad out-deree of each computer beloi to a etwork equate to derees of the computer s topoloy i-deree ad out-deree loic vector, respectively, which ca be worked out by usi equatio (1) ive i the previous sub-sectio. Next, we represet states of all computers beloi to a etwork by a loic matrix (row vector) S of dimesio 1 by with its elemet (lies i the S 1 j 1st row ad the j -th colum) idicati whether computer j has bee ifected by ay malware ad become ifectious. The loic costat T is used to idicate the computer has bee ifected ad become ifectious, ad F to idicate it has ot. We term the above loic matrix (vector) the etwork s state loic matrix (vector). It ca be easily derived that the total umber of ifected ad ifectious computers i a etwork equates to deree of the etwork s state loic matrix (vector), which ca be worked out by usi equatio (1) ive i the previous sub-sectio The loic matrix formulatio Based o the above extesios to matrices ad their operatios ad extesios to the matrix represetatio of a etwork i the traditioal directed raph theory, we are ow ready to derive our iovative loic matrix formulatio of the propaatio process of topoloyaware worms from first priciple. 184
4 The derivatio of our iovative loic matrix formulatio of the propaatio process of topoloyaware worms is based o the followi assumptios. A ifectious computer will sed worm packet(s) to all other computers beloi to the same etwork to which it has a outboud lik, reardless of the state (ifected ad ifectious or ot) of those computers. A healthy (ot ifected ad ot ifectious) computer beloi to a etwork will be ifected ad become ifectious oce it receives worm packet(s) from aother ifectious computer beloi to the same etwork. A ifected ad ifectious computer beloi to a etwork will remai i that state whe it receives worm packet(s) from aother ifectious computer beloi to the same etwork. The propaatio process from sedi worm packet(s), to receivi worm packet(s), to havi the recipiet ifected ad the ifected becomi ifectious will be completed i the time iterval TI of strictly the same leth. There are a total of computers beloi to a loical (ot physical) etwork uder cosideratio. Iitially, there are a total of I0 computers which are ifected ad ifectious. Accordi to the above assumptios, the loical etwork s iitial state could be represeted by its iitial S of dimesio 1 by ; ad state loic matrix (vector) 0 the total umber of iitially ifected ad ifectious computers I 0 equates to deree of S 0 I de(s0 ) 0 =. (6) Time itervalti later, the loical etwork s state could be represeted by its state loic matrix S of dimesio 1 by at that time; ad the (vector) 1 total umber of ifected ad ifectious computers I 1 at that time equates to deree of S 1 I 1 de(s ) 1 =. (7) I the same way, time iterval 2 TI later, the loical etwork s state could be represeted by its state loic matrix (vector) S2 of dimesio 1 by at that time; ad the total umber of ifected ad ifectious computers I 2 at that time equates to deree of S 2 I de(s2) 2 =. (8) Geerally, time iterval TI later, the loical etwork s state could be represeted by its state loic matrix (vector) S of dimesio 1 by at that time; ad the total umber of ifected ad ifectious computers I at that time equates to deree of S I de(s ) =. (9) I the same way, time iterval ( +1) TI later, the loical etwork s state could be represeted by its state loic matrix (vector) S + 1 of dimesio 1 by at that time; ad the total umber of ifected ad ifectious computers I + 1 at that time equates to deree of S + 1 I 1 de(s + 1) = +. (10) Duri the above propaatio process, the total umber of ifected ad ifectious computers keeps icreasi prior to a certai time poit. Fially, time iterval ( G +1) TI later the total umber of ifected I ad ifectious computers G+ 1 at that time will be equal to I G, which reveals the above propaatio process will actually stop at time poit G TI. We otice that the loical etwork s state at time poit ( +1) TI represeted by its state loic matrix (vector) S + 1 is fully determied