Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems

Size: px
Start display at page:

Download "Optimizing Content Retrieval Delay for LT-based Distributed Cloud Storage Systems"

Transcription

1 Optimizing Content Retieval Delay fo LT-based Distibuted Cloud Stoage Systems Haifeng Lu, Chuan Heng Foh, Yonggang Wen, and Jianfei Cai School of Compute Engineeing, Nanyang Technological Univesity, Singapoe {lu0007ng, aschfoh, ygwen, Abstact Among diffeent setups of cloud stoage systems, fountain-codes based distibuted cloud stoage system povides eliable online stoage solution though placing coded content fagments into multiple stoage nodes. Luby Tansfom (LT) code is one of the popula fountain codes fo stoage systems due to its efficient ecovey. Howeve, to ensue high success decoding of fountain codes based stoage, etieval of additional fagments is equied, and this equiement intoduces additional delay, which is citical fo content etieval o downloading applications. In this pape, we show that multiple-stage etieval of fagments is effective to educe the content-etieval delay. We fist develop a delay model fo vaious multiple-stage etieval schemes applicable to ou consideed system. With the developed model, we study optimal etieval schemes given the success decodability equiement. Ou numeical esults demonstate that the content-etieval delay can be significantly educed by optimally scheduling packet equests in a multi-stage fashion. I. INTRODUCTION Cloud stoage systems povide a scalable online stoage solution to end uses who equie flexible amount of stoage space but do not wish to own and maintain stoage infastuctue [], []. Cloud stoage systems consist of a collection of stoage nodes that ae connected though pivate o public Intenet. A content such as a lage file o a video is often fagmented and distibuted in a set of stoage nodes. To offe high eliability and availability of stoage sevices, edundancy of contents may be employed. Fagments of contents may be simply eplicated and stoed in diffeent stoage nodes to achieve edundancy. Easue codes may be used fo stoage edundancy to impove stoage efficiency of the system. In a distibuted stoage system with easue coding, a lage content is fist divided into a numbe of fagments, say k fagments, usually of same size. These fagments undego an encoding pocedue specified by a paticula easue coding to poduce an enlaged numbe of coded fagments, say n coded fagments, whee n k is the stoage edundancy. These coded fagments ae distibuted into diffeent stoage nodes fo impoved fault toleance. In an optimal pefoming easue code, the oiginal content can be etieved by obtaining any of the k coded fagments to econstuct the content. In geneal, thee ae two eseach effots in designing an efficient distibuted stoage system with easue codes fo obustness. The fist eseach effot falls on the design of enhanced easue codes that impove system pefomance. In [3], Hafne pesented Weave codes as a highly fault toleant easue code fo stoage systems. By optimizing the Cauchy distibution matix, Plank et al. intoduced an enhanced Reed- Solomon codes fo netwoked stoage system [4]. In [5], Huang et al. poposed Pyamid codes whee they exploed employment of nested easue codes as a single code. Oggie poposed Self-Repaiing codes et al. [6] that achieves local decodability suitable fo epaiing of fagments in distibuted stoage systems. Anothe eseach effot focuses on the design of stoage system opeational optimization based on existing easue codes to achieve some specific optimal pefomance matices. These opeational designs may include stoage edundancy ovehead optimization, stoage allocation and epai, optimal etieval of stoage, and othes. In [7], Sadai et al. investigated the optimal stoage allocation with limited stoage budget consideing Maximum Distance Sepaable (MDS) codes. Leong et al. studied stoage allocation fo high eliability [8]. Dimakis et al. intoduced Regeneating codes fo epaiing of missing fagments consideing linea netwok coding [9]. The fist study investigating the elationship between stoage system setup and etieval delay is epoted in [0] by Leong et al. whee the authos studied elationship between stoage allocation stategy and etieval delay. Ou eseach wok falls unde this effot of optimizing etieval delay fo a distibuted stoage system. As high pefomance easue codes often incu high complexity of computational, low computational complexity easue codes appea advantageous in pactical usage. Among vaious classes of easue codes, fountain codes ae a class that offes flexible edundancy due to its ateless popety and elatively low computational complexity. One popula ealization of fountain codes is Luby Tansfom (LT) codes []. LT codes enjoys elatively low computational complexity of O(k ln(k/δ)). Howeve, to achieve this elatively low computational complexity, additional encoded fagments in the ode of O( k ln (k/δ)) ae needed fo LT decode to achieve a successful decoding pobability of δ. The need fo additional encoded fagments adds stess to the bandwidth and intoduces delay in the etieval. In paticula, to ensue a high pobability of successful decoding pobability, a stoage collecto opeating LT decode equies additional encoded fagments fom the stoage system. Howeve, these additional encoded fagments add delay in stoage etieval, which is citical fo content etieval o downloading applications. Thus a tadeoff between the successful decoding pobability and stoage etieval delay

2 Fig.. Aival pocess of LT encoded packets seen at the potal. Fig.. System Achitectue fo a distibuted data stoage system. exists. In this pape, we study this tadeoff and intoduce a multiple stage stoage etieval scheme whee we show that stoage etieval delay can be educed without sacificing the pefomance on decoding pobability. We futhe demonstate the optimal etieval setup fo the case of a -stage etieval. With this optimal etieval scheme, we believe it will benefit pactical cloud stoage systems though poviding bette QoS in tems of etieval delay. The emainde of this pape is oganized as follows. In Section II, we intoduce the system achitectue and pesent the fomal definition of the optimal etieval scheme poblem. Section III pesents a igoous analysis on the delay fo diffeent etieval scheme togethe with simulation validation. We then demonstate the tadeoff of the delay and pobability of successful decoding in Section IV. Finally, some impotant conclusions ae dawn in Section V. II. SYSTEM ARCHITECTURE AND PROBLEM STATEMENT In this section, we fist pesent a detailed desciption of a distibuted data stoage system, in which LT-encoded data fagments ae spead out acoss a pool of stoage nodes. Following that, we fomulate an optimal file etieval poblem, which aims to minimize the etieval delay by stategically scheduling packet etieval equests. A. System Achitectue We focus on a distibuted data stoage system (e.g., an community-based cloud stoage system as in Tahoe-LAFS []) in which each stoage node stoes both LT fagments o packets and nomal packets fo diffeent contents. As illustated in Fig., the uses can stoe and etieve a file fom the cloud stoage system, via a dedicated potal. When stoing a file into the cloud, the potal encodes the file with the LT code and speads all the encoded fagments acoss diffeent stoage nodes fo eliability. Upon eceiving the file etieval equest, the potal sends a few packet etieval equests to diffeent stoage nodes, and eassemble the list of eceived packets into the file and fowad it to the use. Hee we use the tem packet intechangeably with fagment as we assume that an IP packet caies an LT encoded fagment in the system. We assume that thee is only one use who will equest LT packets. The taffics geneated by the equests fom the est uses ae teated as ambient taffics. Fig. shows a snapshot of the consideed system. B. Taffic Model In the potal, we conside a packet tansmission queue with a fixed pocessing ate of. The ambient taffic aives with an exponential inte-packet time (i.e., an aival ate of λ). The length of packets associated with the ambient taffic is L, which is a andom vaiable with mean l and vaiance σ. Moeove, stoage nodes tansmit LT-encoded packets back to the potal, with an exponential inte-packet aival time (o ate of θ). The length of LT encoded packets is a constant denoted by l LT. To ecove a file of k oiginal packets, the use may equest n encoded packets fom the potal in ode to achieve successful decoding pobability p. Afte the potal eceives the equest fo n LT encoded packets, it etieves these packets fom the stoage nodes. The equested n packets will then aive at the potal at a andom time which follows exponential distibution with a mean of /θ. Accoding to [3], the aival ate of i-th LT packets is (n i +)θ. This aival pocess of LT packets is illustated in Fig.. C. Poblem Statement In the consideed distibuted stoage system, the bottleneck lies on the potal, because a lage numbe of uses can issue thei file equests to the potal. In this pape, we focus on the file etieval delay, defined as the duation between the time fo potal eceiving a LT-encoded file equest and the time fo the last LT packet leaves the potal. We aim to minimize the file etieval delay by stategically scheduling the LT packet equests. The optimal file etieval poblem is stated as follows. We assume a pobabilistic file etieval model. Specifically, in ode to achieve the pobability of successful decoding of p, the potal needs to equest n LT encoded packets. Taditionally, the n packets ae equested in one shot and the potal waits fo all these packets to decode and etieve the file. This scheme is efeed to as an one-stage equest scheme. In this pape, we popose to use a multiple stage equest scheme to impove the file etieval pefomance. Specifically, the potal can divide the equest into t stages, each consisting of equests fo n,n,,n t packets ( i n i = n). If the potal successfully decodes the file at stage m, it will stop equesting the est t i=m+ n i packets. Intuitively, multiple stages of packet etieval incus additional delay in stoage etieval. Inteestingly, we found that

