Trust-based Service Management of Mobile Devices in Ad Hoc Networks

Size: px
Start display at page:

Download "Trust-based Service Management of Mobile Devices in Ad Hoc Networks"

Transcription

1 Trus-based Service Managemen of Mobile Devices in Ad Hoc Neworks Yaing Wang, Ing-Ray Chen Virginia Tech Deparmen of Compuer Science Falls Church, VA, USA {yaingw, Jin-Hee Cho U.S. Army Research Laboraory Compuaional and Informaion Sciences Direcorae Adelphi, MD, USA Absrac Wih he proliferaion of fairly powerful mobile devices and ubiquious wireless echnology, radiional mobile ad hoc neworks (MANETs) now migrae ino a new era of service oriened MANETs wherein a mobile device can provide and receive service from oher mobile devices i encouners and ineracs wih. We discuss our ongoing research effors in rus managemen and rus-based algorihm design for service-oriened MANET applicaions o answer he challenges of MANET environmens, including no cenralized auhoriy, dynamically changing opology, limied bandwidh and baery power, limied observaions, unreliable communicaion, and he presence of malicious nodes who ac o break he sysem funcionaliy as well as selfish nodes who ac o maximize heir own gain. We also highligh key ideas and experiences learned, and provide fuure research direcions. Keywords-service-oriened mobile ad hoc neworks; muliobjecive opimizaion; rus; performance analysis. I. INTRODUCTION An auonomous service-oriened mobile ad hoc nework (MANET) is populaed wih service providers (SPs) and service requesers (SRs). A realizaion of service-oriened MANETs is a web-based peer-o-peer service sysem wih mobile nodes providing web services and users (hrough heir mobile devices) invoking web services. Unlike a web service sysem in which nodes are conneced o he Inerne, nodes in service-oriened MANETs are mobile and he communicaion beween peers no wihin radio range is muli-hop wih nodes in he sysem serving as rouers. One can view a service-oriened MANET as an insance of Inerne of Things (IoT) sysems [7] wih a wide range of mobile applicaions including smar-ciy, smar ourism, smar car, smar environmenal monioring, and healhcare [1]. I is paricularly suiable o miliary applicaions where all nodes are mobile wih muli-hop communicaion. This paper discusses our ongoing research work in rus managemen and rus-based algorihm design for serviceoriened MANETs, key ideas and experiences learned, and fuure research direcions. Our aims are o (1) idenify rus dimensions for service-oriened MANET applicaions; (2) develop an efficien and effecive rus proocol for serviceoriened MANETs; and (3) develop efficien and effecive rus-based algorihms for a se of service-oriened MANET applicaions. The overarching principle is he design noion of adapive conrol, allowing rus compuaion, aggregaion, propagaion, formaion (ou of muliple rus dimensions) and updae decisions o be dynamically adjused o minimize rus bias and maximize applicaion performance. This goal is o be achieved in he presence of malicious mobile devices performing a wide range of aacks, including bad-mouhing, ballo-suffing, packe dropping, opporunisic service, selfpromoion, conflicing behavior, and on-off service aacks for personal gain. The res of he paper is organized as follows. Secion II discusses relaed work. Secion III discusses he hrea model for service-oriened MANETs. Secion IV presens our soluions oward rus managemen of mobile devices in service oriened MANETs. Secion V presens our soluions oward rus-based service managemen for performance opimizaion of service-oriened MANET applicaions. Secion VI summarizes key research ideas and experiences learned. Finally, Secion VII concludes he paper and oulines fuure research direcions. II. RELATED WORK Many exising rus models for predicing rus are based on Bayesian inference [3]. Bayesian inference reas rus as a random variable following a probabiliy