by its state at time poit TI represeted by its state loic matrix (vector) S ad its loical topoloy represeted by its topoloy loic matrixt. We fid the relatioship amo S + 1, S, adt could be mathematically described as follows S 1 = S + S T +, (11) where stads for loic matrix multiplicatio, ad + deotes loic matrix additio, both of which have bee defied i sub-sectio 3.1. I the above equatio, S is a 1 by loic matrix adt is a by square loic matrix. The resultat ofs T (deoted by S' ) is a 1 by loic matrix (row vector) represeti all computers beloi to the etwork that could be ifected at time poit ( +1) TI ive the etwork s state at time poit TI represeted by its state loic matrix (row vector) S ad its loical topoloy represeted by its topoloy loic matrixt. Accordi to defiitio of loic matrix multiplicatio ive i sub-sectio 3.1, value of the j -th elemet of S' (deoted by s' 1 ) is j determied by equatio (5), wherei equates to 1 because both the multiplicad ad the resultat loic matrix are loic row vectors, that is, 185
5 s' where 1 j s = k = 1 s AND t kj, (12) stads for the value of the elemet which lies i the k -th colum of S, ad t kj deotes value of the elemet which lies i the k -th row ad the j -th colum oft. I the above equatio, tkj for all k from 1 to actually represets compute j s topoloy i-deree loic vector. The resultat of s AND t kj will be loic T if ad oly if both values of s ad t kj are loic T, which idicates at time poit TI computer k is ifectious ad computer j has a iboud lik from computer k. The loic OR operatio of all those resultats of loic AND operatios whe k from 1 to, iclusive, deoted by k = 1 i the above equatio actually says if there exists at least oe value of k from 1 to, iclusive, which makes the value of the resultat of s AND t kj to be loic T, the value of s' will be loic T. Therefore, equatio (12) actually says if at time poit TI at least oe computer amo those computers from which computer j has a iboud lik is ifectious, computer j will be ifected ad become ifectious at time poit ( +1 ) TI. The, accordi to the defiitio of loic matrix additio ive i sub-sectio 3.1, it could easily derived that S + S T actually just adds all those computers that could be ifected at time poit ( +1) TI represeted by S T to the 1 j etwork s state at time poit TI represeted by S. The resultat of the above loic matrix additio operatio represets the etwork s state at time poit ( +1 ) TI, which is represeted by S + 1. Hece, equatio (11) ets proved. The framework formed by Equatios (9) ad (11) alo with the criterio proposed i this paper used to determie whether the propaatio process has actually stopped is a discrete time determiistic propaatio model of topoloy-aware worms. We call the above framework the loic matrix formulatio of the propaatio process of topoloy-aware worms. The formulatio ca traslate the propaatio process of topoloy-aware worms ito a sequece of loic matrix operatios, which are easily implemeted with ay matrix-friedly mathematics prorams. 4. Applicatios of the formulatio We apply the loic matrix formulatio of the propaatio process of topoloy-aware worms proposed i this paper to ivestiate the impacts of two differet topoloies, amely the simple radom raph topoloy ad the pseudo power law topoloy o the coverae rate of topoloy-aware worms. Coverae rate (deoted bycr i this paper) of a worm is defied i this paper as a ratio i percetae of the maximum umber of computers beloi to a etwork that could be ifected ad become ifectious to the total umber of computers beloi to the same etwork. Accordi to the criterio proposed i this paper used to determie whether the propaatio process of a topoloy-aware worm has actually stopped, coverae rate of a topoloy-aware worm i a etwork could be worked out by usi the followi equatio de( SG ) CR = 100%, (13) where S represets the state loic matrix of the G etwork at the time poit whe the propaatio process has just stopped The simple radom raph topoloy Firstly, we apply the proposed loic matrix formulatio of the