An Efficient Group Key Agreement Protocol for Ad hoc Networks

Size: px
Start display at page:

Download "An Efficient Group Key Agreement Protocol for Ad hoc Networks"

Transcription

1 An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany, Abstact A Goup Key Ageement () potocol is a mechanism to establish a cyptogaphic key fo a goup of paticipants, based on each one s contibution, ove a public netwok. The key, thus deived, can be used to establish a secue channel between the paticipants. When the goup composition changes (o othewise), one can employ supplementay potocols to deive a new key. Thus, they ae well-suited to the key establishment needs of dynamic pee-to-pee netwoks as in ad hoc netwoks. While many of the poposed potocols ae too expensive to be employed by the constained devices often pesent in ad hoc netwoks, othes lack a fomal secuity analysis. In this pape, we pesent a simple, secue and efficient potocol well suited to dynamic ad hoc netwoks. We also pesent esults of ou implementation of the potocol in a pototype application. 1. Intoduction Ad hoc netwoks ae netwoks composed of constained devices communicating ove wieless channels in the (patial) absence of any fixed infastuctue. Moeove, netwok composition is highly dynamic with devices leaving/joining the netwok quite fequently. Secuing such netwoks becomes a moe difficult task with additional challenges in the fom of: lack of tusted thid paties, expensive communication, ease of inteception of messages and limited computational capabilities of the devices. Key establishment is a vital step in secuing in any netwok. In ad hoc netwoks, key distibution techniques ae not useful as thee is not enough tust in the netwok so as to agee on a key decided by one membe o some cental authoity. Goup Key Ageement () [8] potocols, which enable the paticipants to agee on a common secet value, based on each paticipant s public contibution, seem to povide a good solution. They don t equie the pesence of a cental authoity. Also, when the goup composition changes (as in case of mege o patition of goups), one can employ supplementay key ageement potocols to get a new goup key. Thus a tansient secue channel can be constucted duing the lifetime of one session of a goup Related Wok Many potocols [5, 11, 7, 4, 6, 3] have been poposed in liteatue, most being deived fom the two-paty Diffie-Hellman (DH) key ageement potocol. While some ae secue against passive advesaies only, othes do not have a igoous secuity poof. A secuity poof typically involves showing that an attack on a potocol can be used to solve a well-known had poblem unde some standad assumptions. Povably secue potocols in a well-defined model of secuity wee fist povided by esson et al. [4]. Thei secuity model extended the ealie wok of ellae et al. [1]. The numbe of ounds in these potocols is linea in the numbe of paticipants, thus making them unsuitable fo lage ad hoc netwoks. Yung et al. [6] poposed the fist povably-secue constant ound potocol inspied fom the woks of umeste et al. [5]. In the same wok, they also poposed a scalable compile to tansfom a potocol, secue against a passive advesay, into one which is secue against an active advesay. ut one ound in thei potocol consists of 1 boadcast and n 1 simultaneous eceives by each use. Achieving this is not possible in most netwoks. Also it lacks pocedues to handle goup dynamism. oyd et al. [3] poposed an efficient constant ound potocol whee the bulk of the computation is done by one paticipant, thus making it efficient fo heteogeneous ad hoc netwoks. It is povably secue in the Random Oacle model [1] but lacks pefect fowad sececy (i.e., compomise of long-tem key compomises all past session 1 keys). We popose a povably secue and efficient potocol which goup. 1 A session efes to one instance of potocol execution in some