3 3 (a) One stage case (b) Two stage case Fig. 3. Components of delay Simualtion No. of equested packets (a) λ =0,θ = No. of equested packets No. of equested packets Fig. 4. Delay in one stage equest. multiple stages of packet etieval can outpefom a single etieval in tems of delay. This is because in multiple stages of packet etieval, etieving a just adequate numbe of fagments may aleady give sufficiently high success decodability which eliminates the need fo futhe ounds of etieval. In case that the decoding fails, a futhe ound of etieval may take place. By popely configue the multiple stage packet etieval scheme, the gain in delay with a multiple stage etieval outuns the loss due to additional ounds of etieval. We demonstate this by pesenting an optimization of two-stage equest scheme. III. FILE-RETRIEVAL DELAY ANALYSIS We chaacteize the aveage file-etieval delay fo diffeent equest schemes in the pesence of ambient taffic. We use compute simulation to validate ou analytical esults. In simulations, we set that the length of packets in the ambient taffic follows an exponential distibution. Although it is a simplified model, the insights obtained with this simple model can be applied to guide pactical system design. Table I lists the default values of some paametes in the simulato. All the pesented simulation esults in the following sections ae aveaged fom 000 tails. TABLE I DEFAULT VALUES IN SIMULATION Notation l l LT Value 04 bits 04 bits 00 kbps A. Delay Analysis fo One Stage Request Scheme We fist investigate the file-etieval delay D (n) fo n LT packets in the one stage equest case. This delay consists of two pats as shown in Fig. 3(a). The fist pat aises fom the taffic aiving befoe the LT equest and the second pat aises fom the taffic aiving afte the LT equest. The fist pat only contains ambient taffic. The fist pat is teated as a classical M/G/ queue with delay denoted by W. The second pat can be futhe divided into two sub-pats. Fistly, it contains a constant which is the tansmission time of n LT packets, which can be deived as nl LT. The est is the time to pocess the ambient taffics which aive at the potal duing the inteaival time of each LT packet. This pat is denoted by T. Thus, the delay D (n) can be expessed as D (n) =W + nl LT + T. () Taking an expectation on both sides, we obtain E(D (n)) = E(W )+E(T )+ nl LT = λ(σ + l ) ( λ l ) + λl n E(ζi+ ζi )+ nl LT i=0 = Γ+ λl n iθ + nl LT i= Γ+ λl θ (ln(n) + ) + nl LT, () whee Γ is a constant, ζi is aiving time fo the ith LT encoded packet and ζ0 =0. In Fig. 4, we plot the numeical file etieval delay, compaed with the simulation esults, as a function of the numbe of packets equest, fo vaious taffic loads. Notice that the numeical esults match the simulation esults well, veifying the applicability of ou deived file-delay in (). The esults also demonstate that the file-etieval delay gows linealy with the numbe of packets equested.

4 4 B. Delay Analysis fo Multiple Stage Request In this subsection, we fist investigate the file-etieval delay fo the two stage equest scheme. The packet aival pocess is illustated in Fig. 3(b). Suppose in the fist stage, the use equests n LT encoded packets. The delay fo the fist stage is D (n ). Afte decoding these n packets, if the use fails to decode the oiginal file, it continues to equest the n packets. Hee we assume that duing the decoding pocess of n packets, the tansmission queue in the potal has aleady etuned to the steady state. This assumption is easonable since it does take some time fo the use to detemine if the n LT-encoded packets ae decodable. Thus, the delay fo the second stage is identical to the fist stage except fo the numbe of encoded packets the use equests. As a esult, the oveall file-etieval delay fo the two stage equest case is given by D (n,n ) = f(n )D (n ) + ( f(n ))(D (n )+D (n )), (3) whee f(n) is the pobability of successful decoding with n LT encoded packets. The detemination of f(n) is given sepaately in [4] and [5]. Hee we adopt the model intoduced in [5] due to its computational efficiency. In Fig. 5, we plot the successful decoding pobability as a function of the numbe of eceived packets when k =50and k = 00 espectively No. of eceived packets (a) k = No. of eceived packets (b) k = 00 Fig. 5. The pobability of successful decoding as a function of the numbe of eceived LT-encoded packets. Using the esults fom Fig. 5, we can obtain the numbe of equied packets fo a tageted decoding pobability. We plot in Figs. 6-7 the file-etieval delay fo the two-stage equest scheme, as a function of the numbe of packets equested in the fist stage, unde diffeent setting of k, n and taffic loads. Notice that the numeical esults match the simulation esults well, egadless of the taffic load. Moeove, in all esults, the file-etieval delay fist deceases and then inceases as the numbe of packets equested in the fist stage inceases. This consistent tend indicates a potential fo file-etieval delay minimization by choosing an appopiate numbe of packets equested in the fist stage. We shall addess this optimization in Section IV-A. The esult fo the two stage equest scheme can be genealized into abitay t stage equest. Specifically, the delay expession fo t stage equest can be defined ecusively, D t (n,n,,n t ) = ( f(n ))(D (n ) (4) + D t (n,,n t )) + f(n )D (n ), whee the initial values fo D and D ae defined in () and (3). IV. OPTIMAL SCHEDULING FOR PACKET RETRIEVAL In this section, we will fist investigate the optimal scheduling of packet equests to minimize the file-etieval delay fo two-stage equest scheme, and then pesent a fundamental tade-off between the file etieval delay and the pobability of file decodability. A. Optimal Request Scheme The esults in Fig. 6-7 suggest an optimal two stage equest scheme fom (3). Solving the optimization poblem yields the optimal numbe of packets equests in the fist stage fo a twostage equest scheme. In Fig. 8-9, we plot, fo the optimal twostage equest scheme, the atio (n /n) between the numbe of equested packets in the fist stage and the total numbe of packets needed, as a function of the decoding pobability, fo diffeent taffic loads. Fom these figues, we make an obsevation. We see that the optimal potion of packets equested in the fist stage deceases as the taget pobability of successful decoding inceases. This obsevation can be undestood as follows. Fom the aspect of decodability pobability, evey packet contibutes in the decoding pocess. Fom Fig. 5, we see an unequal contibution of each packet to the decodability pobability. The contibution of an additional packet to the decodability pobability is high when the pobability stays at a lowe level. As the pobability pogesses highe, the contibution of each additional packet dops. Notice fom Fig. 4 that delay in one stage equest scheme inceases linealy with the numbe of equested packets. Instead of equesting all the packets equied by the taget decodability pobability at once, equesting a small potion of the numbe of packets needed in the fist stage will geneate a decoding pobability that contibutes most to the final decoding pobability; while the maginal contibution fom the second stage is elatively small. As a esult, a twostage equest scheme helps keep the aveage delay lowe than the one-stage equest scheme. B. Delay-Decodability Tadeoff We now investigate the fundamental tadeoff between the tageted decoding pobability and the file-etieval delay fo diffeent equest schemes. This delay-decodability tadeoff is impotant since it helps uses to make ational equest scheme depending on the equiement of thei applications. Using the esults fom pevious two subsections, we plot the afoementioned tade-off fo the one-stage equest scheme and the two-stage equest schemes, in Fig. 0-, fo diffeent system loads.