propaatio process of topoloyaware worms to ivestiate the impacts of two parameters, amely the umber of iitially ifected computers I 0 beloi to a etwork ad the mea value of topoloy out-deree E( Dout ) of the etwork, o the coverae rate CR of a particular sort of topoloy-aware worm called P2P worm i the etwork. We proram the proposed formulatio with MathWorks MATLAB, which is a matrix friedly mathematics proram. Our implemetatio i MATLAB assumes there are a total of = 10, 000 peers (computers) beloi to the loical P2P overlay etwork uder cosideratio. Therefore, the topoloy of the overlay etwork is represeted by its topoloy loic matrixt, which is a 10,000 by 10,000 square loic matrix; ad the its iitial state is represeted by its iitial state loic 186
6 S ( de(s ) I 0 matrix 0 0 = ), which is a 1 by 10,000 loic matrix (row vector). We radomly select all iitially ifected peers (computers) from all peers beloi to the overlay etwork. Mea value of topoloy out-deree E( Dout ) of the overlay etwork is determied by the followi equatio de( Ti ) i= E( Dout ) = 1, (14) T stads for the i -th row oft, which is actually where i the topoloy out-deree loic vector of peer (computer)i beloi to the overlay etwork. I the experimets coducted for this sub-sectio, we assume each peer has the same value of topoloy out-deree. Peers to which each peer has outboud liks are radomly selected from all peers except the peer itself beloi to the overlay etwork, which meas we do ot allow loop, that is, o peer has a outboud lik to itself. Therefore, we call the topoloy of the overlay etwork i the experimets coducted for this subsectio the simple radom raph topoloy. We coduct our experimets with MATLAB uder I ad E D ). ( out differet combiatios of values of 0 Firstly, we fix the umber of iitially ifected peers (computers) I 0 beloi to the overlay etwork to be 1, ad try to fid out the impact of mea value of topoloy out-deree E D ) o the coverae ( out ratecr of P2P worms i the overlay etwork. We radomly select all iitially ifected peer(s) from all peers beloi to the overlay etwork. A total of 5 scearios ( E( Dout ) from 1 to 5, iclusive) are ivestiated. Experimet for each sceario is repeated 100 times. The, the mea value of coverae rate ad coefficiet of variatio of coverae rate are worked out. Results from the experimets are listed i Table 1. Table 1. The simple radom raph topoloy (whe there is oly 1 iitially ifected peer radomly selected from all peers) Topoloy Out- Deree As show by the above experimetal results, mea value of topoloy out-deree has reat impact o both mea value ad coefficiet of variatio of coverae rate of P2P worms i the overlay etwork featuri the simple radom raph topoloy. Icrease i mea value of topoloy out-deree results i icrease i mea value of coverae rate but decrease i coefficiet of variatio of coverae rate. Whe mea value of topoloy out-deree is icreased to 3, mea value of coverae rate is icreased to over 90% ad its coefficiet of variatio becomes very small, which idicates 3 is the miimum mea value of topoloy out-deree which ca make a P2P worm be able to ifect most peers with very hih certaity. After that, we fix the umber of iitially ifected peers (computers) I 0 beloi to the overlay etwork to be 10, ad repeat the above experimets. Results from the experimets are listed i Table 2. Table 2. The simple radom raph topoloy (whe there are a total of 10 / 100 iitially ifected peers radomly selected from all peers) Topoloy Out- Deree / / / / / / / / / / 0.09 The above experimetal results show similar treds to those show by Table 1, which idicates the impact of umber of iitially ifected peers o the coverae rate of a P2P worm i the overlay etwork featuri the simple radom raph topoloy is isiificat The pseudo power law topoloy Secodly, we apply the proposed loic matrix formulatio of the propaatio process of topoloyaware worms to ivestiate the impacts of two parameters, amely the umber of iitially ifected computers I 0 beloi to a etwork ad the maximum value of topoloy out-deree Max( Dout ) of the etwork, o the coverae ratecr of P2P worms i the etwork. I the experimets coducted for this subsectio, we assume oly a very small umber (10 i our experimets) of peers have the maximum value of topoloy out-deree, ad all other peers have the miimum value (1 i our experimets) of topoloy outderee. Althouh the distributio of topoloy out- 187
