Detecting Compromised Routers via Packet Forwarding Behavior

Size: px
Start display at page:

Download "Detecting Compromised Routers via Packet Forwarding Behavior"

Transcription

1 MIZRAK LAYOUT 2/14/08 4:11 PM Page 2 Detecting Compomised Routes via Packet Fowading Behavio Alpe T. Mizak, VMwae Stefan Savage and Keith Mazullo, UCSD Abstact While it is widely undestood that ciminal misceants ae subveting lage numbes of Intenet-connected computes (e.g., fo bots, spywae, SPAM fowading), it is less well appeciated that Intenet outes ae also being actively tageted and compomised. Indeed, due to its cental ole in end-to-end communication, a compomised oute can be leveaged to empowe a wide ange of diect attacks including eavesdopping, man-in-the-middle subtefuge, and denial of sevice. In esponse, a ange of specialized anomaly detection potocols has been poposed to detect misbehaving packet fowading between outes. This aticle povides a geneal famewok fo undestanding the design space of this wok and eviews the capabilities of vaious detection potocols. I t is widely undestood that the Intenet is awash in theats. The mean time fo a vulneable system to be infiltated once connected to the Intenet is typically measued in minutes. Consequently, most eseach effot in netwok secuity has focused on potecting these end systems o mitigating the impact of thei compomise. Howeve, the Intenet achitectue elies equally stongly on the coect behavio of the intemediate outes that fowad packets, hop by hop, to thei eventual destination. While it is not as widely appeciated, these netwok outes ae also unde attack. Fo example, at the 2005 Black Hat Biefings, Mike Lynn demonstated how Cisco outes can be compomised via simple softwae vulneabilities. Even simple, othes have documented how combinations of social engineeing and weak passwods can and have been used to compomise thousands of Intenet outes, and thee is an undegound maket fo tading access to them [1 4]. Finally, in thei annual suveys of the Intenet netwok secuity opeations community, Abo Netwoks Inc. have epeatedly documented such attacks acoss a ange of Intenet sevice povides (ISPs) [5]. Once a oute has been compomised, the standad command line inteface fom vendos such as Cisco and Junipe can be used to selectively dop packets, delay them o tanspaently tunnel though abitay-thid paty hosts and back again [6, 7]. Togethe these capabilities ae sufficient to selectively eavesdop, deny o degade sevice, o constuct a manin-the-middle attack against any host that eceives sevice though the oute. Thus, a numbe of eseaches have ecently exploed the poblem of detecting such oute compomises as evealed fom thei inconsistent packet fowading behavio. In this aticle we povide a geneal famewok fo undestanding this wok and then study some of the detection potocols [8 11]. This mateial is based upon his dissetation eseach at UCSD. Centalized Failue Detecto via Active Replication The expected behavio of a oute is pedictable: taffic entes a oute and is fowaded on to the next hop towad its destination. Thus, the behavio of a oute can be veified by a failue detecto via an identical eplica of that oute. 1 Fo example, in Fig. 1, a failue detecto is implemented with an identical eplica of the oute. In this scheme the failue detecto obseves oute s input taffic and delives an identical steam of packets to oute. In tun, the failue detecto veifies that the output taffic exiting oute is identical to that leaving oute. If thee is a discepancy, an alam is aised indicating that eithe the monitoed oute is faulty o the failue detecto is faulty. This is an ideal failue detecto fo evealing any anomalous fowading behavios. Howeve, this appoach has a numbe of pactical limitations that make it infeasible to deploy at scale. Complexity of Implementation Fist of all, maintaining state consistency between a oute and its eplica can be highly demanding to enginee. Fo example, a oute will eceive outing updates that cause its fowading tables to be ecomputed. If these fowading tables ae not updated at the same moment on both the oute and its eplica, a tempoay taffic fowading inconsistency may occu. Similaly, a numbe of active queue management schemes make use of andomization to dive thei opeation. Thus, to faithfully eplicate a oute s behavio also equies eplicating its andom numbe steam. 1 This scheme is also called maste-checke, active eplication, o state machine appoach in the liteatue /08/$ IEEE IEEE Netwok Mach/Apil 2008