2 Potocol Expo pe U i Rounds PS (Max Expo) (Messages) [11] 3 (m) m + 1 (2m 3) No [7] log 2 m + 1 log 2 m (m) No [4] i + 1 m (m) Yes [6] 3 2 (2m) Yes [9] 2 (2m ) 2 (m) Yes Ous 2 (m) 2 (m) Yes m: Numbe of paticipants : 3 ounds fo authenticated : m invese calculations o O(m 2 ) multiplications apat fom m exponentiations Table 1. Efficiency Compaison of potocols (PS: Povably Secue) achieves pefect fowad sececy as well. Subsequent to ou wok, Won et al. [9] also solve this poblem but thei poposition tuns out to be expensive computationally. In table 1, the numbe of exponentiations pe membe fo ou potocol ae compaed with some well-known potocols (including maximum numbe of exponentiations by any membe fo asymmetic potocols). Also the numbe of ounds (multiple independent messages can be sent in a ound) and total numbe of messages ae povided Outline The pape is oganized as follows: In Section 2, we pesent a new key ageement potocol fo ad hoc envionments. It is efficient both in communication and computation tems. Also, most of the exchanged messages ae independent of each othe, thus making it possible to collect them befoe the goup is defined. In Section 3 we pesent a secuity analysis of the same and convet it into an authenticated key ageement potocol. In Section 4, we pesent ou implementation esults. Finally, we conclude in Section A New Goup Key Ageement Potocol We popose a new potocol in this section. This potocol is unauthenticated and secue against passive advesaies only. We fist intoduce the notations used, illustate the basic pinciple of key exchange, followed by detailed explanation of how it is employed to deive Initial Key Ageement (IKA), Join/Mege and Delete/Patition pocedues fo ad hoc goups Notation G: A subgoup (of pime ode q with geneato g) of some mathematical goup. M i : i th paticipant in the cuent session. M l : The goup leade: A membe that is elected to coodinate goup-level computation such as goup-membeship and goup key management. Can be chosen andomly o by some application specific citeia. i : A andom numbe (fom [1, q 1]) geneated by membe M i fo each session. Also called the secet fo M i. g i : The blinded secet fo M i, which is a public quantity. M: The set of indices of the paticipants in the cuent session (the session being consideed). J : The set of indices of the joining paticipants (joining the cuent session). D: The set of indices of the leaving paticipants (leaving the cuent session). x y: x is assigned y. x S: x is andomly dawn fom the unifom distibution S. M i M j : {M}: M i sends message M to paticipant M j. M i M : {M}: Mi boadcasts message M to all paticipants indexed by M A Two Round Potocol Potocol Steps: Round 1: Each M i esponds to the initial equest, INIT, with its blinded secet g i to the initiato. Round 2: The goup composition is calculated and the goup leade M l is elected and passed all the eceived data 2. M l aises each joining membe s blinded secet to its secet ( l ) and boadcasts them along with the oiginal contibutions to the goup, i.e., it sends {g i, g i l } fo all i M \ {l}. Key Calculation: Each M i checks if its contibution is included coectly and then emoves its secet i fom g i l to get g l. The goup key is Key = g l Π i M\{l} g i l = g l(1+ i M\{l} i). Note: 1) The oiginal contibutions g i ae included in the last message as they ae equied fo key calculation in case of goup modifications (see below). 2) Even though Π i M\{l} g i l is publicly known, it is included in key computation, to deive a key composed of eveyone s contibution. The potocol is fomally defined in table 2. We now see how this potocol can be used to deive IKA, Join/Mege and Delete/Patition pocedues fo ad hoc netwoks. IKA: Secue ad hoc goup fomation pocedues typically involve pee discovey and connectivity checks befoe a 2 Note this is pat of the goup management potocol.