7 deree i our experimets does ot strictly follow power law, it does have the most importat features of power law distributio, amely peers with maximum value of topoloy out-deree are rare ad most peers have miimum value of topoloy out-deree. Therefore, we call the topoloy of the overlay etwork i the experimets coducted for this sub-sectio the pseudo power law topoloy. We coduct our experimets with MATLAB uder differet combiatios of values of I 0 ad Max ( Dout ). Firstly, we fix the umber of iitially ifected peers (computers) I 0 beloi to the overlay etwork to be 1, ad try to fid out the impact of maximum value of topoloy out-deree Max( Dout ) o the coverae ratecr i the overlay etwork of topoloy-aware worms. We radomly select all iitially ifected peer(s) from all peers beloi to the overlay etwork. A total of 5 scearios ( Max ( ) = 100,1000, 2000 D out ) are ivestiated. I the experimets coducted for this sub-sectio, we assume each peer has either the maximum value of topoloy out-deree or the miimum value of topoloy out-deree. Peers to which each peer has outboud liks are radomly selected from all peers except the peer itself beloi to the overlay etwork, which meas we do ot allow loop, that is, o peer has a outboud lik to itself. Experimet for each sceario is repeated 100 times. The, the mea value of coverae rate ad coefficiet of variatio of coverae rate are worked out. Results from the experimets are listed i Table 3. Table 3. Whe there is oly 1 iitially ifected peer radomly selected from all peers Maximum Value of Topoloy Out- Deree As show by the above experimetal results, whe all iitially ifected peers are radomly selected from all peers, maximum value of topoloy out-deree has a little impact o both mea value ad coefficiet of variatio of coverae rate of P2P worms i the overlay etwork featuri the pseudo power law topoloy. Icrease i maximum value of topoloy out-deree results i a little icrease i mea value of coverae rate ad a little icrease i coefficiet of variatio of coverae rate as well, which idicates the small ai i coverae rate could be offset by the small loss i certaity. The worm is ot able to ifect most peers with hih certaity. After that, we fix the umber of iitially ifected peers (computers) I 0 beloi to the overlay etwork to be 10, ad repeat the above experimets. Results from the experimets are listed i Table 4. Table 4. Whe there are a total of 10 iitially ifected peers radomly selected from all peers Maximum Value of Topoloy Out- Deree The above experimetal results show similar treds (just a isiificatly hiher coverae rate ad a isiificatly lower coefficiet of variatio of coverae rate) to those show by Table 3, which idicates, whe all iitially ifected peers are radomly selected from all peers, the impact of umber of iitially ifected peers o the coverae rate of a P2P worm i the overlay etwork featuri the pseudo power law topoloy is isiificat. Fially, we radomly select all iitially ifected peers (computers) from oly those peers with maximum topoloy out-deree, ad repeat all the above experimets described i this sub-sectio. Results from the experimets are listed i Table 5 ad Table 6 for I 0 = 1ad 10, respectively. I 0 = Table 5. Whe there is oly 1 iitially ifected peer radomly selected from oly those peers with maximum topoloy out-deree Maximum Value of Topoloy Out- Deree Table 6. Whe there are a total of 10 iitially ifected peers radomly selected from oly those peers with maximum topoloy outderee Maximum Value of Topoloy Out- Deree