2 MIZRAK LAYOUT 2/14/08 4:11 PM Page 3 Figue 1. Failue detecto via the active eplica/state machine appoach. Resouce Requiement Futhemoe, to implement a eplica-based failue detecto, as in Fig. 1, equies additional hadwae esouces an identical eplica of each oute and additional communication channels the passive monitos on each oute s input and output links. These can be pohibitively expensive. Reseaches have tied to addess these issues in two ways. Fist, they have developed weake but lighteweight failue detectos via taffic validation: instead of validating the exact taffic that tansits a oute, vaious chaacteistics of the taffic enteing and leaving vaious pats of the netwok can be used fo validation. Second, they have developed distibuted failue detectos that exploit the paticipation of coect outes athe than equiing a sepaate monitoing infastuctue. We fame each of these appoaches in tun below. Taffic Validation Taffic validation is the basis fo detecting anomalous behavio: given taffic enteing a egion of the netwok, and knowing the expected behavio of the outes in the netwok, anomalous behavio is detected when the monitoed taffic leaving that pat of the netwok diffes significantly fom what is expected. Taffic validation can be defined in tems of consevation of taffic. Consevation of Taffic Some popety of the taffic enteing a egion of a netwok must be consistent with the same popety of the taffic leaving that pat of a netwok. Thee ae thee design decisions that must be addessed to implement such a mechanism. Which Popety of the Taffic Is to Be Validated? Upon eceiving a packet, a oute efeences its outing table to detemine the next hop towad the destination, and then fowads the packet. Thus, ideally, the taffic enteing a oute is equal to the taffic leaving that oute. Of couse, packets expeience queuing and pocessing delay, and packets can be lost due to congestion. The most pecise desciption of taffic is itself the exact content of the packets. Howeve, the stoage equiements to buffe all packets (as well as the bandwidth consumed by esending them to implement distibuted detection, discussed late) make this appoach impactical. Instead, one can validate moe concise popeties that appoximate this ideal. Some such popeties ae: Consevation of flow validates the volume of the taffic, theeby detecting maliciously dopped packets. Consevation of content validates the content of the taffic, theeby detecting maliciously modified packets. Consevation of ode validates the ode among the packets that constitute the taffic, theeby detecting maliciously eodeed packets. Consevation of timeliness validates the time behavio of the fowading pocess, theeby detecting maliciously delayed packets. What Taffic Is to Be Monitoed? The potocols can be categoized in vaious ways. Some potocols monito a single packet, while othes monito aggegate taffic. Some potocols ae based on active pobing: they send pobe packets peiodically, while othes deploy a passive appoach that simply monitos existing taffic. What Region of a Netwok Is to Be Monitoed? Vaious existing potocols apply consevation of taffic at diffeent ganulaities in a netwok, including pe inteface, pe oute and pe path segment. A failue detecto based on taffic validation can be almost as effective as one based on active eplication, but thei educed ovehead makes them fa moe pactical. Thus, all the detection potocols examined in this aticle ae based on taffic validation, each epesenting a slightly diffeent point in the design space. In pactice, designing a taffic validation mechanism includes engineeing tade-offs fo each design decision above. Fo example, eal netwoks occasionally lose packets due to congestion; thus, a taffic validation mechanism must distinguish between benign congestive loss and packet losses caused by malicious actions. Distibuted Detection Instead of a centalized failue detecto, as in Fig. 1, most systems appoximate this sevice via a distibuted potocol that elies on the paticipation of uncompomised outes. Undelying this appoach is the obsevation that while a compomised oute can fowad taffic any way it wishes, othe outes have an expectation of how taffic should be fowaded. Thus, as long as taffic taveses neighboing uncompomised outes as well, thee will be sufficient obsevations to detect anomalous behavio. Taffic validation systems implement such a distibuted failue detecto by synchonizing taffic infomation between two o moe outes and then edistibuting this infomation to allow fo detection. Refining this model, a compomised oute can be taffic faulty by fowading taffic in a faulty manne, as well as detection potocol faulty by behaving abitaily with espect to the detection potocol. Both cases should be consideed. Also, moe than one oute may be compomised at a time. We assume that thee is sufficient path divesity between any two uncompomised outes such that they can communicate without tavesing a compomised oute. In a sense this assumption is pedantic, since this assumption is needed to ensue that the communication netwok is not patitioned, and it is impossible to guaantee any netwok communication acoss a patition. We also assume that a host s access oute is not compomised. This is a stong assumption, but necessay: if a host s access oute is compomised, the host is patitioned fom the est of the netwok, and thee is no outing emedy even if an IEEE Netwok Mach/Apil