3 Round 0 j M, M j M : {INIT } Round 1 i M \ {j}, i [1, q 1], Mi M j : {g i } Round 2 l M, l [1, q 1] M l M : {g i, g i l } i M\{l} Key = g l(1+ i) i M\{l} Table 2. IKA goup key is deived. Thus, a discovey equest is issued by a membe (possibly multiple membes) and all inteested pees espond. The esponses ae collected and connectivity checks ae caied out to ensue that all membes can listen/boadcast to the goup (see fo instance [2, 10]). Afte the goup membeship is defined, pocedues ae implemented to deive a goup key. Such an appoach is quite a dain on the limited esouces of ad hoc netwok devices. Thus an appoach which integates the two sepaate pocedues of goup fomation and goup key ageement is equied. The above potocol fits well with this appoach. Round 0 and Round 1 of the above potocol can take place in the discovey stage as the exchanged messages ae independent of each othe. In this way, blinded secets, g i s, of all potential membes, M i s, ae collected befoe the goup composition is defined. When the fully connected ad hoc goup is defined, a single message (Round 2 in table 2) fom the goup leade, M l, (using contibutions of only the joining membes) helps evey membe to compute the goup key. Note that if in the goup management potocol, the initiato and the leade ae diffeent entities, the leade will be passed on all the blinded secets (along with othe management data) duing the goup management stage. An example is povided below. Suppose M 1 initiates the goup discovey and initially 5 membes expess inteest and send g 2, g 3, g 4, g 5 and g 6 espectively. Finally only 3 join because of connectivity constaints. Suppose the membes who finally join ae M 2, M 4 and M 5. Then the goup leade, say M 1, boadcasts the following message:{g 2, g 4, g 5, (g 2 ) 1, (g 4 ) 1, (g 5 ) 1 } On eceiving this message, each membe can deive g 1 using his espective secet. Thus the key g 1( ) can be computed. Join/Mege: Join is quite simila to IKA. Each joining membe, M i (i J ), sends a JOIN equest along with its blinded secet, g i to the existing goup. The goup leade (M l ) chooses a new andom secet, l, and sends all the blinded secets to the new goup leade 3, M l. The new 3 Fo each session, one may want to elect a new leade. Round 0 i J, i [1, q 1], M i M : {JOIN, g i } Round 1 l [1, q 1], M = M J, l M M l M l : {g i } i M\{l } Round 2 l l, l [1, q 1] M l M : {g i, g i l } i M\{l} Key = g l(1+ i) i M\{l} Table 3. Join/Mege goup leade boadcasts a message simila to the ound 2 message in IKA, i.e., all the blinded secets and the blinded secets aised to his (new) secet. It is woth noting that when a membe, whose blinded secet is public, is chosen as the goup leade, he chooses a new pai of secet and blinded secet. See table 3 fo fomal specification and below fo an example. Suppose new membes, M 9 and M 10 join the goup of M 1, M 2, M 4 and M 5 with thei contibutions g 9 and g 10 espectively. Then the pevious goup leade (M 1 ) changes its secet to 1 and sends g 1, g 2, g 4, g 5, g 9 to M 10 (say the new goup leade). M 10 geneates a new secet 10 and boadcasts the following message to the goup: {g 1, g 2, g 4, g 5, g 9, g 10 1, g 10 2, g 10 4, g 10 5, g 10 9 }. And the new key is g 10 ( ). Delete/Patition: Delete is quite simila to Join. When membes leave the goup, a new goup leade is andomly chosen fom the emaining membes and he changes his secet contibution and sends an IKA Round 2 like message to the goup, omitting the leaving membes contibutions. We omit the details. 3. Secuity Result The potocol pesented in the ealie section is povably secue against passive advesaies in the model of [4], fom whee the notations and definitions ae taken. Theoem 1: Let P be the potocol as defined above. Let A be a passive advesay making q ex = (q ika +q join +q delete ) Execute queies to the paties and unning in time t. Then Potocol P is a secue potocol. Namely: Adv A P (t, q ex) 2q ex Succ DDH (t ) whee t t + q ex P t exp, t exp is the time to pefom an exponentiation in G and P being the maximum numbe of paticipants in the potocol.