8 As show by the above experimetal results, whe all iitially ifected peers are radomly selected from oly those peers with maximum topoloy out-deree, maximum value of topoloy out-deree has a reat impact o both mea value ad coefficiet of variatio of coverae rate of P2P worms i the overlay etwork featuri the pseudo power law topoloy. Icrease i maximum value of topoloy out-deree results i icrease i mea value of coverae rate but decrease i coefficiet of variatio of coverae rate. However, the impact of umber of iitially ifected peers is isiificat. Whe maximum value of topoloy outderee reaches 2,000, the worm is able to ifect most peers with very hih certaity, reardless of umber of iitially ifected peers. 5. Coclusios ad future research This paper presets a study o modeli the propaatio process of topoloy-aware worms. Our major cotributios i this paper are firstly, we propose a iovative loic matrix formulatio of the propaatio process of topoloy-aware worms; ad secodly, we fid, from applicatios of the formulatio i our experimets, the impacts of two differet topoloies, amely the simple radom raph topoloy ad the pseudo power law topoloy, o a P2P worm s mea coverae rate i the P2P overlay etwork. We believe the iovative loic matrix formulatio proposed i this paper, which is a discrete time determiistic propaatio model of topoloy-aware worms described by a differece equatio of loic matrix, is a hihly effective ad efficiet tool for ivestiati the propaatio process of topoloyaware worms i eeral ad P2P worm i particular. I the future, we are oi to icorporate removal of susceptible ad/or ifectious computers (peers) ito the proposed discrete time determiistic propaatio model of topoloy-aware worms, which will reatly ehace the adaptability of the framework proposed i this paper. 6. Refereces [1] N. Weaver, V. Paxso, S. Staiford, ad R. Cuiham, "A Taxoomy of Computer Worms," i WORM '03, Washito D.C., USA, 2003, pp [2] D. Moore, C. Shao, ad J. Brow, "Code-Red A Case Study o the Spread ad Victims of a Iteret Worm," i IMW '02, Marseille, Frace, 2002, pp [3] C. C. Zou, D. Towsley, ad W. Go, "O the Performace of Iteret Worm Scai Strateies," Uiversity of Massachusetts Techical Report TR-03-CSE-07, [4] C. C. Zou, D. Towsley, W. Go, ad S. Cai, "Routi Worm A Fast, Selective Attack Worm Based o IP Address Iformatio," i PADS '05, 2005, pp [5] Z. Che ad C. Ji, "Importace-Scai Worm Usi Vulerable-Host Distributio," i IEEE GLOBECOM, 2005, pp [6] Z. Che ad C. Ji, "A Self-Leari Worm Usi Importace Scai," i WORM '05, Fairfax, VA, USA, 2005, pp [7] E. H. Spafford, "The Iteret Worm Proram A Aalysis," ACM SIGCOMM Computer Commuicatio Review, vol. 19, pp , [8] I. Arce ad E. Levy, "A Aalysis of the Slapper Worm," i IEEE Security & Privacy, 2003, pp [9] W. Yu, "Aalyze the Worm-Based Attack i Lare Scale P2P Networks," i The 8th IEEE Iteratioal Symposium o Hih Assurace Systems Eieeri (HASE 2004), [10] C. C. Zou, W. Go, ad D. Towsley, "Code Red Worm Propaatio Modeli ad Aalysis," i CCS '02, Washito D.C., USA, 2002, pp [11] R. M. Aderso ad R. M. May, Ifectious Diseases of Humas Dyamics ad Cotrol. Oxford Oxford Uiversity Press, [12] H. Adersso ad T. Britto, Stochastic Epidemic Models ad Their Statistical Aalysis. New York Sprier-Verla, [13] N. T. Bailey, The Mathematical Theory of Ifectious Diseases ad Its Applicatios. New York Hafer Press, [14] J. C. Frauethal, Mathematical Modeli i Epidemioloy. New York Sprier-Verla, [15] S. Staiford, V. Paxso, ad N. Weaver, "How to Ow the Iteret i Your Spare Time," i Security '02, Sa Fracisco, CA, USA, 2002, pp [16] Z. Che, L. Gao, ad K. Kwiat, "Modeli the Spread of Active Worms," i IEEE INFOCOM, 2003, pp [17] Y. Wa ad C. Wa, "Modeli the Effects of Timi Parameters o Virus Propaatio," i WORM '03, Washito D.C., USA, 2003, pp [18] K. Rohloff ad T. Basar, "Stochastic Behavior of Radom Costat Scai Worms," i 14th ICCCN, Sa Dieo, CA, USA, 2005, pp [19] D. J. Daley ad J. Gai, Epidemic Modelli A Itroductio. Cambride Cambride Uiversity Press, [20] S. Sellke, N. B. Shroff, ad S. Bachi, "Modeli ad Automated Cotaimet of Worms," i DSN '05, 2005, pp [21] Y. Xia, X. Fa, ad W. Zhu, "Propaatio of Active Worms A Survey," Iteratioal Joural of Computer Systems Sciece & Eieeri, vol. 24, pp ,