5 No. of equest packets in fist stage (a) λ =0,θ = No. of equested packets in fist stage No. of equested packets in fist stage Fig. 6. Delay in two stage equest when k =50and n = No. of equested packets in fist stage No. of equested packets in fist stage No. of equested packets in fist stage (a) λ =0,θ =5 Fig. 7. Delay in two stage equest when k = 00 and n = (a) λ =0,θ = Fig. 8. of numbe of equested LT packets in fist stage when k =50. As obseved in these figues, the delay fo one-stage equest inceases shaply when the decoding pobability cosses 90%. In compaison, fo the two-stage equest scheme, the delay is consistently lowe. This advantage eflects the gain fom being able to decode in the fist stage with an adequate instead of excessive numbe of LT packets. Based on the epoted delay-decodability tadeoff, use can choose an appopiate taget of decodability pobability, i.e. fo some delay sensitive applications like steam video, a lowe decodability pobability can be adopted such that the aveage etieval delay can be maintained unde a cetain theshold. V. CONCLUSION In this pape, we investigate the poblem of optimal file etieval unde a distibuted cloud stoage system. The file is fist LT-encoded and spead out into a list of distibuted stoage nodes. When etieval, the potal schedules the packet equest in a multi-stage manne, with an objective to minimize the aveage file etieval delay. We developed an accuate model to chaacteize the aveage file-etieval delay fo diffeent equest stategies. Using this model, we deived an optimal two stage equest scheme fo a given decoding pobability. Both simulation and numeical esult confim that this optimal scheme can educe the aveage delay damatically. We believe such delay-optimized etieval scheme can benefit pactical distibuted cloud stoage systems though poviding bette QoS in tems of etieval delay. REFERENCES [] Amazon S3.

6 (a) λ =0,θ = Fig. 9. of numbe of equested LT packets in fist stage when k = one stage equest two stage equest. one stage equest two stage equest. one stage equest two stage equest 0.5 (a) λ =0,θ = Fig. 0. Tadeoff between decoding pobability and delay when k = two stage equest one stage equest.5.5 two stage equest one stage equest.5.5 two stage equest one stage equest 0.5 (a) λ =0,θ = Fig.. Tadeoff between decoding pobability and delay when k = 00. [] EMC Atmos Online Stoage. [3] J. Hafne, Weave codes: highly fault toleant easue codes fo stoage systems, in Poc. the 4th confeence on USENIX Confeence on File and Stoage Technologies. USENIX Association, 005, pp [4] J. Plank and L. Xu, Optimizing cauchy Reed-Solomon codes fo faulttoleant netwok stoage applications, in IEEE Int. Symp. Netwok Computing and Applications. IEEE, 006, pp [5] J. L. Cheng Huang, Minghua Chen, Pyamid codes: Flexible schemes to tade space fo access efficiency in eliable data stoage systems, in IEEE Int. Symp. Netwok Computing and Applications. IEEE, 007, pp [6] F. Oggie and A. Datta, Self-epaiing homomophic codes fo distibuted stoage systems, in Poc. IEEE INFOCOM. IEEE, 00, pp [7] M. Sadai, R. Restepo, F. Feki, and E. Soljanin, Memoy allocation in distibuted stoage netwoks, in Poc. Int. Symp. Infomation Theoy ISIT. IEEE, 00, pp [8] D. Leong, A. Dimakis, and T. Ho, Distibuted stoage allocation fo high eliability, in IEEE Int. Confeence on Communications (ICC). IEEE, 00, pp. 6. [9] A. Dimakis, P. Godfey, Y. Wu, M. Wainwight, and K. Ramchandan, Netwok coding fo distibuted stoage systems, Infomation Theoy, IEEE Tansactions on, vol. 56, no. 9, pp , 00. [0] D. Leong, A. Dimakis, and T. Ho, Distibuted stoage allocations fo optimal delay, in Poc. Int. Symp. Infomation Theoy ISIT, 0. [] M. Luby, LT codes, in Poc. 43d Annual IEEE Symp. Foundations of Compute Science, 00, pp [] Z. Wilcox-O Hean and B. Wane, Tahoe: the least-authoity filesystem, in Poceedings of the 4th ACM intenational wokshop on Stoage secuity and suvivability, 008, pp. 6. [3] A. Rényi, On the theoy of ode statistics, Acta Mathematica Hungaica, vol. 4, pp. 9 3, 953. [4] R. Kap, M. Luby, and A. Shokollahi, Finite length analysis of LT codes, in Poc. Int. Symp. Infomation Theoy ISIT, 004, p. 39. [5] E. Maneva and A. Shokollahi, New model fo igoous analysis of LTcodes, in Poc. Int. Symp. Infomation Theoy ISIT, 006, pp

Software Engineering and Development

Software Engineering and Development I T H E A 67 Softwae Engineeing and Development SOFTWARE DEVELOPMENT PROCESS DYNAMICS MODELING AS STATE MACHINE Leonid Lyubchyk, Vasyl Soloshchuk Abstact: Softwae development pocess modeling is gaining