3 MIZRAK LAYOUT 2/14/08 4:11 PM Page 4 T 1 in T 2 in T n in Figue 2. Failue detecto via a taffic validato pe oute. anomaly is detected. Moeove, fom the standpoint of the netwok such taffic oiginates fom a compomised oute, and theefoe cannot demonstate anomalous fowading behavio. In effect, distibuted detection potocols can only hope to detect anomalous outing between any two pais of uncompomised nodes. Thee is inheently some uncetainty in failue detection since one cannot geneally distinguish between a tue failue and a failue in the failue detecto itself (this is tue even with the idealized active eplication scheme). This abstact limitation manifests in distibuted taffic validation potocols as well. Fo example, suppose oute 1 collects taffic infomation about packets that tavese outes 1 to 2 to 3. Based on the infomation 3 collects, suppose 3 detemines that packets have been dopped between 1 and 2. Unfotunately, 3 cannot distinguish between the case of 1 lying about what packets it sent to 2 and 2 lying about what packets it eceived fom 1. Hence, thee is an inheent lack of pecision in detemining which outes ae compomised. We have failue detectos epot suspicions as path segments, whee a path segment is a sequence of consecutive outes that is a subsequence of a path. 2 Moe specifically, a failue detecto epots a path segment if it suspects a oute in that path segment isbehaving in a faulty manne. This section is a bief summay of the fomal specification pesented in [12]. We efe eades to [12] fo the deivation of the fomal specification. In shot, we cast the poblem as a failue detecto with completeness, accuacy, and pecision popeties. Completeness T 1 out T 2 out T n out 2 Fo example, if a netwok consists of the single path 1, 2, 3, 4, 2, 3 is a path segment, but 1, 3 is not because 1 and 3 ae not adjacent. Wheneve a oute fowads taffic in a faulty manne: If all coect outes eventually suspect that a path segment contains a faulty oute, a failue detecto is stong-complete. If at least one coect oute eventually suspects that a path segment contains a faulty oute, a failue detecto is weakcomplete. Accuacy A failue detecto is accuate if, wheneve a coect oute suspects a path segment, thee is at least one faulty oute in that path segment. Pecision A failue detecto also has a pecision, which is the maximum length of a path segment it suspects. To be useful, a failue detecto must be complete and accuate, and one would pefe a smalle pecision. Implementing such distibuted detection involves tade-offs among pecision, completeness, and the ovehead of monitoing and communication. Vaious detection potocols addess these design decisions in diffeent ways, as we discuss in the next section. Compaed to weak completeness, stong completeness is moe desiable since evey coect oute detects the fault. Given a weak-complete detecto, a stong-complete one can be implemented, but it may not be simple and some pecision would be lost. Fo example, conside that a souce oute s detects a link 1, 2 as faulty. Announcing this detection, the othe coect outes in the netwok have to conside the case that s is faulty as well. On the othe hand, in some cases having a weak-complete detecto is enough fo making a pope esponse. Fo example, elying on souce outing, a oute detecting a failue just computes a new oute excluding the suspected path segment. In the above example, s may only update its own outing table excluding the suspected 1, 2. Case Studies In this section we descibe existing potocols poposed to detect and mitigate attacks on the netwok data plane. We examine both the tade-offs in thei choice of taffic validation mechanisms and the paticula distibuted potocols used to disseminate this infomation. Taffic Validation Pe Route: WATCHERS The most simila appoximation to the failue detecto in Fig. 1 is WATCHERS [8], which detects and isolates faulty outes based on a distibuted netwok monitoing appoach. A faulty oute is defined as one that dops o misoutes packets, o behaves in an abitay manne with espect to the poposed potocol. A consevation of flow pinciple (CoFP) was poposed to detect faulty outes. Basically, CoFP states that the amount of taffic enteing a oute should be equal to the amount of taffic leaving that oute. The taffic validato WATCHERS implements is given in Fig. 2 as a centalized sevice. WATCHERS validates the CoFP of the aggegate taffic enteing into each oute in the netwok. If the diffeence between the volume of the taffic enteing and leaving the oute exceeds a use-defined theshold, a failue is detected and an alam is aised. This theshold is needed to avoid false positives as a esult of congestive packet losses. WATCHERS implements this failue detecto by equiing all the neighboing outes of a oute to synchonize with each othe, count how many bytes they have eceived fom and fowaded to duing an ageed-upon time inteval, distibute snapshots of thei countes to the othes by flooding, and finally, validate the CoFP. If a neighbo oute n can not validate the oute, n announces that the link n, is suspicious, and n, is 4 IEEE Netwok Mach/Apil 2008