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
I. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
Evaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
LECTURE 13: Cross-validation
LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M
Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
Chapter 5: Inner Product Spaces
Chapter 5: Ier Product Spaces Chapter 5: Ier Product Spaces SECION A Itroductio to Ier Product Spaces By the ed of this sectio you will be able to uderstad what is meat by a ier product space give examples
Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
Study on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
Lesson 15 ANOVA (analysis of variance)
Outlie Variability -betwee group variability -withi group variability -total variability -F-ratio Computatio -sums of squares (betwee/withi/total -degrees of freedom (betwee/withi/total -mea square (betwee/withi
Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring
No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy
NEW HIGH PERFORMANCE COMPUTATIONAL METHODS FOR MORTGAGES AND ANNUITIES. Yuri Shestopaloff,
NEW HIGH PERFORMNCE COMPUTTIONL METHODS FOR MORTGGES ND NNUITIES Yuri Shestopaloff, Geerally, mortgage ad auity equatios do ot have aalytical solutios for ukow iterest rate, which has to be foud usig umerical
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
1 Correlation and Regression Analysis
1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio
Estimating Probability Distributions by Observing Betting Practices
5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,
Properties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
Automatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
Institute of Actuaries of India Subject CT1 Financial Mathematics
Istitute of Actuaries of Idia Subject CT1 Fiacial Mathematics For 2014 Examiatios Subject CT1 Fiacial Mathematics Core Techical Aim The aim of the Fiacial Mathematics subject is to provide a groudig i
where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
Chapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
Case Study. Normal and t Distributions. Density Plot. Normal Distributions
Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca
DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
Definition. A variable X that takes on values X 1, X 2, X 3,...X k with respective frequencies f 1, f 2, f 3,...f k has mean
1 Social Studies 201 October 13, 2004 Note: The examples i these otes may be differet tha used i class. However, the examples are similar ad the methods used are idetical to what was preseted i class.
CHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
Measures of Spread and Boxplots Discrete Math, Section 9.4
Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,
Analyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
Asymptotic Growth of Functions
CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll
Determining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:
Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries
Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.
This documet was writte ad copyrighted by Paul Dawkis. Use of this documet ad its olie versio is govered by the Terms ad Coditios of Use located at http://tutorial.math.lamar.edu/terms.asp. The olie versio
Volatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina
Overcomig the Crisis: Ecoomic ad Fiacial Developmets i Asia ad Europe Edited by Štefa Bojec, Josef C. Brada, ad Masaaki Kuboiwa http://www.hippocampus.si/isbn/978-961-6832-32-8/cotets.pdf Volatility of
TO: Users of the ACTEX Review Seminar on DVD for SOA Exam MLC
TO: Users of the ACTEX Review Semiar o DVD for SOA Eam MLC FROM: Richard L. (Dick) Lodo, FSA Dear Studets, Thak you for purchasig the DVD recordig of the ACTEX Review Semiar for SOA Eam M, Life Cotigecies
Infinite Sequences and Series
CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...