More information

Effect of Contention Window on the Performance of IEEE 802.11 WLANs

Effect of Contention Window on the Performance of IEEE 802.11 WLANs Effect of Contention Window on the Pefomance of IEEE 82.11 WLANs Yunli Chen and Dhama P. Agawal Cente fo Distibuted and Mobile Computing, Depatment of ECECS Univesity of Cincinnati, OH 45221-3 {ychen,

More information

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING

HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING U.P.B. Sci. Bull., Seies C, Vol. 77, Iss. 2, 2015 ISSN 2286-3540 HEALTHCARE INTEGRATION BASED ON CLOUD COMPUTING Roxana MARCU 1, Dan POPESCU 2, Iulian DANILĂ 3 A high numbe of infomation systems ae available

More information

The transport performance evaluation system building of logistics enterprises

The transport performance evaluation system building of logistics enterprises Jounal of Industial Engineeing and Management JIEM, 213 6(4): 194-114 Online ISSN: 213-953 Pint ISSN: 213-8423 http://dx.doi.og/1.3926/jiem.784 The tanspot pefomance evaluation system building of logistics

More information

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing

Questions & Answers Chapter 10 Software Reliability Prediction, Allocation and Demonstration Testing M13914 Questions & Answes Chapte 10 Softwae Reliability Pediction, Allocation and Demonstation Testing 1. Homewok: How to deive the fomula of failue ate estimate. λ = χ α,+ t When the failue times follow

More information

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems

Efficient Redundancy Techniques for Latency Reduction in Cloud Systems Efficient Redundancy Techniques fo Latency Reduction in Cloud Systems 1 Gaui Joshi, Emina Soljanin, and Gegoy Wonell Abstact In cloud computing systems, assigning a task to multiple seves and waiting fo

More information

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS

ON THE (Q, R) POLICY IN PRODUCTION-INVENTORY SYSTEMS ON THE R POLICY IN PRODUCTION-INVENTORY SYSTEMS Saifallah Benjaafa and Joon-Seok Kim Depatment of Mechanical Engineeing Univesity of Minnesota Minneapolis MN 55455 Abstact We conside a poduction-inventoy

More information

High Availability Replication Strategy for Deduplication Storage System

High Availability Replication Strategy for Deduplication Storage System Zhengda Zhou, Jingli Zhou College of Compute Science and Technology, Huazhong Univesity of Science and Technology, *, zhouzd@smail.hust.edu.cn jlzhou@mail.hust.edu.cn Abstact As the amount of digital data

More information

Ilona V. Tregub, ScD., Professor

Ilona V. Tregub, ScD., Professor Investment Potfolio Fomation fo the Pension Fund of Russia Ilona V. egub, ScD., Pofesso Mathematical Modeling of Economic Pocesses Depatment he Financial Univesity unde the Govenment of the Russian Fedeation

More information

An Approach to Optimized Resource Allocation for Cloud Simulation Platform

An Approach to Optimized Resource Allocation for Cloud Simulation Platform An Appoach to Optimized Resouce Allocation fo Cloud Simulation Platfom Haitao Yuan 1, Jing Bi 2, Bo Hu Li 1,3, Xudong Chai 3 1 School of Automation Science and Electical Engineeing, Beihang Univesity,

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations White Pape 48 Revision by Victo Avela > Executive summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance

More information

An Efficient Group Key Agreement Protocol for Ad hoc Networks

An Efficient Group Key Agreement Protocol for Ad hoc Networks An Efficient Goup Key Ageement Potocol fo Ad hoc Netwoks Daniel Augot, Raghav haska, Valéie Issany and Daniele Sacchetti INRIA Rocquencout 78153 Le Chesnay Fance {Daniel.Augot, Raghav.haska, Valéie.Issany,

More information

Secure Smartcard-Based Fingerprint Authentication

Secure Smartcard-Based Fingerprint Authentication Secue Smatcad-Based Fingepint Authentication [full vesion] T. Chales Clancy Compute Science Univesity of Mayland, College Pak tcc@umd.edu Nega Kiyavash, Dennis J. Lin Electical and Compute Engineeing Univesity

More information

Research on Risk Assessment of the Transformer Based on Life Cycle Cost

Research on Risk Assessment of the Transformer Based on Life Cycle Cost ntenational Jounal of Smat Gid and lean Enegy eseach on isk Assessment of the Tansfome Based on Life ycle ost Hui Zhou a, Guowei Wu a, Weiwei Pan a, Yunhe Hou b, hong Wang b * a Zhejiang Electic Powe opoation,

More information

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION

STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION Page 1 STUDENT RESPONSE TO ANNUITY FORMULA DERIVATION C. Alan Blaylock, Hendeson State Univesity ABSTRACT This pape pesents an intuitive appoach to deiving annuity fomulas fo classoom use and attempts

More information

Channel selection in e-commerce age: A strategic analysis of co-op advertising models

Channel selection in e-commerce age: A strategic analysis of co-op advertising models Jounal of Industial Engineeing and Management JIEM, 013 6(1):89-103 Online ISSN: 013-0953 Pint ISSN: 013-843 http://dx.doi.og/10.396/jiem.664 Channel selection in e-commece age: A stategic analysis of

More information

An Epidemic Model of Mobile Phone Virus

An Epidemic Model of Mobile Phone Virus An Epidemic Model of Mobile Phone Vius Hui Zheng, Dong Li, Zhuo Gao 3 Netwok Reseach Cente, Tsinghua Univesity, P. R. China zh@tsinghua.edu.cn School of Compute Science and Technology, Huazhong Univesity

More information

Cloud Service Reliability: Modeling and Analysis

Cloud Service Reliability: Modeling and Analysis Cloud Sevice eliability: Modeling and Analysis Yuan-Shun Dai * a c, Bo Yang b, Jack Dongaa a, Gewei Zhang c a Innovative Computing Laboatoy, Depatment of Electical Engineeing & Compute Science, Univesity

More information

Comparing Availability of Various Rack Power Redundancy Configurations

Comparing Availability of Various Rack Power Redundancy Configurations Compaing Availability of Vaious Rack Powe Redundancy Configuations By Victo Avela White Pape #48 Executive Summay Tansfe switches and dual-path powe distibution to IT equipment ae used to enhance the availability

More information

Energy Efficient Cache Invalidation in a Mobile Environment

Energy Efficient Cache Invalidation in a Mobile Environment Enegy Efficient Cache Invalidation in a Mobile Envionment Naottam Chand, Ramesh Chanda Joshi, Manoj Misa Electonics & Compute Engineeing Depatment Indian Institute of Technology, Rookee - 247 667. INDIA

More information

An Introduction to Omega

An Introduction to Omega An Intoduction to Omega Con Keating and William F. Shadwick These distibutions have the same mean and vaiance. Ae you indiffeent to thei isk-ewad chaacteistics? The Finance Development Cente 2002 1 Fom

More information

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request.