4 MIZRAK LAYOUT 2/14/08 4:11 PM Page 5 Link ( 1, 2 ) 1 2 Link ( 2, 3 ) Figue 3. Failue detecto via a taffic validato pe path-segment nodes. emoved fom the outing fabic. In tems of ou specification, WATCHERS is accuate with a pecision of 2. It is not complete as descibed, but can be modified to be stong-complete as explained in [13]. Geneally speaking, thee ae two limitations of WATCHERS: The main dawback of WATCHERS is its estictive theat model: it can only detect malicious packet dops and misoutes. Seveal eseaches [9 11] have subsequently developed potocols with moe geneal taffic validation mechanisms addessing a moe compehensive set of attacks. The achitects of WATCHERS noticed a completeness poblem caused by consoting faulty outes, a poblem fist descibed by Pelman [14]. Faulty outes ae said to be consoting if they launch a coodinated attack and coopeate to hide each othe s malicious behavio. The WATCHERS potocol addessed this issue by equiing each oute to maintain state fo evey neighbo and destination pai in the netwok. Othe potocols have addessed this poblem with a diffeent appoach: validating taffic ove path segments. We discuss this next. Taffic Validation pe Path Segment Nodes: HSER Avamopoulos et al. [9] pesent a potocol called Highly Secue and Efficient Routing (HSER), a combination of souce outing, hop-by-hop authentication, a pioi eseved buffes, sequence numbes, timeouts, end-to-end eliability mechanisms, and fault announcements. While none of these individual mechanisms is novel by itself, it is the combination of them that delives Byzantine obustness and detection. The taffic validato HSER implements is given in Fig. 3 as a centalized sevice. HSER validates the consevation of content popety of a single packet that is monitoed along the path fom the souce to the destination. If any oute along the path discoves that its neighbo has lost o alteed the packet, a failue is detected and an alam is aised. HSER implements its failue detecto by equiing each oute along the path to compute a fingepint fo the monitoed packet, keep a timeout, and finally, validate the consevation of content popety with its neighbos. Upon eceiving a packet, the oute fist validates the authenticity and fowads the packet to the next hop towad the destination. Afte fowading the packet, the oute sets a timeout to the wost case ound-tip time to the destination fom itself. If the authenticity of the packet is not veified o the timeout expies, the oute geneates a fault announcement, including its neighbo and itself, to send back to the souce. HSER elies on souce outing to act on its findings. 3 1 Thus, upon eceiving a fault announcement, the souce oute computes a new oute to the destination excluding the detected link Link ( 3, 4 ) fom its outing fabic. In tems of ou specification, HSER is weak-complete since only the souce detects a failue and accuate with a pecision of 2. Othe potocols based on this appoach ae pesented in [12, 15, 16]. 4 Howeve, the ovehead of this appoach is quite high, since fo evey souce and destination pai, all of the outes along the path must paticipate in the detection potocol. To mitigate this ovehead, othe eseaches poposed two complementay optimizations: Give up pecision by only validating at the end outes of a path segment (i.e., a contiguous sequence of outes on the path), in which case none of the intemediate outes along the path paticipates in detection. Howeve, it also becomes impossible to isolate faults to a fine ganulaity than the length of the path segment being monitoed. Give up accuacy by geneating a sampling schedule and only sampling the chosen packets at end outes of the path segment. While this method significantly deceases ovehead, attacks on unsampled packets cannot be detected. Taffic Validation Pe Path Segment Ends: SecTace SecTace [10] was developed to be a pactical tool fo secuely tacing the path of taffic fom a souce towad a paticula destination. It poceeds hop by hop simila to taceoute: at each ound, the souce validates the taffic between itself and an intemediate oute towad the destination. The taffic validato SecTace implements is given in Fig. 4 as a centalized sevice. SecTace validates the consevation of content popety of the aggegate o sampled taffic 3 between the souce oute and an intemediate oute. If the souce detects a discepancy in the taffic, a failue is detected and an alam is aised. SecTace implements such a failue detecto distibuted in the netwok by equiing only the end outes of the monitoed path segment to synchonize with each othe and to compute fingepints fo the taffic between themselves fo an ageed-upon time inteval. At the end of a ound, the coe- 3 It can adopt both active pobing and passive monitoing appoaches. 2 2 Path segment( 2, 3) Figue 4. Failue detecto via a taffic validato pe path-segment ends IEEE Netwok Mach/Apil