disribuion (e.g., Bea disribuion) wih is model parameers being updaed upon new observaions. A shorcoming of Bayesian inference is ha rus value does no reveal he uncerainy of rus since i is jus a mean. For example, he same rus value can be given o wo nodes despie one node was observed for jus 2 imes, while he oher node was observed for 20 imes. Belief heory or subjecive logic rus models [9] have been proposed o remedy he problem menioned above, by inroducing uncerainy ino rus calculaion. Fuzzy logic based rus models are also well sudied in he lieraure [12]. Insead of using a binary se, a membership funcion is defined indicaing he degree o which a node is considered rusworhy. Relaive o he works cied above based on Bayesian inference, belief heory, or fuzzy logic, we ake an enirely differen approach. Our roo is in saisical analysis. We develop a regression-based rus model o learn he behavior paern of a SP, aking conex informaion ino consideraion o esimae he reliabiliy rus of a SP ha is seleced by a SR o execue a service reques under a paricular environmen conex. A significan amoun of work has been done in he area of rus-based defenses agains aacks in MANETs [13]- [18], [35]-[38]. A common drawback is ha dynamically uning rus parameers may perform poorly when a node

2 does no have enough self-observaion experiences wih oher nodes in MANET environmens and mus rely on recommendaions. Differen from he works cied above, we advocae he use a robus saisical kernel o olerae false recommendaions o effecively achieve resiliency agains recommendaion aacks. Also unlike exising work, our goal is no o idenify bad SPs, bu o predic wheher a SP, wheher good or bad, can provide good service, given a se of conex variables characerizing he MANET operaional environmen, including dynamically changing opology, limied bandwidh, baery power, and unreliable communicaion. In our approach, a SR learns and predics a SP s service behavior aking conex informaion ino consideraion, insead of jus judging a SP s rusworhiness from self-observaions or recommendaions received, as having been done in exising works. III. THREAT MODEL Jus like Inerne-based web services, in a serviceoriened MANET here are malicious SPs acing for heir own gain. The common goal of malicious nodes is o increase heir chance of being seleced for providing service. Malicious nodes can collude o achieve his common goal. We consider he following malicious aacks in our research: 1. Bad-mouhing aacks: a malicious node can ruin he rus of a good node (by providing bad recommendaions agains i) so as o decrease he chance of ha node being seleced for service. This is a form of collusion recommendaion aacks, i.e., a malicious node can collaborae wih oher malicious nodes o ruin he rus of a good node. 2. Ballo-suffing aacks: a malicious node can boos he rus of anoher malicious node (by providing good recommendaions) so as o increase he chance of ha malicious node being seleced as a SP. This is anoher form of collusion recommendaion aacks, i.e., a malicious node can collaborae wih oher malicious nodes o boos he rus of each oher. 3. Packe-dropping aacks: when serving as a packe relaying node, a malicious node can delay forwarding or simply drop daa packes o ruin he rus of he source node. 4. Opporunisic service aacks: a malicious node can provide good service o gain high repuaion when i senses is rus saus is low, and can provide bad service when i senses is rus saus is high. 5. Self-promoion aacks: A malicious node can boos is service qualiy informaion so as o increase is chance of being seleced as a SP. 6. Conflicing behavior aacks: a malicious node can selecively provide saisfacory service for some SRs while unsaisfacory for ohers. Here, we noe ha a node s bes service qualiy is dicaed by he environmenal and operaional condiions a he ime a service reques is issued. Therefore, a malicious node can only perform conflicing behavior aacks wih a service qualiy no exceeding is bes service qualiy. 