4 Poof: Due to lack of space, we only give a sketch of the poof. The complete poof will appea in the full vesion 4. We show that an advesay who achieves an advantage in calculating the session key, can be used to build an attacke which gains an advantage in solving an instance of the Decisional Diffie-Hellman (DDH) Poblem. The Send and Coupt queies ae not applicable as we ae dealing with a passive advesay and thee ae no long-tem secets. Thus the only elevant queies ae the Execute, Reveal and Test queies. Assume the advesay A distinguishes the session key with a pobability non-negligibly geate than 0.5. We constuct fom A a DDH attacke that eceives as input an instance D = {g, g 1, g 2, g 3 } and pedicts if it is an instance fom (g, g a, g b, g a b ) o (g, g a, g b, g c ) with a non-negligible advantage. The Attacke feeds A with elements deived fom the instance D in the eply to the Execute quey of the session fo which A will make the Test quey. So picks at andom c test fom [1, q ex ] which is its guess fo the numbe of the Execute quey, coesponding to the session, fo which A makes the Test quey. Fo all othe sessions, esponds to Execute queies with andomly geneated data. eplies to the Test quey with a session key, sk, constucted using data fom the instance D. sk is a valid session key only if the instance D is a DH tuple. Thus, if the advesay A coectly identifies sk as the session key, the tuple (g, g 1, g 2, g 3 ) is indeed a DH tuple othewise it is a andom tuple. The success pobability of is the pobability that it coectly guesses the session fo which A makes the Test quey (1/q ex ), multiplied by the success pobability of A. Thus if we denote by p the pobability of advesay A distinguishing the session key, the pobability of success of is: Succ DDH (t ) p/q ex. The unning time of is bounded by the unning time of A and the time to pefom at most P exponentiations duing q ex queies An authentication compile In [6], Yung et al. intoduced a scalable compile which tansfoms any potocol P, secue against passive advesay, to an authenticated potocol P, secue against an active advesay. It achieves this by enhancing the potocol to include a (pe-)ound whee eveyone boadcasts its identity and a andom nonce. Theeafte each message is accompanied by a signatue on the message, identities of the paticipants and thei nonces (see [6] fo details). Then if P is a secue potocol, then the potocol P is a secue Authenticated potocol. Namely, Theoem 2: Adv A P (t, q ex, q s ) qs 2 AdvA P (t, 1) + Adv A P (t, q ex ) + P Succ Σ (t ) + q2 s +qexqs 2 k 4 whee: q ex and q s ae the numbe of Execute and Send queies espectively. t = t + ( P q ex + q s ).t P, t P is the time to execute P. AdvP A (t, q ex, q s ): Advantage of an active advesay (A ) against the authenticated potocol P, making q ex Execute queies and q s Send queies in time t. AdvP A(t, 1): Advantage of a passive advesay (A) against the potocol P, making 1 Execute quey in time t. AdvP A(t, q ex): Advantage of a passive advesay (A) against the potocol P, making q ex Execute queies in time t. Succ DDH (t ): Success pobability of an advesay against an instance of the DDH poblem in time t. Succ Σ (t ): Success pobability of an advesay against the signatue scheme Σ in time t. and k is the secuity paamete Authenticated potocol Thus applying the above compile to ou potocol yields a 3-ound authenticated potocol, P with the following secuity eduction: Theoem 3: Adv A P (t, q ex, q s ) (q s + 2q ex ) Succ DDH (t ) + P Succ Σ (t ) + q2 s +qexqs 2 k 4. Implementation To test the pefomance of this new potocol, we incopoated it in the goup management potocol of [2]. The goup management of [2] consists of thee communication ounds: DISC, JOIN and GROUP. The DISC stage initiates the goup fomation by calling fo inteested paticipants. Each inteested paticipant esponds with a JOIN message. The goup membeship is defined and announced by the goup leade (chosen andomly) by the GROU P message. The design of the new potocol allowed us to piggy-back data on goup management messages, thus membe contibutions towads the goup key ae collected duing JOIN messages while the GROU P message caies the message fom the goup leade which enables eveyone to compute the goup key. Thus no additional communication ound is equied to deive a goup key, iespective of the goup size. It is woth mentioning that it would not have been possible with most of the potocols pesented in table 1, as the messages sent by goup membes ae dependent on messages sent by othe membes. A compaison of the computation times on a device in the absence and pesence of pocedues is plotted in table 4. The data shown is fo an expeimental setup consisting of laptops (Compaq 500 Mhz unning Linux) and palmtops (Compaq ipaq 400MHz unning Linux familia 0.7). All andom contibutions fo the goup key wee cho-