Things to Remember. r Complete all of the sections on the Retirement Benefit Options form that apply to your request. Retiement Benefit 1 Things to Remembe Complete all of the sections on the Retiement Benefit fom that apply to you equest. If this is an initial equest, and not a change in a cuent distibution, emembe to

More information

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN

Modeling and Verifying a Price Model for Congestion Control in Computer Networks Using PROMELA/SPIN Modeling and Veifying a Pice Model fo Congestion Contol in Compute Netwoks Using PROMELA/SPIN Clement Yuen and Wei Tjioe Depatment of Compute Science Univesity of Toonto 1 King s College Road, Toonto,

More information

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN*

Automatic Testing of Neighbor Discovery Protocol Based on FSM and TTCN* Automatic Testing of Neighbo Discovey Potocol Based on FSM and TTCN* Zhiliang Wang, Xia Yin, Haibin Wang, and Jianping Wu Depatment of Compute Science, Tsinghua Univesity Beijing, P. R. China, 100084 Email:

More information

Timing Synchronization in High Mobility OFDM Systems

Timing Synchronization in High Mobility OFDM Systems Timing Synchonization in High Mobility OFDM Systems Yasamin Mostofi Depatment of Electical Engineeing Stanfod Univesity Stanfod, CA 94305, USA Email: yasi@wieless.stanfod.edu Donald C. Cox Depatment of

More information

Over-encryption: Management of Access Control Evolution on Outsourced Data

Over-encryption: Management of Access Control Evolution on Outsourced Data Ove-encyption: Management of Access Contol Evolution on Outsouced Data Sabina De Capitani di Vimecati DTI - Univesità di Milano 26013 Cema - Italy decapita@dti.unimi.it Stefano Paaboschi DIIMM - Univesità

More information

Adaptive Queue Management with Restraint on Non-Responsive Flows

Adaptive Queue Management with Restraint on Non-Responsive Flows Adaptive Queue Management wi Restaint on Non-Responsive Flows Lan Li and Gyungho Lee Depatment of Electical and Compute Engineeing Univesity of Illinois at Chicago 85 S. Mogan Steet Chicago, IL 667 {lli,

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Load Balancing in Processor Sharing Systems

Load Balancing in Processor Sharing Systems Load Balancing in ocesso Shaing Systems Eitan Altman INRIA Sophia Antipolis 2004, oute des Lucioles 06902 Sophia Antipolis, Fance altman@sophia.inia.f Utzi Ayesta LAAS-CNRS Univesité de Toulouse 7, Avenue

More information

Promised Lead-Time Contracts Under Asymmetric Information

Promised Lead-Time Contracts Under Asymmetric Information OPERATIONS RESEARCH Vol. 56, No. 4, July August 28, pp. 898 915 issn 3-364X eissn 1526-5463 8 564 898 infoms doi 1.1287/ope.18.514 28 INFORMS Pomised Lead-Time Contacts Unde Asymmetic Infomation Holly

More information

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods

A framework for the selection of enterprise resource planning (ERP) system based on fuzzy decision making methods A famewok fo the selection of entepise esouce planning (ERP) system based on fuzzy decision making methods Omid Golshan Tafti M.s student in Industial Management, Univesity of Yazd Omidgolshan87@yahoo.com

More information

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors

Tracking/Fusion and Deghosting with Doppler Frequency from Two Passive Acoustic Sensors Tacking/Fusion and Deghosting with Dopple Fequency fom Two Passive Acoustic Sensos Rong Yang, Gee Wah Ng DSO National Laboatoies 2 Science Pak Dive Singapoe 11823 Emails: yong@dso.og.sg, ngeewah@dso.og.sg

More information

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure

Towards Realizing a Low Cost and Highly Available Datacenter Power Infrastructure Towads Realizing a Low Cost and Highly Available Datacente Powe Infastuctue Siam Govindan, Di Wang, Lydia Chen, Anand Sivasubamaniam, and Bhuvan Ugaonka The Pennsylvania State Univesity. IBM Reseach Zuich

More information

Memory-Aware Sizing for In-Memory Databases

Memory-Aware Sizing for In-Memory Databases Memoy-Awae Sizing fo In-Memoy Databases Kasten Molka, Giuliano Casale, Thomas Molka, Laua Mooe Depatment of Computing, Impeial College London, United Kingdom {k.molka3, g.casale}@impeial.ac.uk SAP HANA

More information

Chapter 3 Savings, Present Value and Ricardian Equivalence

Chapter 3 Savings, Present Value and Ricardian Equivalence Chapte 3 Savings, Pesent Value and Ricadian Equivalence Chapte Oveview In the pevious chapte we studied the decision of households to supply hous to the labo maket. This decision was a static decision,

More information

An Analysis of Manufacturer Benefits under Vendor Managed Systems

An Analysis of Manufacturer Benefits under Vendor Managed Systems An Analysis of Manufactue Benefits unde Vendo Managed Systems Seçil Savaşaneil Depatment of Industial Engineeing, Middle East Technical Univesity, 06531, Ankaa, TURKEY secil@ie.metu.edu.t Nesim Ekip 1

More information

Scheduling Hadoop Jobs to Meet Deadlines

Scheduling Hadoop Jobs to Meet Deadlines Scheduling Hadoop Jobs to Meet Deadlines Kamal Kc, Kemafo Anyanwu Depatment of Compute Science Noth Caolina State Univesity {kkc,kogan}@ncsu.edu Abstact Use constaints such as deadlines ae impotant equiements

More information

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates

9:6.4 Sample Questions/Requests for Managing Underwriter Candidates 9:6.4 INITIAL PUBLIC OFFERINGS 9:6.4 Sample Questions/Requests fo Managing Undewite Candidates Recent IPO Expeience Please povide a list of all completed o withdawn IPOs in which you fim has paticipated

More information

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices

Chapter 2 Valiant Load-Balancing: Building Networks That Can Support All Traffic Matrices Chapte 2 Valiant Load-Balancing: Building etwoks That Can Suppot All Taffic Matices Rui Zhang-Shen Abstact This pape is a bief suvey on how Valiant load-balancing (VLB) can be used to build netwoks that

More information

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH

YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH nd INTERNATIONAL TEXTILE, CLOTHING & ESIGN CONFERENCE Magic Wold of Textiles Octobe 03 d to 06 th 004, UBROVNIK, CROATIA YARN PROPERTIES MEASUREMENT: AN OPTICAL APPROACH Jana VOBOROVA; Ashish GARG; Bohuslav

More information

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS

INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS INITIAL MARGIN CALCULATION ON DERIVATIVE MARKETS OPTION VALUATION FORMULAS Vesion:.0 Date: June 0 Disclaime This document is solely intended as infomation fo cleaing membes and othes who ae inteested in