7. On-off aacks: insead of always performing is bes service, a malicious node can perform bad service. Wih on-off aacks, a malicious node performs bad service on and off (or randomly) so as o avoid being labeled as a low rus node and risk iself no being seleced as a SP, as well as no being able o effecively perform badmouhing and ballo-suffing aacks. One can view onoff aacks as random aacks. A malicious node may also perform daa modificaion aacks o ruin he repuaion of a good node. We assume daa/source auhenicaion echniques based on PKI can preven such aacks. A malicious node may also jam he communicaion channel or perform denial of service (DoS) aacks o overwhelm a SP. We assume ha sandard inrusion deecion echniques [8] are in place o miigae such aacks. IV. TRUST MANAGEMENT One challenge for implemening rus managemen in service-oriened MANETs is o reliably esimae he rus levels of SPs in a fully disribued manner, in conras wih an e-commerce sysem wih a cenralized auhoriy for rus managemen. Mos exising works ake direc evidence for direc rus assessmen and propagaes is observaions o oher nodes as recommendaions for indirec rus assessmen. However, a malicious node may violae his proocol. Furher, rus managemen of mobile devices mus ake service conex informaion ino consideraion. Such service conex informaion includes he curren capabiliy of a SP (e.g., energy saus), he service environmen (e.g., congesed wireless raffic), he ideniy of he SR (e.g., a friend or a sranger), he payoff obained (which is applicaion-dependen), and he service cos (e.g., energy consumed). All hese facors are called conex variables based on which he service behavior of a node forms a paern. The key o effecive rus managemen is herefore o learn he service behavior paern of a node oward hese conex variables. The behavior paern learned can be used o assess he reliabiliy rus [3] of a SP when i is seleced o service a reques in a paricular conex sae characerized by hese conex variables. More specifically, wihin a specific ype of service, SR i s observaion s ii a ime of he service qualiy received from SP j is eiher saisfacory or unsaisfacory. If he service qualiy is saisfacory, hen s ii =1 and SP j is considered rusworhy; oherwise, s ii =0 and SP j is considered unrusworhy. Le he operaional and environmenal condiions a ime be characerized by a se of disinc conex variables deemed appropriae for an applicaion, denoed by a column vecor x = [x 0,, x m ], where x i represens he ih conex variable. Then, reliabiliy rus or jus rus for shor is he probabiliy ha SP j is capable of providing saisfacory service under he operaional and environmen condiions a ime described by he conex variable se x. Le k (k i) be a recommender who had a prior service experience wih SP j and is asked by SR i o provide is feedback regarding SP j. The recommendaion from node k is in he form of [x, s kk ] specifying he specific operaional and environmenal conex condiions in x under which he

3 observaion in s kk was made. For noaional conveniences, le S ii = s 0 ii,, s n ii, i j, denoe he cumulaive evidence gahered by SR i regarding SP j s service qualiy over [ 0, n ] including self-observaions and recommendaions. Also le X = [x 0,, x n] denoe he corresponding operaional and environmenal conex condiions when he observaions are made. The problem is o learn he service behavior paern of SP j by a laen variable β j beween S ii and X, and predic he probabiliy ha SP j is rusworhy a ime, given he conex environmen se a ime n+1, x n+1, as inpu, i.e., T n+1 i,j = Pr s n+1 ii = 1 x n+1, β j. Essenially T n+1 i,j obained above is he reliabiliy rus of SP j a ime n+1 from SR i s perspecive. The service qualiy a ime n+1, n+1 s ii, can be prediced by seing a rus hreshold, depending on he SR s olerance for he