5 no Laptop - Leade and non-leade no no no Palmtop - Leade and non-leade Table 4. Computation time pe device with and without fo laptop and palmtop sen fom a Diffie-Hellman goup of pime ode of 1024 bits. The code was witten in Java except the exponentiation function which was implemented in native code with the GMP libay 5. The gaphs in table 4 plot computation time (in milliseconds on Y axis) against goup-size with and without. Thee ae sepaate plots fo the cases when the device was a leade/non-leade. Leade fo goup management was andomly chosen. As expected, the time fo non-leade membes inceases (when employing potocol) by an almost constant facto (ode of time to pefom two 1024 bit exponentiations), while fo a leade it inceases linealy as the goup size inceases. As most ad hoc netwoks ae expected to be composed of devices of unequal computing powe, moe poweful devices (like laptops) can assume the ole of a leade moe often. 5. Conclusion along with goup management pocedues), and also efficient in computational tems. It can be, using Yung et al. compile, tansfomed into a thee ound potocol secue against an active advesay. This adds to the cost of the potocol, by adding one ound of boadcasts. The potocol is simple and we have povided a secuity poof in the famewok of [4], using the standad model and the Decisional Diffie-Hellman assumption in any goup. Expeimental esults show that ou potocol esults in a easonable computational ovehead duing goup fomation with hadly any communication buden. Futhe eductions in tems of computation ovehead can be made by using Elliptic cuve goups. Refeences [1] M. ellae and P. Rogaway. Random oacles ae pactical: A paadigm fo designing efficient potocols. ACM Confeence on Compute and Communications Secuity, [2] M. oulkenafed, D. Sacchetti, and V. Issany. Using goup management to tame mobile ad hoc netwoks. IFIP TC8 Woking Confeence on Mobile Infomation Systems, [3] C. oyd and J. Nieto. Round-optimal contibutoy confeence key ageement. 6th Intenational Wokshop on Pactice and Theoy in Public Key Cyptogaphy, [4] E. esson, O. Chevassut, and D. Pointcheval. Dynamic goup Diffie Hellman key exchange unde standad assumptions. In Advances in Cyptology - EUROCRYPT, [5] M. umeste and Y. Desmedt. A secue and efficient confeence key distibution system. Advances in Cyptology - EUROCRYPT, [6] J. Katz and M. Yung. Scalable potocols fo authenticated key exchange - full vesion. Advances in Cyptology - CRYPTO, [7] Y. Kim, A. Peig, and G. Tsudik. Simple and fault-toleant key ageement fo dynamic collaboative goups. ACM CCS, [8] A. J. Menezes, P. C. van Ooschot, and S. Vanstone. Hand- ook of Applied Cyptogaphy. CRC Pess, [9] J. Nam, J. Lee, S. Kim, and D. Won. DDH based goup key ageement fo mobile computing [10] G.-C. Roman, Q. Huang, and A. Hazemi. Consistent goup membeship in ad hoc netwoks. Intenational Confeence on Softwae Engineeing, [11] M. Steine, G. Tsudik, and M. Waidne. Key ageement in dynamic pee goups. IEEE Tansactions on Paallel and Distibuted Systems, We have poposed a new goup key ageement potocol, paticulaly well suited to ad hoc netwoks, and secue against a passive advesay. It is efficient in the numbe of ounds (only two ounds, the fist ound may be executed 5

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

UNIT CIRCLE TRIGONOMETRY

UNIT CIRCLE TRIGONOMETRY UNIT CIRCLE TRIGONOMETRY The Unit Cicle is the cicle centeed at the oigin with adius unit (hence, the unit cicle. The equation of this cicle is + =. A diagam of the unit cicle is shown below: + = - - -

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

Episode 401: Newton s law of universal gravitation

Episode 401: Newton s law of universal gravitation Episode 401: Newton s law of univesal gavitation This episode intoduces Newton s law of univesal gavitation fo point masses, and fo spheical masses, and gets students pactising calculations of the foce

More information

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses,

2 r2 θ = r2 t. (3.59) The equal area law is the statement that the term in parentheses, 3.4. KEPLER S LAWS 145 3.4 Keple s laws You ae familia with the idea that one can solve some mechanics poblems using only consevation of enegy and (linea) momentum. Thus, some of what we see as objects

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications

The Supply of Loanable Funds: A Comment on the Misconception and Its Implications JOURNL OF ECONOMICS ND FINNCE EDUCTION Volume 7 Numbe 2 Winte 2008 39 The Supply of Loanable Funds: Comment on the Misconception and Its Implications. Wahhab Khandke and mena Khandke* STRCT Recently Fields-Hat

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

On the Security of A Provably Secure Certificate Based Ring Signature Without Pairing

On the Security of A Provably Secure Certificate Based Ring Signature Without Pairing Intenational Jounal of Netwok Secuity, Vol.17, No.2, PP.129-134, Ma. 2015 129 On the Secuity of A Povably Secue Cetificate Based Ring Signatue Without Paiing Ji Geng 1, Hu Xiong 1,2, Fagen Li 1, and Zhiguang

More information

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM

AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM AN IMPLEMENTATION OF BINARY AND FLOATING POINT CHROMOSOME REPRESENTATION IN GENETIC ALGORITHM Main Golub Faculty of Electical Engineeing and Computing, Univesity of Zageb Depatment of Electonics, Micoelectonics,