5 MIZRAK LAYOUT 2/14/08 4:11 PM Page 6 T 1 in T 2 in T n in Figue 5. Failue detecto via a taffic validato pe inteface. sponding intemediate oute sends back the infomation it has collected and the identity of the next expected oute towad the destination. Upon eceiving this infomation, the souce oute validates the consevation of content popety: if the souce validates the taffic, it initiates anothe Sec- Tace ound with the next intemediate oute towad the destination; othewise, the souce detects a failue. Fo example, in Fig. 4 a path segment of 1, 2, 3, 4 is monitoed duing the given taffic validation ound, and only the souce 1 and the coesponding intemediate oute 4 implement the distibuted failue detecto. If 1 detects a discepancy in the taffic, a failue is detected and an alam is aised. Eithe one of the intemediate outes { 2, 3 } is taffic faulty, intoducing discepancy into the monitoed taffic, o the failue detecto, which is implemented by 1 and 4, is detection potocol faulty: at least one of { 1, 4 } is faulty. In tems of ou specification, SecTace is weak-complete since only the souce detects a failue and accuate with a pecision of k, whee k is the length of the monitoed path segment. Howeve, this accuacy is pedicated on the assumption that malicious actions ae consistent ove time and not Byzantine. Fo example, in Fig. 4, if 1 could not validate the taffic with 4, it would detect 3, 4 as faulty. The easoning behind this appoach is that 1 was able to validate the same taffic up to the upsteam neighbo 3 in the pevious validation ound, so eithe 3 o 4 must be faulty, intoducing taffic discepancy. Howeve, if faulty outes can modify thei behavio, this assumption violates the accuacy popety. Fo example, assume that oute 2 is faulty, but only altes taffic afte 1 completes a validation ound with 3. Consequently, 3, 4 would be identified as faulty, while both 3 and 4 ae coect. To addess this poblem, the authos popose to give occasional indications of SecTace activity, such as by continuously sending ound initialization packets petending to monito the taffic, while in eality doing nothing. Finally, they popose thee diffeent countemeasues in esponse to a detected failue: The souce ties to oute the taffic aound the detected link using souce outing. The souce notifies the downsteam outes, expecting them Q Q T n out to make the appopiate outing adjustments avoiding the suspected outes. The souce alets the administato of the suspected outes. Othe potocols based on this appoach ae pesented in [12, 17 21]. Taffic Validation pe Inteface: Potocol χ Unfotunately, it is quite challenging to attibute a missing packet to a malicious action because moden IP netwoks outinely dop packets when the load tempoaily exceeds a oute s buffeing capacity. Almost all detection potocols have tied to addess this poblem using a usedefined theshold. Unfotunately, using such a theshold will necessaily ceate unnecessay false positives o mask highly focused attacks. One exception is Potocol χ [11], which dynamically infes the numbe of congestive packet losses that will occu based on measued taffic ates and buffe sizes. Once the ambiguity fom congestion is emoved, subsequent packet losses can be attibuted to malicious actions based on one of the pevious taffic validation mechanisms. The taffic validato Potocol χ implements is given in Fig. 5 as a centalized sevice. Potocol χ validates the consevation of timeliness popety fo aggegate taffic enteing each inteface of a oute in the netwok. If a packet loss occus when the monitoed inteface s queue is not pedicted to be full, a failue is detected and an alam is aised. Potocol χ implements such a failue detecto distibuted in the netwok by equiing each neighbo of a oute to synchonize with each othe, compute a fingepint with a timestamp fo each packet that passes though the inteface Q duing an ageed-upon time inteval, distibute these infomation among the othe neighboing outes, and finally, validate the consevation of timeliness popety of the taffic by simulating the behavio of the monitoed inteface queue. If a neighbo oute n detects that oute dops a packet when the coesponding queue is not full, n announces that link n, is suspicious, and n, is emoved fom the outing fabic. In tems of ou specification, Potocol χ is stong-complete and accuate with a pecision of 2. Potocol χ can be extended to addess the poblem of adjacent consoting faulty outes by monitoing evey output intefaces of the neighbos k hops away and disseminating the taffic infomation to all neighbos within diamete hops. Howeve, this appoach can also add significant additional communications ovehead when netwoks ae densely connected (as descibed in [12]). The detection potocol in [22] is also based on this appoach. Conclusion In this aticle we have descibed a geneal famewok fo undestanding the liteatue on detecting malicious outes via packet fowading behavio. We have descibed how taffic validation is the basis fo all such schemes, and distibuted pe-oute validation is a simple appoximation to an idealized detecto. Howeve, due to the theat of consoting faulty outes (i.e., multiple outes on a path have been compomised), pactical systems ae limited to validating path segments athe than individual outes. Within this appoach thee is a tade-off between pecision and ovehead depending on the span of a segment and most potocols have chosen to exploe the lowe ovehead pat of this design space. Finally, all potocols ae subject to noise due to conges- 6 IEEE Netwok Mach/Apil 2008