risk. A common pracice is o se he rus hreshold as a value greaer han 0.5. For example, if he rus hreshold is se o be 0.6 by SR i hen he requesed service performed by SP j is prediced o be saisfacory when he prediced reliabiliy rus is greaer han 0.6. In [2], we uilized logi regression as he behavior paern learning mechanism o solve he above rus assessmen problem, resuling in a rus managemen proocol which we call LogiTrus. LogiTrus assesses each SP in erms of is service behavior paerns in response o operaional and environmenal changes characerized by hree conex variables: x e, x c, x p for energy, capabiliy, and price (or reward). Energy is used o measure he cos of ask execuion. In a congesed environmen he probabiliy of wireless channel conenion and signal inerference will be high, so i will cos more for a SP o execue a ask because he SP needs o consume more energy in lisening o he channel and repeaing packe ransmission. The reasons for considering he above conex variables in service-oriened MANET environmens are: (a) a SP is more likely o provide inferior service when he cos of servicing he ask is high (b) a SP is likely o provide inferior service when i is limied in resources and capabiliy; and (c) a profi-aware SP is more likely o provide qualiy service when he SR offers a higher price. SR i will assess he hree conex variables x e, x c, x p while i sends a service reques o SP j as follows: x e is esimaed by he number of neighbors sharing he channel as more energy is consumed for channel conenion and packe reransmission when here are more nodes sharing he channel; x c is esimaed by he packe raffic o SP j as more raffic o SP j hinders is processing capabiliy; x p is SR i s reward o SP j upon saisfacory service compleion. When SP j complees he service, SR i will assess if he service is saisfacory (1) or no (0), and sore he service oucome ogeher wih x e, x c, x p conex informaion as one record in he daase se for learning. I can also pass his experience record o anoher node as a recommendaion. A SR in he sysem uses is own self-observaions and recommendaions received o learn he behavior paern of a SP, and predic he reliabiliy rus of he SP on a service reques in a paricular conex environmen. Relying on is robus learning engine, LogiTrus is highly effecive agains dishones recommendaions (hrough bad-mouhing and ballo-suffing aacks). I significanly ouperforms exising rus compuaion models such as Bea repuaion wih belief discouning [3] and Adapive Trus Managemen [4] in erms of rus accuracy because i akes conex informaion ino consideraion in service behavior assessmen. LogiTrus is also efficien in erms of compuaional complexiy as i uilizes a simple linear model o model he relaion beween conex variables and observaions. Wih conflicing behavior aacks, a SP can selecively provide saisfacory service for some SRs while providing unsaisfacory service for ohers. In general, he relaion beween a SR and a SP deermines he SP s service aiude oward he SR. This is naurally solved by LogiTrus since LogiTrus is based on SR-SP pairing. Tha is, each SR evaluaes each SP based on is own self-observaions and filered recommendaions. If SP j provides bad services o a paricular SR, hen his evidence will be considered by his SR as i learns SP j s behavior paern (ha is, β j ) and will no rus SP j wih is service reques. Wih on-off aacks, a malicious node will aack only randomly so as o evade deecion and avoid being classified as a malicious node. To he sysem, his malicious node is no 100% of he ime providing bad service, bu jus a percenage of ime providing bad service. Therefore, SP j performing on-off aacks ranslaes ino SP j providing bad service only randomly insead of persisenly, which is a paern ha can be learned by SR as LogiTrus learns SP j s behavior paern (ha is, β j ). This in effec allows each SR o cope wih a paricular SP s on-off aack