More information

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION

MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION MULTIPLE SOLUTIONS OF THE PRESCRIBED MEAN CURVATURE EQUATION K.C. CHANG AND TAN ZHANG In memoy of Pofesso S.S. Chen Abstact. We combine heat flow method with Mose theoy, supe- and subsolution method with

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

How to Encrypt Properly with RSA

How to Encrypt Properly with RSA RSA Laboatoies CyptoBytes. Volume 5, No. 1 Winte/Sping 2002, pages 9 19. ow to Encypt Popely with RSA David Pointcheval Dépt d Infomatique, ENS CNRS, 45 ue d Ulm, 75230 Pais Cedex 05, Fance E-mail: David.Pointcheval@ens.f

More information

Alarm transmission through Radio and GSM networks

Alarm transmission through Radio and GSM networks Alam tansmission though Radio and GSM netwoks 2015 Alam tansmission though Radio netwok RR-IP12 RL10 E10C E10C LAN RL1 0 R11 T10 (T10U) Windows MONAS MS NETWORK MCI > GNH > GND > +E > DATA POWER DATA BUS

More information

Dual channel closed-loop supply chain coordination with a reward-driven remanufacturing policy

Dual channel closed-loop supply chain coordination with a reward-driven remanufacturing policy Intenational Jounal of Poduction Reseach ISSN: -753 Pint 1366-588X Online Jounal homepage: http://www.tandfonline.com/loi/tps Dual channel closed-loop supply chain coodination with a ewad-diven emanufactuing

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

Fixed Income Attribution: Introduction

Fixed Income Attribution: Introduction 18th & 19th Febuay 2015, Cental London Fixed Income Attibution: A compehensive undestanding of Fixed Income Attibution and the challenging data issues aound this topic Delegates attending this two-day

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

Fast FPT-algorithms for cleaning grids

Fast FPT-algorithms for cleaning grids Fast FPT-algoithms fo cleaning gids Josep Diaz Dimitios M. Thilikos Abstact We conside the poblem that given a gaph G and a paamete k asks whethe the edit distance of G and a ectangula gid is at most k.

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Top K Nearest Keyword Search on Large Graphs

Top K Nearest Keyword Search on Large Graphs Top K Neaest Keywod Seach on Lage Gaphs Miao Qiao, Lu Qin, Hong Cheng, Jeffey Xu Yu, Wentao Tian The Chinese Univesity of Hong Kong, Hong Kong, China {mqiao,lqin,hcheng,yu,wttian}@se.cuhk.edu.hk ABSTRACT

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

883 Brochure A5 GENE ss vernis.indd 1-2

883 Brochure A5 GENE ss vernis.indd 1-2 ess x a eu / u e a. p o.eu c e / :/ http EURAXESS Reseaches in Motion is the gateway to attactive eseach caees in Euope and to a pool of wold-class eseach talent. By suppoting the mobility of eseaches,

More information

Firstmark Credit Union Commercial Loan Department

Firstmark Credit Union Commercial Loan Department Fistmak Cedit Union Commecial Loan Depatment Thank you fo consideing Fistmak Cedit Union as a tusted souce to meet the needs of you business. Fistmak Cedit Union offes a wide aay of business loans and

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors

Transmittal 198 Date: DECEMBER 9, 2005. SUBJECT: Termination of the Existing Eligibility-File Based Crossover Process at All Medicare Contractors anual ystem Depatment of ealth & uman evices (D) entes fo edicae & Pub 100-20 One-Time Notification edicaid evices () Tansmittal 198 Date: DEEBE 9, 2005 hange equest 4231 UBJET: Temination of the Existing

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run

They aim to select the best services that satisfy the user s. other providers infrastructures and utility services to run End-to-End Qo Mapping and Aggegation fo electing Cloud evices Raed Kaim, Chen Ding, Ali Mii Depatment of Compute cience Ryeson Univesity, Toonto, Canada 2kaim@yeson.ca, cding@scs.yeson.ca, ali.mii@yeson.ca

More information

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types Aticle A Two-Step Tabu Seach Heuistic fo Multi-Peiod Multi-Site Assignment Poblem with Joint Requiement of Multiple Resouce Types Siavit Swangnop and Paveena Chaovalitwongse* Depatment of Industial Engineeing,