6 MIZRAK LAYOUT 2/14/08 4:11 PM Page 7 tive packet loss, which is difficult to distinguish fom malicious dopping. While pe-inteface techniques can diffeentiate between these conditions, it comes at the expense of high ovehead. Fo in-depth analysis of these potocols and futhe issues, the eades ae efeed to [23]. In a shot time thee have been significant advances in this domain, and while none of these potocols has yet been deployed in a poduction netwok, they ae quickly becoming cheap enough and pecise enough to be a viable option against oute-oiented attacks. Refeences [1] R. Thomas, ISP Secuity BOF, NANOG28, June 2003, og/mtg-0306/pdf/thomas.pdf [2] X. Ao, DIMACS Repot: Wokshop on Lage Scale Intenet Attacks, Nov [3] M. Wolfgang, Exploiting Cisco Routes, Sept. 2003, [4] M. Ahaoni and W. M. Hidalgo, Cisco SNMP Configuation Attack with a GRE Tunnel, Sept. 2005, [5] D. McPheson and C. Labovitz, Woldwide Infastuctue Secuity Repot, Sept. 2006, [6] Gauis, Things to Do in Ciscoland When You e Dead, Jan. 2000, [7] D. Taylo, Using a Compomised Route to Captue Netwok Taffic, unpublished tech. ep., July [8] K. A. Badley et al., Detecting Disuptive Routes: A Distibuted Netwok Monitoing Appoach, Poc. IEEE Symp. Sec.and Pivacy, May 1998, pp [9] I. Avamopoulos et al., Highly Secue and Efficient Routing, INFOCOM 04, Amendment, Feb [10] V. N. Padmanabhan and D. R. Simon, Secue Taceoute to Detect Faulty o Malicious Routing, SIGCOMM Comp. Commun. Rev., vol. 33, no. 1, 2003, pp [11] A. T. Mizak, K. Mazullo, and S. Savage, Detecting Malicious Packet Losses, UCSD, tech. ep. CS , Ap [12] A. T. Mizak et al., Detecting and Isolating Malicious Routes, IEEE Tans. Dependable and Secue Computing, vol. 3, no. 3, July. Sept. 2006, pp [13] A. T. Mizak, K. Mazullo, and S. Savage, Detecting Malicious Routes, UCSD, tech. ep. CS , May [14] R. Pelman, Netwok Laye Potocols with Byzantine Robustness, Ph.D. dissetation, MIT LCS TR-429, Oct [15] K. Agyaki et al., Poviding Packet Obituaies, Poc. ACM SIGCOMM HotNets-III, [16] A. Hezbeg and S. Kutten, Ealy Detection of Message Fowading Faults, SIAM J. Comp., vol. 30, no. 4, 2000, pp [17] B. Awebuchet al., An On-Demand Secue Routing Potocol Resilient to Byzantine Failues, ACM Wksp. Wieless Sec., Sept [18] I. Avamopoulos and J. Rexfod, Stealth Pobing: Efficient Data-Plane Secuity fo IP Routing, Poc. USENIX Annual Tech. Conf., May June [19] S. Lee, T. Wong, and H. S. Kim, Secue Split Assignment Tajectoy Sampling: A Malicious Route Detection System, Poc. IEEE DSN 06, June 2006, pp [20] D. Wendlandt et al., Don t Secue Routing Potocols, Secue Data Delivey, Poc. 5th ACM Wksp. Hot Topics in Netwoks Nov [21] S. Goldbeg et al., Measuing Path Quality in the Pesence of Advesaies: The Role of Cyptogaphy in Netwok Accountability, Pinceton Univ., tech. ep., [22] W. Zhang et al., Secue Routing in Ad Hoc Netwoks and a Related Intusion Detection Poblem, IEEE MILCOM, [23] A. T. Mizak, Detecting Malicious Routes, Ph.D. dissetation, UCSD, Sept Biogaphies ALPER T. MIZRAK [SM] (amizak@cs.ucsd.edu) eceived a B.S. degee in compute engineeing fom Bilkent Univesity, Ankaa, Tukey, in 2000 and a Ph.D. degee in compute science fom the Univesity of Califonia, San Diego, in He is a senio membe of technical staff at VMwae. His eseach inteests ae compute netwoks and fault-toleant distibuted systems. Univesity of Califonia, San Diego whee he has been since He woks on both theoetical and pactical issues of fault-toleant distibuted computing in vaious domains, including gid computing, mobile computing, and clustes. STEFAN SAVAGE [M] eceived a B.S. degee in applied histoy fom Canegie- Mellon Univesity and a PhD degee in compute science and engineeing fom the Univesity of Washington. He is an associate pofesso of compute science and engineeing at the Univesity of Califonia, San Diego, and cuently seves as diecto of the Coopeative Cente fo Intenet Epidemiology and Defenses (CCIED), a joint poject between UCSD and the Intenational Compute Science Institute. His eseach inteests lie at the intesection of opeating systems, netwoking, and compute secuity. KEITH MARZULLO [M] eceived a Ph.D. degee fom Stanfod Univesity in He is a pofesso in the Compute Science and Engineeing Depatment at the IEEE Netwok Mach/Apil