behavior. V. TRUST-BASED ALGORITHM DESIGN FOR APPLICATION PERFORMANCE MAXIMIZATION Service-oriened MANET applicaions are on he rise hanks o he proliferaion of fairly powerful mobile devices and ubiquious wireless echnology. We aim o design and validae rus-based algorihms for applicaion performance maximizaion for service-oriened MANET applicaions wih he goal of saisfying muliple objecives wih conflicing goals o achieve muli-objecive opimizaion (MOO). Trus-based service composiion and binding (wih or wihou MOO) has been sudied in he web services domain bu only a single-rus, i.e., a single dimension of rus, was considered. This largely ignores he fac ha rus is mulidimensional. Idenifying proper rus componens and forming he overall rus ou of muliple rus componens o maximize applicaion performance is of paramoun imporance. We advocae he use of wo key rus dimensions in service reques execuion, namely, compeence and inegriy, as he building blocks of a composie rus meric. Below we discuss our rus-based service managemen

4 algorihm designs for solving wo service-oriened MANET applicaions wih MOO. In [5], we invesigaed a rus-based dynamic ask assignmen algorihm for performing dynamic ask-o-node service assignmens o saisfy muliple objecives wih conflicing goals. The resuls demonsraed ha our rusbased soluion has low complexiy and ye can achieve performance comparable o ha of he ideal soluion wih perfec knowledge of node reliabiliy, and can significanly ouperform he non-rus-based soluion. We analyzed how MOO is achieved by he ideal, rus-based and non-rusbased soluions, and idenified parameer seings under which he rus proocol performance in erms of MOO is opimized for he rus-based soluion which can bes balance muliple objecives wih conflicing goals. The resuls obained are useful for dynamic rus managemen o maximize applicaion performance in erms of MOO in he presence of malicious aacks. In [6], we invesigaed a rus-based service composiion algorihm designed o saisfy mobile user service requess wih muliple objecives including maximizing qualiy-ofservice (QoS) and qualiy-of-informaion (QoI) while minimizing he service cos (e.g., pricing) wih he user saisfacion ulimaely measuring success. Wih a service reques in hand, a SR has o firs formulae a service composiion plan based on he available SPs i encouners and ineracs wih dynamically, and hen deermine he bes node-o-service assignmen for achieving MOO. Dynamic service composiion and binding is especially complicaed in MANETs because of he space-ime complexiy of mobile devices. This issue is furher compounded by he fac ha he informaion received is ofen malicious, erroneous, parly rused, uncerain and incomplee in MANET environmens. Our rus-based service composiion and binding algorihm based on muli-rus ouperforms he non-rus-based counerpar using blacklising, as well as a single-rus-based algorihm using a radiional bea repuaion sysem. Our rus-based algorihm has a linear runime complexiy and is able o achieve a soluion qualiy approaching ha generaed by Ineger Linear Programming wihou sacrificing much soluion accuracy. We conduced a comparaive performance analysis of single-rus vs. mulirus proocols for peer-o-peer rus evaluaion in serviceoriened MANETs. We uilized rus o effecively preven malicious nodes from disruping he operaion of a serviceoriened MANET. We conduced a deailed performance analysis and demonsraed ha our rus-based algorihm can effecively penalize malicious nodes performing badmouhing, ballo-suffing packe dropping, self-promoion, or opporunisic service aacks, hus filering ou malicious nodes from service paricipaion, and can ulimaely lead o high user saisfacion. VI. KEY IDEAS AND EXPERIENCES LEARNED The major difference beween a service-oriened MANET and an Inerne-based web service sysem is ha he informaion received in MANET environmens is ofen malicious, erroneous, parly rused, uncerain