More information

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation

Data Center Demand Response: Avoiding the Coincident Peak via Workload Shifting and Local Generation (213) 1 28 Data Cente Demand Response: Avoiding the Coincident Peak via Wokload Shifting and Local Geneation Zhenhua Liu 1, Adam Wieman 1, Yuan Chen 2, Benjamin Razon 1, Niangjun Chen 1 1 Califonia Institute

More information

Peer-to-Peer File Sharing Game using Correlated Equilibrium

Peer-to-Peer File Sharing Game using Correlated Equilibrium Pee-to-Pee File Shaing Game using Coelated Equilibium Beibei Wang, Zhu Han, and K. J. Ray Liu Depatment of Electical and Compute Engineeing and Institute fo Systems Reseach, Univesity of Mayland, College

More information

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents

Uncertain Version Control in Open Collaborative Editing of Tree-Structured Documents Uncetain Vesion Contol in Open Collaboative Editing of Tee-Stuctued Documents M. Lamine Ba Institut Mines Télécom; Télécom PaisTech; LTCI Pais, Fance mouhamadou.ba@ telecom-paistech.f Talel Abdessalem

More information

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION

METHODOLOGICAL APPROACH TO STRATEGIC PERFORMANCE OPTIMIZATION ETHODOOGICA APPOACH TO STATEGIC PEFOANCE OPTIIZATION ao Hell * Stjepan Vidačić ** Željo Gaača *** eceived: 4. 07. 2009 Peliminay communication Accepted: 5. 0. 2009 UDC 65.02.4 This pape pesents a matix

More information

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa

TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION. Shunqiao Sun, Athina P. Petropulu and Waheed U. Bajwa TARGET ESTIMATION IN COLOCATED MIMO RADAR VIA MATRIX COMPLETION Shunqiao Sun, Athina P. Petopulu and Waheed U. Bajwa Depatment of Electical & Compute Engineeing, Rutges, The State Univesity of New Jesey

More information

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor

Reduced Pattern Training Based on Task Decomposition Using Pattern Distributor > PNN05-P762 < Reduced Patten Taining Based on Task Decomposition Using Patten Distibuto Sheng-Uei Guan, Chunyu Bao, and TseNgee Neo Abstact Task Decomposition with Patten Distibuto (PD) is a new task

More information

Towards Automatic Update of Access Control Policy

Towards Automatic Update of Access Control Policy Towads Automatic Update of Access Contol Policy Jinwei Hu, Yan Zhang, and Ruixuan Li Intelligent Systems Laboatoy, School of Computing and Mathematics Univesity of Westen Sydney, Sydney 1797, Austalia

More information

Continuous Compounding and Annualization

Continuous Compounding and Annualization Continuous Compounding and Annualization Philip A. Viton Januay 11, 2006 Contents 1 Intoduction 1 2 Continuous Compounding 2 3 Pesent Value with Continuous Compounding 4 4 Annualization 5 5 A Special Poblem

More information

A Comparative Analysis of Data Center Network Architectures

A Comparative Analysis of Data Center Network Architectures A Compaative Analysis of Data Cente Netwok Achitectues Fan Yao, Jingxin Wu, Guu Venkataamani, Suesh Subamaniam Depatment of Electical and Compute Engineeing, The Geoge Washington Univesity, Washington,

More information

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density

An Infrastructure Cost Evaluation of Single- and Multi-Access Networks with Heterogeneous Traffic Density An Infastuctue Cost Evaluation of Single- and Multi-Access Netwoks with Heteogeneous Taffic Density Andes Fuuskä and Magnus Almgen Wieless Access Netwoks Eicsson Reseach Kista, Sweden [andes.fuuska, magnus.almgen]@eicsson.com

More information

Financing Terms in the EOQ Model

Financing Terms in the EOQ Model Financing Tems in the EOQ Model Habone W. Stuat, J. Columbia Business School New Yok, NY 1007 hws7@columbia.edu August 6, 004 1 Intoduction This note discusses two tems that ae often omitted fom the standad

More information

Strength Analysis and Optimization Design about the key parts of the Robot

Strength Analysis and Optimization Design about the key parts of the Robot Intenational Jounal of Reseach in Engineeing and Science (IJRES) ISSN (Online): 2320-9364, ISSN (Pint): 2320-9356 www.ijes.og Volume 3 Issue 3 ǁ Mach 2015 ǁ PP.25-29 Stength Analysis and Optimization Design

More information

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter

Evaluating the impact of Blade Server and Virtualization Software Technologies on the RIT Datacenter Evaluating the impact of and Vitualization Softwae Technologies on the RIT Datacente Chistophe M Butle Vitual Infastuctue Administato Rocheste Institute of Technology s Datacente Contact: chis.butle@it.edu

More information

Financial Planning and Risk-return profiles

Financial Planning and Risk-return profiles Financial Planning and Risk-etun pofiles Stefan Gaf, Alexande Kling und Jochen Russ Pepint Seies: 2010-16 Fakultät fü Mathematik und Witschaftswissenschaften UNIERSITÄT ULM Financial Planning and Risk-etun

More information

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011

The impact of migration on the provision. of UK public services (SRG.10.039.4) Final Report. December 2011 The impact of migation on the povision of UK public sevices (SRG.10.039.4) Final Repot Decembe 2011 The obustness The obustness of the analysis of the is analysis the esponsibility is the esponsibility

More information

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty

An application of stochastic programming in solving capacity allocation and migration planning problem under uncertainty An application of stochastic pogamming in solving capacity allocation and migation planning poblem unde uncetainty Yin-Yann Chen * and Hsiao-Yao Fan Depatment of Industial Management, National Fomosa Univesity,

More information

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes

Give me all I pay for Execution Guarantees in Electronic Commerce Payment Processes Give me all I pay fo Execution Guaantees in Electonic Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Email: Database Reseach Goup Institute of Infomation Systems ETH Zentum, 8092

More information

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION

THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION IADIS Intenational Confeence Applied Computing 2006 THE DISTRIBUTED LOCATION RESOLUTION PROBLEM AND ITS EFFICIENT SOLUTION Jög Roth Univesity of Hagen 58084 Hagen, Gemany Joeg.Roth@Fenuni-hagen.de ABSTRACT

More information

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system

Electricity transmission network optimization model of supply and demand the case in Taiwan electricity transmission system Electicity tansmission netwok optimization model of supply and demand the case in Taiwan electicity tansmission system Miao-Sheng Chen a Chien-Liang Wang b,c, Sheng-Chuan Wang d,e a Taichung Banch Gaduate

More information

Approximation Algorithms for Data Management in Networks

Approximation Algorithms for Data Management in Networks Appoximation Algoithms fo Data Management in Netwoks Chistof Kick Heinz Nixdof Institute and Depatment of Mathematics & Compute Science adebon Univesity Gemany kueke@upb.de Haald Räcke Heinz Nixdof Institute

More information

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA

SUPPORT VECTOR MACHINE FOR BANDWIDTH ANALYSIS OF SLOTTED MICROSTRIP ANTENNA Intenational Jounal of Compute Science, Systems Engineeing and Infomation Technology, 4(), 20, pp. 67-7 SUPPORT VECTOR MACHIE FOR BADWIDTH AALYSIS OF SLOTTED MICROSTRIP ATEA Venmathi A.R. & Vanitha L.