More information

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract

Trading Volume and Serial Correlation in Stock Returns in Pakistan. Abstract Tading Volume and Seial Coelation in Stock Retuns in Pakistan Khalid Mustafa Assistant Pofesso Depatment of Economics, Univesity of Kaachi e-mail: khalidku@yahoo.com and Mohammed Nishat Pofesso and Chaiman,

More information

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE

INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE 1 INVESTIGATION OF FLOW INSIDE AN AXIAL-FLOW PUMP OF GV IMP TYPE ANATOLIY A. YEVTUSHENKO 1, ALEXEY N. KOCHEVSKY 1, NATALYA A. FEDOTOVA 1, ALEXANDER Y. SCHELYAEV 2, VLADIMIR N. KONSHIN 2 1 Depatment of

More information

Questions for Review. By buying bonds This period you save s, next period you get s(1+r)

Questions for Review. By buying bonds This period you save s, next period you get s(1+r) MACROECONOMICS 2006 Week 5 Semina Questions Questions fo Review 1. How do consumes save in the two-peiod model? By buying bonds This peiod you save s, next peiod you get s() 2. What is the slope of a consume

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques

Loyalty Rewards and Gift Card Programs: Basic Actuarial Estimation Techniques Loyalty Rewads and Gift Cad Pogams: Basic Actuaial Estimation Techniques Tim A. Gault, ACAS, MAAA, Len Llaguno, FCAS, MAAA and Matin Ménad, FCAS, MAAA Abstact In this pape we establish an actuaial famewok

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

The LCOE is defined as the energy price ($ per unit of energy output) for which the Net Present Value of the investment is zero.

The LCOE is defined as the energy price ($ per unit of energy output) for which the Net Present Value of the investment is zero. Poject Decision Metics: Levelized Cost of Enegy (LCOE) Let s etun to ou wind powe and natual gas powe plant example fom ealie in this lesson. Suppose that both powe plants wee selling electicity into the

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation

Risk Sensitive Portfolio Management With Cox-Ingersoll-Ross Interest Rates: the HJB Equation Risk Sensitive Potfolio Management With Cox-Ingesoll-Ross Inteest Rates: the HJB Equation Tomasz R. Bielecki Depatment of Mathematics, The Notheasten Illinois Univesity 55 Noth St. Louis Avenue, Chicago,

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan

Instructions to help you complete your enrollment form for HPHC's Medicare Supplemental Plan Instuctions to help you complete you enollment fom fo HPHC's Medicae Supplemental Plan Thank you fo applying fo membeship to HPHC s Medicae Supplement plan. Pio to submitting you enollment fom fo pocessing,

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

Deflection of Electrons by Electric and Magnetic Fields

Deflection of Electrons by Electric and Magnetic Fields Physics 233 Expeiment 42 Deflection of Electons by Electic and Magnetic Fields Refeences Loain, P. and D.R. Coson, Electomagnetism, Pinciples and Applications, 2nd ed., W.H. Feeman, 199. Intoduction An

More information

AgentTime: A Distributed Multi-agent Software System for University s Timetabling

AgentTime: A Distributed Multi-agent Software System for University s Timetabling AgentTime: A Distibuted Multi-agent Softwae System fo Univesity s Timetabling Eduad Babkin 1,2, Habib Adbulab 1, Tatiana Babkina 2 1 LITIS laboatoy, INSA de Rouen. Rouen, Fance. 2 State Univesity Highe

More information

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs

Office of Family Assistance. Evaluation Resource Guide for Responsible Fatherhood Programs Office of Family Assistance Evaluation Resouce Guide fo Responsible Fathehood Pogams Contents Intoduction........................................................ 4 Backgound..........................................................

More information

Experiment MF Magnetic Force

Experiment MF Magnetic Force Expeiment MF Magnetic Foce Intoduction The magnetic foce on a cuent-caying conducto is basic to evey electic moto -- tuning the hands of electic watches and clocks, tanspoting tape in Walkmans, stating

More information

Converting knowledge Into Practice

Converting knowledge Into Practice Conveting knowledge Into Pactice Boke Nightmae srs Tend Ride By Vladimi Ribakov Ceato of Pips Caie 20 of June 2010 2 0 1 0 C o p y i g h t s V l a d i m i R i b a k o v 1 Disclaime and Risk Wanings Tading

More information

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that

More information