and incomplee. In his paper we discussed key research ideas for rus-based service managemen of mobile devices in service-oriened MANETs wherein every node can be a service provider or a service requeser. The firs key idea is o ake special characerisics of service-oriened MANET environmens ino consideraion so as o design an efficien and effecive rus proocol. We discussed a novel logi regression-based rus model called LogiTrus o dynamically esimae he rus of a mobile device based on how i behaves in response o dynamically changing MANET environmens characerized by a se of conex variables. LogiTrus ouperforms radiional approaches based on Bayesian Inference wih belief discouning in erms of rus accuracy and resiliency agains aacks, while mainaining a low false posiive rae. I is efficien as i adops a simple liner model for behavior learning wih low compuaional complexiy. I is effecive since i reflecs dynamic MANET characerisics, such as limied bandwidh and baery power, as conex variables in he learning model formulaion. The 2nd key idea is o use muli-rus insead of singlerus for rus-based algorihm design, recognizing mulidimensional rus assessmen is criical for decision makings. The 3rd key idea is ha muli-rus-based algorihm design is applicaion specific. One mus apply he bes rus formaion ailored o he applicaion requiremens o achieve applicaion performance maximizaion, especially for hose applicaions wih muli-objecive opimizaion goals. We demonsraed ha our muli-rus-based algorihm ouperforms is non-rus-based and single-rus-based counerpars wih muli-objecive opimizaion over a range of service-oriened MANET applicaions, including nodeo-service composiion and binding, and node-o-ask assignmen MANET applicaions. Furhermore, we demonsraed ha our muli-rus-based algorihms for solving hese problems are efficien (wih linear runime complexiy) and effecive wihou compromising soluion opimaliy, when compared wih non-rus-based soluions, and oher single-rus-based soluions based on Bayesian inference. VII. FUTURE RESEARCH DIRECTIONS There are several fuure research direcions for rus managemen of mobile devices in service-oriened MANETs: Firs, we plan o address he issue of runime learning and decision making for MANET nodes wih limied sorage and compuaion resources. This may involve he use of heurisics for each resource-limied node o sore mos relevan rus records [10]. Second, we plan o incorporae adapive conrol o he rus proocol design. A possible direcion is o use a recommendaion filering mechanism o dynamically decide if a recommendaion is o be aken or no. Adapive conrol may be achieved by adjusing he recommender filering hreshold value based on he hosiliy level in he environmen. When he hosiliy level is low (i.e., no many bad nodes are ou here), one can se a low hreshold so as o ake in recommendaions ino he daase, because chances are all recommendaions are benign. On he oher

5 hand, when he hosiliy level is high, one can se a high hreshold o filer ou false recommendaions so as no o conaminae he daase for effecive behavior learning. Third, alhough we have refleced MANET environmen characerisics such as limied bandwidh and energy power as conex variables in our rus model formulaion, we have no considered node social behaviors which can also be reaed as conex informaion. A conex variable such as friendship can dicae wheher a node will perform good service or bad service oward anoher node, or if a node will perform ballo-suffing or bad-mouhing aack oward anoher node. We plan o furher es he resiliency of LogiTrus [2] agains more complicaed environmenal and operaional scenarios such as noisy environmens, socialbased service behaviors, as well as more sophisicaed aack behaviors such as opporunisic, collusion and insidious aacks [11]. Lasly, we plan o leverage game heory and arificial inelligence principles [19]-[23], and sochasic Peri ne