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION

MULTI-AGENT SYSTEM FOR NETWORK ATTACK DETECTION Intenational Jounal of Civil Engineeing and Technology (IJCIET) Volume 9, Issue 6, June 2018, pp. 279 286, Aticle ID: IJCIET_09_06_032 Available online at http://www.iaeme.com/ijciet/issues.asp?jtype=ijciet&vtype=9&itype=6

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

On Error Estimation in Runge-Kutta Methods

On Error Estimation in Runge-Kutta Methods Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson

DEADLOCK AVOIDANCE IN BATCH PROCESSES. M. Tittus K. Åkesson DEADLOCK AVOIDANCE IN BATCH PROCESSES M. Tittus K. Åkesson Univesity College Boås, Sweden, e-mail: Michael.Tittus@hb.se Chalmes Univesity of Technology, Gothenbug, Sweden, e-mail: ka@s2.chalmes.se Abstact:

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

Automatic Generation of Reliable E Commerce Payment Processes

Automatic Generation of Reliable E Commerce Payment Processes Infomation Systems Engineeing (WISE 2000), Hong Kong, China, June 2000. Automatic Geneation of Reliable E Commece Payment Pocesses Heiko Schuldt Andei Popovici Hans-Jög Schek Institute of Infomation Systems

More information

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing

Dynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Advances in Automobile Engineering

Advances in Automobile Engineering nadvances in Automobile E gineeing ISSN: 2167-7670 Advances in Automobile Engineeing Kabi, 2012, 1:3 DOI: 10.4172/2167-7670.1000101 Reseach Aticle Open Access Netwok Achitectue of a Moden Automotive Infotainment

More information

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters

Comparisons of Transient Analytical Methods for Determining Hydraulic Conductivity Using Disc Permeameters Compaisons of Tansient Analytical Methods fo Detemining Hydaulic Conductivity Using Disc Pemeametes 1,,3 Cook, F.J. 1 CSRO Land and Wate, ndoooopilly, Queensland The Univesity of Queensland, St Lucia,

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users

Loss-Cognizant Pricing in Feed-Forward Networks with Greedy Users Loss-Cognizant Picing in Feed-Fowad Netwoks with Geedy Uses Ashaf Al Daoud and Muat Alanyali Depatment of Electical and Compute Engineeing Boston Univesity, Boston, MA 02215 Email: {ashaf, alanyali}@bu.edu

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen

Accurate Diffraction Efficiency Control for Multiplexed Volume Holographic Gratings. Xuliang Han, Gicherl Kim, and Ray T. Chen Accuate Diffaction Efficiency Contol fo Multiplexed Volume Hologaphic Gatings Xuliang Han, Gichel Kim, and Ray T. Chen Micoelectonic Reseach Cente Depatment of Electical and Compute Engineeing Univesity

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

View Synthesis using Depth Map for 3D Video

View Synthesis using Depth Map for 3D Video View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network

An Efficient Handover Mechanism Using the General Switch Management Protocol on a Multi-Protocol Label Switching Network An Efficient andove Mechanism Using the Geneal Switch Management Potocol on a Multi-Potocol abel Switching Netwok Seong Gon hoi, yun Joo Kang, and Jun Kyun hoi Using the geneal switch management potocol

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba

Persistent Memory what developers need to know Mark Carlson Co-chair SNIA Technical Council Toshiba Pesistent Memoy what developes need to know Mak Calson Co-chai SNIA Technical Council Toshiba 2018 Stoage Develope Confeence EMEA. All Rights Reseved. 1 Contents Welcome Pesistent Memoy Oveview Non-Volatile

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Secure Collaboration in Mediator-Free Environments

Secure Collaboration in Mediator-Free Environments Secue Collaboation in Mediato-Fee Envionments Mohamed Shehab School of Electical and Compute Engineeing Pudue Univesity West Lafayette, IN, USA shehab@pudueedu Elisa Betino Depatment of Compute Sciences

More information

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences

Generalized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute

More information

Time-Constrained Big Data Transfer for SDN-Enabled Smart City

Time-Constrained Big Data Transfer for SDN-Enabled Smart City Emeging Tends, Issues, and Challenges in Big Data and Its Implementation towad Futue Smat Cities Time-Constained Big Data Tansfe fo SDN-Enabled Smat City Yuanguo Bi, Chuan Lin, Haibo Zhou, Peng Yang, Xuemin

More information

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j

UCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE

APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE APPLICATION OF STRUCTURED QUEUING NETWORKS IN QOS ESTIMITION OF TELECOMMUNICATION SERVICE 1 YAROSLAVTSEV A.F., 2 Al-THUNEIBAT S.A., 3 AL TAWALBEH N.A 1 Depatment of Netwoking, SSUTI, Novosibisk, Russia