More information

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011

arxiv:1110.2612v1 [q-fin.st] 12 Oct 2011 Maket inefficiency identified by both single and multiple cuency tends T.Toká 1, and D. Hováth 1, 1 Sos Reseach a.s., Stojáenská 3, 040 01 Košice, Slovak Republic Abstact axiv:1110.2612v1 [q-fin.st] 12

More information

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database

How to recover your Exchange 2003/2007 mailboxes and emails if all you have available are your PRIV1.EDB and PRIV1.STM Information Store database AnswesThatWok TM Recoveing Emails and Mailboxes fom a PRIV1.EDB Exchange 2003 IS database How to ecove you Exchange 2003/2007 mailboxes and emails if all you have available ae you PRIV1.EDB and PRIV1.STM

More information

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers

Concept and Experiences on using a Wiki-based System for Software-related Seminar Papers Concept and Expeiences on using a Wiki-based System fo Softwae-elated Semina Papes Dominik Fanke and Stefan Kowalewski RWTH Aachen Univesity, 52074 Aachen, Gemany, {fanke, kowalewski}@embedded.wth-aachen.de,

More information

Multiband Microstrip Patch Antenna for Microwave Applications

Multiband Microstrip Patch Antenna for Microwave Applications IOSR Jounal of Electonics and Communication Engineeing (IOSR-JECE) ISSN: 2278-2834, ISBN: 2278-8735. Volume 3, Issue 5 (Sep. - Oct. 2012), PP 43-48 Multiband Micostip Patch Antenna fo Micowave Applications

More information

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS

CONCEPTUAL FRAMEWORK FOR DEVELOPING AND VERIFICATION OF ATTRIBUTION MODELS. ARITHMETIC ATTRIBUTION MODELS CONCEPUAL FAMEOK FO DEVELOPING AND VEIFICAION OF AIBUION MODELS. AIHMEIC AIBUION MODELS Yui K. Shestopaloff, is Diecto of eseach & Deelopment at SegmentSoft Inc. He is a Docto of Sciences and has a Ph.D.

More information

Supplementary Material for EpiDiff

Supplementary Material for EpiDiff Supplementay Mateial fo EpiDiff Supplementay Text S1. Pocessing of aw chomatin modification data In ode to obtain the chomatin modification levels in each of the egions submitted by the use QDCMR module

More information

HIGH AVAILABILITY SOLUTION: RESOURCE USAGE MANAGEMENT IN VIRTUALIZED SOFTWARE AGING

HIGH AVAILABILITY SOLUTION: RESOURCE USAGE MANAGEMENT IN VIRTUALIZED SOFTWARE AGING Intenational Jounal o Compute Science & Inomation Technology (IJCSIT) Vol 4, No, June 0 HIGH AVAILAILITY SOLUTION: ESOUCE USAGE MANAGEMENT IN VITUALIZED SOFTWAE AGING Aye Myat Myat aing and Ni La Thein

More information

The Binomial Distribution

The Binomial Distribution The Binomial Distibution A. It would be vey tedious if, evey time we had a slightly diffeent poblem, we had to detemine the pobability distibutions fom scatch. Luckily, thee ae enough similaities between

More information

Optimal Peer Selection in a Free-Market Peer-Resource Economy

Optimal Peer Selection in a Free-Market Peer-Resource Economy Optimal Pee Selection in a Fee-Maket Pee-Resouce Economy Micah Adle, Rakesh Kuma, Keith Ross, Dan Rubenstein, David Tune and David D Yao Dept of Compute Science Univesity of Massachusetts Amhest, MA; Email:

More information

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research

30 H. N. CHIU 1. INTRODUCTION. Recherche opérationnelle/operations Research RAIRO Rech. Opé. (vol. 33, n 1, 1999, pp. 29-45) A GOOD APPROXIMATION OF THE INVENTORY LEVEL IN A(Q ) PERISHABLE INVENTORY SYSTEM (*) by Huan Neng CHIU ( 1 ) Communicated by Shunji OSAKI Abstact. This

More information

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication

Power Monitoring and Control for Electric Home Appliances Based on Power Line Communication I²MTC 2008 IEEE Intenational Instumentation and Measuement Technology Confeence Victoia, Vancouve Island, Canada, May 12 15, 2008 Powe Monitoing and Contol fo Electic Home Appliances Based on Powe Line

More information

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo (

How To Use A Network On A Network With A Powerline (Lan) On A Pcode (Lan On Alan) (Lan For Acedo) (Moe) (Omo) On An Ipo) Or Ipo ( Hubs, Bidges, and Switches Used fo extending LANs in tems of geogaphical coveage, numbe of nodes, administation capabilities, etc. Diffe in egads to: m collision domain isolation m laye at which they opeate

More information

Database Management Systems

Database Management Systems Contents Database Management Systems (COP 5725) D. Makus Schneide Depatment of Compute & Infomation Science & Engineeing (CISE) Database Systems Reseach & Development Cente Couse Syllabus 1 Sping 2012

More information

A Capacitated Commodity Trading Model with Market Power

A Capacitated Commodity Trading Model with Market Power A Capacitated Commodity Tading Model with Maket Powe Victo Matínez-de-Albéniz Josep Maia Vendell Simón IESE Business School, Univesity of Navaa, Av. Peason 1, 08034 Bacelona, Spain VAlbeniz@iese.edu JMVendell@iese.edu

More information

VISCOSITY OF BIO-DIESEL FUELS

VISCOSITY OF BIO-DIESEL FUELS VISCOSITY OF BIO-DIESEL FUELS One of the key assumptions fo ideal gases is that the motion of a given paticle is independent of any othe paticles in the system. With this assumption in place, one can use

More information

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis

Modal Characteristics study of CEM-1 Single-Layer Printed Circuit Board Using Experimental Modal Analysis Available online at www.sciencediect.com Pocedia Engineeing 41 (2012 ) 1360 1366 Intenational Symposium on Robotics and Intelligent Sensos 2012 (IRIS 2012) Modal Chaacteistics study of CEM-1 Single-Laye

More information

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM

ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Computing and Infomatics, Vol. 29, 2010, 537 555 ENABLING INFORMATION GATHERING PATTERNS FOR EMERGENCY RESPONSE WITH THE OPENKNOWLEDGE SYSTEM Gaia Tecaichi, Veonica Rizzi, Mauizio Machese Depatment of

More information

Supply chain information sharing in a macro prediction market

Supply chain information sharing in a macro prediction market Decision Suppot Systems 42 (2006) 944 958 www.elsevie.com/locate/dss Supply chain infomation shaing in a maco pediction maket Zhiling Guo a,, Fang Fang b, Andew B. Whinston c a Depatment of Infomation