modeling echniques [24]-[34] o capure he dynamics beween aacker/defense behaviors [39]-[42] and reason how a service requeser can perform couneraacks by adapive rus-based service managemen for achieving muli-objecive opimizaion of service qualiy. ACKNOWLEDGMENT This work is suppored in par by he U. S. Army Research Laboraory and he U. S. Army Research Office under conrac number W911NF This research was also parially suppored by he Deparmen of Defense (DoD) hrough he office of he Assisan Secreary of Defense for Research and Engineering (ASD (R&E)). The views and opinions of he auhor(s) do no reflec hose of he DoD or ASD (R&E). REFERENCES [1] E. Borgia, "The Inerne of Things vision: Key feaures, applicaions and open issues," Compuer Communicaions, vol. 54, 2014, pp [2] Y. Wang, Y. C. Lu, I. R. Chen, J. H. Cho, A. Swami, and C. T. Lu, "LogiTrus: A Logi Regression-based Trus Model for Mobile Ad Hoc Neworks," 6h ASE Inernaional Conference on Privacy, Securiy, Risk and Trus, Boson, MA, Dec. 2014, pp [3] A. Jøsang and R. Ismail, "The Bea Repuaion Sysem," 15h Bled Elecronic Commerce Conf., 2002, pp [4] I. R. Chen, J. Guo, and F. Bao, "Trus Managemen for SOAbased IoT and Is Applicaion o Service Composiion," IEEE Transacions on Service Compuing, 2015, in press. [5] Y. Wang, I. R. Chen, and J. H. Cho, "Trus-Based Task Assignmen in Auonomous Service-Oriened Ad Hoc Neworks," IEEE 12h Inernaional Symposium on Auonomous Decenralized Sysems, Taichung, Taiwan, March 2015, pp [6] Y. Wang, I. R. Chen, J. H. Cho, K. S. Chan, and A. Swami, "Trus-based Service Composiion and Binding for Tacical Neworks wih Muliple Objecives," 32h IEEE Miliary Communicaions Conference (MILCOM 2013), San Diego, CA, USA, Nov. 2013, pp [7] F. Bao and I. R. Chen, Dynamic Trus Managemen for Inerne of Things Applicaions, 2012 Inernaional Workshop on Self-aware Inerne of Things, San Franscisco, CA, USA, Sep. 2012, pp [8] R. Michell and I. R. Chen, A Survey of Inrusion Deecion in Wireless Nework Applicaions, Compuer Communicaions, vol. 42, April 2014, pp [9] A. Jøsang, A Logic for Uncerain Probabiliies, Inernaional Journal of Uncerainy, Fuzziness and Knowledge-based Sysems, vol. 9, no. 3, 2001, pp [10] I. R. Chen, F. Bao, and J. Guo, Trus-based Service Managemen for Social Inerne of Things Sysems, IEEE Trans. on Dependable and Secure Compuing, 2015, in press. [11] R. Michell and I. R. Chen, Effec of Inrusion Deecion and Response on Reliabiliy of Cyber Physical Sysems, IEEE Transacions on Reliabiliy, vol. 62, no. 1, 2013, pp [12] H. Xia, Z. Jia, L. Ju, and Y. Zhu, Trus Managemen Model for Mobile Ad Hoc Nework Based on Analyic Hierarchy Process and Fuzzy Theory, IET Wireless Sensor Sysems, vol. 1, no. 4, 2011, pp [13] I. R. Chen, J. Guo, F. Bao, and J. H. Cho, Trus Managemen in Mobile Ad Hoc Neworks for Bias Minimizaion and Applicaion Performance Maximizaion, Ad Hoc Neworks, vol. 19, Augus 2014, pp [14] I. R. Chen, F. Bao, M. Chang, and J. H. Cho, Dynamic Trus Managemen for Delay Toleran Neworks and Is Applicaion o Secure Rouing, IEEE Transacions on Parallel and Disribued Sysems, vol. 25, no. 5, 2014, pp [15] P. Michiardi and R. Molva, Core: A Collaboraive Repuaion Mechanism o Enforce Node Cooperaion in Mobile Ad Hoc Neworks, IFIP 6h Join Working Conference on Communicaions and Mulimedia Securiy, Pororož, Slovenia, 2002, pp [16] J. H. Cho, A. Swami, and I. R. Chen, Modeling and Analysis of Trus Managemen for Cogniive Mission-Driven Group Communicaion Sysems in Mobile Ad Hoc Neworks, in In l. Conf. Compuaional Science and Engineering, 2009, pp [17] J. H. Cho, A. Swami, and I. R. Chen, Modeling and analysis of Trus Managemen wih Trus Chain Opimizaion in Mobile Ad Hoc Neworks, Journal of Nework and Compuer Applicaions, vol. 35, no. 3, 2012, pp [18] K. Govindan and P. Mohapara, Trus Compuaions and Trus Dynamics in Mobile Adhoc Neworks: A Survey, IEEE Comm. Survey and