A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design
A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:
Department of Computer Science, University of Otago
Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly
Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling
Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria
PSYCHOLOGICAL STATISTICS
UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics
Chapter 14 Nonparametric Statistics
Chapter 14 Noparametric Statistics A.K.A. distributio-free statistics! Does ot deped o the populatio fittig ay particular type of distributio (e.g, ormal). Sice these methods make fewer assumptios, they
ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable
Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
Subject CT5 Contingencies Core Technical Syllabus
Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value
Class Meeting # 16: The Fourier Transform on R n
MATH 18.152 COUSE NOTES - CLASS MEETING # 16 18.152 Itroductio to PDEs, Fall 2011 Professor: Jared Speck Class Meetig # 16: The Fourier Trasform o 1. Itroductio to the Fourier Trasform Earlier i the course,
Research Method (I) --Knowledge on Sampling (Simple Random Sampling)
Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
Systems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised
THE ARITHMETIC OF INTEGERS. - multiplication, exponentiation, division, addition, and subtraction
THE ARITHMETIC OF INTEGERS - multiplicatio, expoetiatio, divisio, additio, ad subtractio What to do ad what ot to do. THE INTEGERS Recall that a iteger is oe of the whole umbers, which may be either positive,
On Formula to Compute Primes. and the n th Prime
Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao [email protected] amih Abdul-Nabi
Hypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
How To Solve The Homewor Problem Beautifully
Egieerig 33 eautiful Homewor et 3 of 7 Kuszmar roblem.5.5 large departmet store sells sport shirts i three sizes small, medium, ad large, three patters plaid, prit, ad stripe, ad two sleeve legths log
A probabilistic proof of a binomial identity
A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two
Entropy of bi-capacities
Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace [email protected] Jea-Luc Marichal Applied Mathematics
BENEFIT-COST ANALYSIS Financial and Economic Appraisal using Spreadsheets
BENEIT-CST ANALYSIS iacial ad Ecoomic Appraisal usig Spreadsheets Ch. 2: Ivestmet Appraisal - Priciples Harry Campbell & Richard Brow School of Ecoomics The Uiversity of Queeslad Review of basic cocepts
CS103X: Discrete Structures Homework 4 Solutions
CS103X: Discrete Structures Homewor 4 Solutios Due February 22, 2008 Exercise 1 10 poits. Silico Valley questios: a How may possible six-figure salaries i whole dollar amouts are there that cotai at least
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
Section 11.3: The Integral Test
Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult
France caters to innovative companies and offers the best research tax credit in Europe
1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public
Cooley-Tukey. Tukey FFT Algorithms. FFT Algorithms. Cooley
Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Cosider a legth- sequece x[ with a -poit DFT X[ where Represet the idices ad as +, +, Cooley Cooley-Tuey Tuey FFT Algorithms FFT Algorithms Usig these
W. Sandmann, O. Bober University of Bamberg, Germany
STOCHASTIC MODELS FOR INTERMITTENT DEMANDS FORECASTING AND STOCK CONTROL W. Sadma, O. Bober Uiversity of Bamberg, Germay Correspodig author: W. Sadma Uiversity of Bamberg, Dep. Iformatio Systems ad Applied
Cantilever Beam Experiment
Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio
Example 2 Find the square root of 0. The only square root of 0 is 0 (since 0 is not positive or negative, so those choices don t exist here).
BEGINNING ALGEBRA Roots ad Radicals (revised summer, 00 Olso) Packet to Supplemet the Curret Textbook - Part Review of Square Roots & Irratioals (This portio ca be ay time before Part ad should mostly
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
THE ABRACADABRA PROBLEM
THE ABRACADABRA PROBLEM FRANCESCO CARAVENNA Abstract. We preset a detailed solutio of Exercise E0.6 i [Wil9]: i a radom sequece of letters, draw idepedetly ad uiformly from the Eglish alphabet, the expected
Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
CME 302: NUMERICAL LINEAR ALGEBRA FALL 2005/06 LECTURE 8
CME 30: NUMERICAL LINEAR ALGEBRA FALL 005/06 LECTURE 8 GENE H GOLUB 1 Positive Defiite Matrices A matrix A is positive defiite if x Ax > 0 for all ozero x A positive defiite matrix has real ad positive
CHAPTER 3 DIGITAL CODING OF SIGNALS
CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity
Lecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown
Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about
Overview on S-Box Design Principles
Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea
Chapter 7 Methods of Finding Estimators
Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of
Spam Detection. A Bayesian approach to filtering spam
Spam Detectio A Bayesia approach to filterig spam Kual Mehrotra Shailedra Watave Abstract The ever icreasig meace of spam is brigig dow productivity. More tha 70% of the email messages are spam, ad it
Chapter 5 O A Cojecture Of Erdíos Proceedigs NCUR VIII è1994è, Vol II, pp 794í798 Jeærey F Gold Departmet of Mathematics, Departmet of Physics Uiversity of Utah Do H Tucker Departmet of Mathematics Uiversity
GCSE STATISTICS. 4) How to calculate the range: The difference between the biggest number and the smallest number.