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes

On the Conversion between Binary Code and Binary-Reflected Gray Code on Boolean Cubes On the Convesion between Binay Code and BinayReflected Gay Code on Boolean Cubes The Havad community has made this aticle openly available. Please shae how this access benefits you. You stoy mattes Citation

More information

Modeling spatially-correlated data of sensor networks with irregular topologies

Modeling spatially-correlated data of sensor networks with irregular topologies This full text pape was pee eviewed at the diection of IEEE Communications Society subject matte expets fo publication in the IEEE SECON 25 poceedings Modeling spatially-coelated data of senso netwoks

More information

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2

= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2 Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used

More information

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks

Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks Chaacteizing Data Deliveability of Geedy Routing in Wieless Senso Netwoks Jinwei Liu, Lei Yu, Haiying Shen, Yangyang He and Jason Hallstom Depatment of Electical and Compute Engineeing, Clemson Univesity,

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples

Multi-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits

More information

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform

A Shape-preserving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonuniform Fuzzification Transform A Shape-peseving Affine Takagi-Sugeno Model Based on a Piecewise Constant Nonunifom Fuzzification Tansfom Felipe Fenández, Julio Gutiéez, Juan Calos Cespo and Gacián Tiviño Dep. Tecnología Fotónica, Facultad

More information

FACE VECTORS OF FLAG COMPLEXES

FACE VECTORS OF FLAG COMPLEXES FACE VECTORS OF FLAG COMPLEXES ANDY FROHMADER Abstact. A conjectue of Kalai and Eckhoff that the face vecto of an abitay flag complex is also the face vecto of some paticula balanced complex is veified.

More information

Also available at ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010)

Also available at  ISSN (printed edn.), ISSN (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) Also available at http://amc.imfm.si ISSN 1855-3966 (pinted edn.), ISSN 1855-3974 (electonic edn.) ARS MATHEMATICA CONTEMPORANEA 3 (2010) 109 120 Fulleene patches I Jack E. Gave Syacuse Univesity, Depatment

More information

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1

Improvement of First-order Takagi-Sugeno Models Using Local Uniform B-splines 1 Impovement of Fist-ode Takagi-Sugeno Models Using Local Unifom B-splines Felipe Fenández, Julio Gutiéez, Gacián Tiviño and Juan Calos Cespo Dep. Tecnología Fotónica, Facultad de Infomática Univesidad Politécnica

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Signal integrity analysis and physically based circuit extraction of a mounted

Signal integrity analysis and physically based circuit extraction of a mounted emc design & softwae Signal integity analysis and physically based cicuit extaction of a mounted SMA connecto A poposed geneal appoach is given fo the definition of an equivalent cicuit with SMAs mounted

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

On Adaptive Bandwidth Sharing with Rate Guarantees

On Adaptive Bandwidth Sharing with Rate Guarantees On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ

More information

Automatically Testing Interacting Software Components

Automatically Testing Interacting Software Components Automatically Testing Inteacting Softwae Components Leonad Gallaghe Infomation Technology Laboatoy National Institute of Standads and Technology Gaithesbug, MD 20899, USA lgallaghe@nist.gov Jeff Offutt

More information

Ethernet PON (epon): Design and Analysis of an Optical Access Network.

Ethernet PON (epon): Design and Analysis of an Optical Access Network. Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

5 4 THE BERNOULLI EQUATION

5 4 THE BERNOULLI EQUATION 185 CHATER 5 the suounding ai). The fictional wok tem w fiction is often expessed as e loss to epesent the loss (convesion) of mechanical into themal. Fo the idealied case of fictionless motion, the last

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking

Cryptanalysis of Hwang-Chang s a Time-Stamp Protocol for Digital Watermarking Cyptanalysis of Hwang-Chang s a Time-Stamp Potocol fo Digital Watemaking *Jue-Sam Chou, Yalin Chen 2, Chung-Ju Chan 3 Depatment of Infomation Management, Nanhua Univesity Chiayi 622 Taiwan, R.O.C *: coesponding

More information

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces

A Family of Distributed Deadlock Avoidance Protocols and their Reachable State Spaces A Family of Distibuted Deadlock Avoidance Potocols and thei Reachable State Spaces Césa Sánchez, Henny B. Sipma, and Zoha Manna Compute Science Depatment Stanfod Univesity, Stanfod, CA 94305-9025 {cesa,sipma,manna}@cs.stanfod.edu

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery

Conservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in

More information

Annales UMCS Informatica AI 2 (2004) UMCS

Annales UMCS Informatica AI 2 (2004) UMCS Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information