More information

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment

Chris J. Skinner The probability of identification: applying ideas from forensic statistics to disclosure risk assessment Chis J. Skinne The pobability of identification: applying ideas fom foensic statistics to disclosue isk assessment Aticle (Accepted vesion) (Refeeed) Oiginal citation: Skinne, Chis J. (2007) The pobability

More information

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes

How Much Should a Firm Borrow. Effect of tax shields. Capital Structure Theory. Capital Structure & Corporate Taxes How Much Should a Fim Boow Chapte 19 Capital Stuctue & Copoate Taxes Financial Risk - Risk to shaeholdes esulting fom the use of debt. Financial Leveage - Incease in the vaiability of shaeholde etuns that

More information

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years.

est using the formula I = Prt, where I is the interest earned, P is the principal, r is the interest rate, and t is the time in years. 9.2 Inteest Objectives 1. Undestand the simple inteest fomula. 2. Use the compound inteest fomula to find futue value. 3. Solve the compound inteest fomula fo diffeent unknowns, such as the pesent value,

More information

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks

An Energy Efficient and Accurate Slot Synchronization Scheme for Wireless Sensor Networks An Enegy Efficient and Accuate Slot Synchonization Scheme fo Wieless Senso Netwoks Lillian Dai Pithwish asu Jason Redi N Technologies, 0 Moulton St., Cambidge, MA 038 ldai@bbn.com pbasu@bbn.com edi@bbn.com

More information

Research Article A Reputation-Based Identity Management Model for Cloud Computing

Research Article A Reputation-Based Identity Management Model for Cloud Computing Mathematical Poblems in Engineeing Volume 2015, Aticle ID 238245, 15 pages http://dx.doi.og/10.1155/2015/238245 Reseach Aticle A Reputation-Based Identity Management Model fo Cloud Computing Lifa Wu, 1

More information

Statistics and Data Analysis

Statistics and Data Analysis Pape 274-25 An Extension to SAS/OR fo Decision System Suppot Ali Emouznead Highe Education Funding Council fo England, Nothavon house, Coldhabou Lane, Bistol, BS16 1QD U.K. ABSTRACT This pape exploes the

More information

Distributed Computing and Big Data: Hadoop and MapReduce

Distributed Computing and Big Data: Hadoop and MapReduce Distibuted Computing and Big Data: Hadoop and Map Bill Keenan, Diecto Tey Heinze, Achitect Thomson Reutes Reseach & Development Agenda R&D Oveview Hadoop and Map Oveview Use Case: Clusteing Legal Documents

More information

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels

Model-Driven Engineering of Adaptation Engines for Self-Adaptive Software: Executable Runtime Megamodels Model-Diven Engineeing of Adaptation Engines fo Self-Adaptive Softwae: Executable Runtime Megamodels Thomas Vogel, Holge Giese Technische Beichte N. 66 des Hasso-Plattne-Instituts fü Softwaesystemtechnik

More information

Referral service and customer incentive in online retail supply Chain

Referral service and customer incentive in online retail supply Chain Refeal sevice and custome incentive in online etail supply Chain Y. G. Chen 1, W. Y. Zhang, S. Q. Yang 3, Z. J. Wang 4 and S. F. Chen 5 1,,3,4 School of Infomation Zhejiang Univesity of Finance and Economics

More information

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis

Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency Network Analysis Send Odes fo Repints to epints@benthamscience.ae 678 The Open Cybenetics & Systemics Jounal, 2015, 9, 678-682 Open Access Analyzing Ballistic Missile Defense System Effectiveness Based on Functional Dependency

More information

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees

Financial Derivatives for Computer Network Capacity Markets with Quality-of-Service Guarantees Financial Deivatives fo Compute Netwok Capacity Makets with Quality-of-Sevice Guaantees Pette Pettesson pp@kth.se Febuay 2003 SICS Technical Repot T2003:03 Keywods Netwoking and Intenet Achitectue. Abstact

More information

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types

A Two-Step Tabu Search Heuristic for Multi-Period Multi-Site Assignment Problem with Joint Requirement of Multiple Resource Types Aticle A Two-Step Tabu Seach Heuistic fo Multi-Peiod Multi-Site Assignment Poblem with Joint Requiement of Multiple Resouce Types Siavit Swangnop and Paveena Chaovalitwongse* Depatment of Industial Engineeing,

More information

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it

How to create RAID 1 mirroring with a hard disk that already has data or an operating system on it AnswesThatWok TM How to set up a RAID1 mio with a dive which aleady has Windows installed How to ceate RAID 1 mioing with a had disk that aleady has data o an opeating system on it Date Company PC / Seve

More information

Review Graph based Online Store Review Spammer Detection

Review Graph based Online Store Review Spammer Detection Review Gaph based Online Stoe Review Spamme Detection Guan Wang, Sihong Xie, Bing Liu, Philip S. Yu Univesity of Illinois at Chicago Chicago, USA gwang26@uic.edu sxie6@uic.edu liub@uic.edu psyu@uic.edu

More information

Unveiling the MPLS Structure on Internet Topology

Unveiling the MPLS Structure on Internet Topology Unveiling the MPLS Stuctue on Intenet Topology Gabiel Davila Revelo, Mauicio Andeson Ricci, Benoit Donnet, José Ignacio Alvaez-Hamelin INTECIN, Facultad de Ingenieía, Univesidad de Buenos Aies Agentina

More information

PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK

PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK PRICING MODEL FOR COMPETING ONLINE AND RETAIL CHANNEL WITH ONLINE BUYING RISK Vaanya Vaanyuwatana Chutikan Anunyavanit Manoat Pinthong Puthapon Jaupash Aussaavut Dumongsii Siinhon Intenational Institute

More information

Mining Relatedness Graphs for Data Integration

Mining Relatedness Graphs for Data Integration Mining Relatedness Gaphs fo Data Integation Jeemy T. Engle (jtengle@indiana.edu) Ying Feng (yingfeng@indiana.edu) Robet L. Goldstone (goldsto@indiana.edu) Indiana Univesity Bloomington, IN. 47405 USA Abstact

More information

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors

who supply the system vectors for their JVM products. 1 HBench:Java will work best with support from JVM vendors Appeaed in the ACM Java Gande 2000 Confeence, San Fancisco, Califonia, June 3-5, 2000 HBench:Java: An Application-Specific Benchmaking Famewok fo Java Vitual Machines Xiaolan Zhang Mago Seltze Division

More information

How To Find The Optimal Stategy For Buying Life Insuance

How To Find The Optimal Stategy For Buying Life Insuance Life Insuance Puchasing to Reach a Bequest Ehan Bayakta Depatment of Mathematics, Univesity of Michigan Ann Abo, Michigan, USA, 48109 S. David Pomislow Depatment of Mathematics, Yok Univesity Toonto, Ontaio,

More information

Semipartial (Part) and Partial Correlation

Semipartial (Part) and Partial Correlation Semipatial (Pat) and Patial Coelation his discussion boows heavily fom Applied Multiple egession/coelation Analysis fo the Behavioal Sciences, by Jacob and Paticia Cohen (975 edition; thee is also an updated

More information