GCSE STATISTICS You should kow: 1) How to draw a frequecy diagram: e.g. NUMBER TALLY FREQUENCY 1 3 5 ) How to draw a bar chart, a pictogram, ad a pie chart. 3) How to use averages: a) Mea - add up all
Lesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
Plug-in martingales for testing exchangeability on-line
Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk
On the Periodicity of Time-series Network and Service Metrics
O the Periodicity of Time-series Network ad Service Metrics Joseph T. Lizier ad Terry J. Dawso Telstra Research Laboratories Sydey, NSW, Australia {oseph.lizier, terry..dawso}@team.telstra.com Abstract
Biology 171L Environment and Ecology Lab Lab 2: Descriptive Statistics, Presenting Data and Graphing Relationships
Biology 171L Eviromet ad Ecology Lab Lab : Descriptive Statistics, Presetig Data ad Graphig Relatioships Itroductio Log lists of data are ofte ot very useful for idetifyig geeral treds i the data or the
Trigonometric Form of a Complex Number. The Complex Plane. axis. ( 2, 1) or 2 i FIGURE 6.44. The absolute value of the complex number z a bi is
0_0605.qxd /5/05 0:45 AM Page 470 470 Chapter 6 Additioal Topics i Trigoometry 6.5 Trigoometric Form of a Complex Number What you should lear Plot complex umbers i the complex plae ad fid absolute values
Running Time ( 3.1) Analysis of Algorithms. Experimental Studies ( 3.1.1) Limitations of Experiments. Pseudocode ( 3.1.2) Theoretical Analysis
Ruig Time ( 3.) Aalysis of Algorithms Iput Algorithm Output A algorithm is a step-by-step procedure for solvig a problem i a fiite amout of time. Most algorithms trasform iput objects ito output objects.
5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?
5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso
THE ROLE OF EXPORTS IN ECONOMIC GROWTH WITH REFERENCE TO ETHIOPIAN COUNTRY
- THE ROLE OF EXPORTS IN ECONOMIC GROWTH WITH REFERENCE TO ETHIOPIAN COUNTRY BY: FAYE ENSERMU CHEMEDA Ethio-Italia Cooperatio Arsi-Bale Rural developmet Project Paper Prepared for the Coferece o Aual Meetig
Present Values, Investment Returns and Discount Rates
Preset Values, Ivestmet Returs ad Discout Rates Dimitry Midli, ASA, MAAA, PhD Presidet CDI Advisors LLC [email protected] May 2, 203 Copyright 20, CDI Advisors LLC The cocept of preset value lies
THE REGRESSION MODEL IN MATRIX FORM. For simple linear regression, meaning one predictor, the model is. for i = 1, 2, 3,, n
We will cosider the liear regressio model i matrix form. For simple liear regressio, meaig oe predictor, the model is i = + x i + ε i for i =,,,, This model icludes the assumptio that the ε i s are a sample
Approximating Area under a curve with rectangles. To find the area under a curve we approximate the area using rectangles and then use limits to find
1.8 Approximatig Area uder a curve with rectagles 1.6 To fid the area uder a curve we approximate the area usig rectagles ad the use limits to fid 1.4 the area. Example 1 Suppose we wat to estimate 1.
Reliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
Confidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