Tuorials, vol. 14, no. 2, 2012, pp [19] D. Korzhyk, V. Conizer, and R. Parr, Solving Sackelberg Games wih Uncerain Observabiliy, 10h Inernaional Conference on Auonomous Agens and Muliagen Sysems, Taipei, Taiwan, May 2010, pp [20] J. Wang and I. R. Chen, Trus-based Daa Fusion Mechanism Design in Cogniive Radio Neworks, IEEE Conference on Communicaions and Nework Securiy (CNS), San Francisco, Oc. 2014, pp [21] I. R. Chen and F. B. Basani,, Effec of Arificial-Inelligence Planning-Procedures on Sysem Reliabiliy, IEEE Transacions on Reliabiliy, vol. 40, no. 3, 1991, pp [22] I. R. Chen, F. B. Basani, and T. W. Tsao, On he Reliabiliy of AI Planning Sofware in Real-ime Applicaions, IEEE Transacions on Knowledge and Daa Engineering, vol. 7, no. 1, 1995, pp [23] F. B. Basani, I. R. Chen, and T. W. Tsao, Reliabiliy of Sysems wih Fuzzy-Failure Crierion, Annual Reliabiliy and Mainainabiliy Symposium, Anaheim, California, USA, 1994, pp

6 [24] I. R. Chen and D. C. Wang, Analyzing Dynamic Voing using Peri Nes, 15h IEEE Symposium on Reliable Disribued Sysems, Niagara Falls, Canada, 1996, pp [25] I. R. Chen and D. C. Wang, Analysis of Replicaed Daa wih Repair Dependency, The Compuer Journal, vol. 39, no. 9, 1996, pp [26] R. Michell and I. R. Chen, Behavior Rule Specificaionbased Inrusion Deecion for Safey Criical Medical Cyber Physical Sysems, IEEE Transacions on Dependable and Secure Compuing, vol. 12, no. 1, 2015, pp [27] I. R. Chen, T. M. Chen, and C. Lee, Performance Evaluaion of Forwarding Sraegies for Locaion Managemen in Mobile Neworks, The Compuer Journal, vol. 41, no. 4, 1998, pp [28] B. Gu and I. R. Chen, Performance Analysis of Locaion- Aware Mobile Service Proxies for Reducing Nework Cos in Personal Communicaion Sysems, Mobile Neworks and Applicaions, vol. 10, no. 4, 2005, pp [29] O. Yilmaz and I. R. Chen, Uilizing Call Admission Conrol for Pricing Opimizaion of Muliple Service Classes in Wireless Cellular Neworks, Compuer Communicaions, vol. 32, 2009, pp [30] I. R. Chen and T. H. Hsi, Performance Analysis of Admission Conrol Algorihms based on Reward Opimizaion for Real-Time Mulimedia Servers, Performance Evaluaion, vol. 33, no. 2, pp , [31] I. R. Chen, T. M. Chen, and C. Lee, Agen-based forwarding sraegies for reducing locaion managemen cos in mobile neworks, Mobile Neworks and Applicaions, vol. 6, no. 2, 2001, pp [32] S. T. Cheng, C. M. Chen, and I. R. Chen, Dynamic Quoabased Admission Conrol wih Sub-Raing in Mulimedia Servers, Mulimedia Sysems, vol. 8, no. 2, 2000, pp [33] I. R. Chen, O. Yilmaz, and I. L. Yen, Admission Conrol Algorihms for Revenue Opimizaion wih QoS Guaranees in Mobile Wireless Neworks, Wireless Personal Communicaions, vol. 38, no. 3, 2006, pp [34] Y. Li and I. R. Chen, Design and Performance Analysis of Mobiliy Managemen Schemes Based on Poiner Forwarding for Wireless Mesh Neworks, IEEE Transacions on Mobile Compuing, vol. 10, no. 3, 2011, pp [35] H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, A Probabilisic Misbehavior Deecion Scheme Towards Efficien Trus Esablishmen in Delay-Toleran Neworks, IEEE Transacions on Parallel and Disribued Sysems, vol. 25, no. 1, 2014, pp [36] L. Xiong and L. Liu, PeerTrus: Supporing Repuaion- Based Trus for Peer-o-Peer Elecronic Communiies, IEEE Trans. on Knowledge and Daa Engineering, vol. 16, no. 7, 2004, pp [37] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The EigenTrus Algorihm for Repuaion Managemen in P2P Neworks, 12h Inernaional Conference on World Wide Web, Budapes, Hungary, May 2003, pp [38] Z. Su e al., ServiceTrus: Trus Managemen in Service Provision Neworks, IEEE Inernaional Conference on Services Compuing, Sana Clara, CA, 2013, pp [39] J. H. Cho, I. R. Chen, and P. G. Feng, "Effec of Inrusion Deecion on Reliabiliy of Mission-Oriened Mobile Group Sysems in Mobile Ad Hoc Neworks," IEEE Transacions on Reliabiliy, vol. 59, no. 1, 2010, pp [40] H. Al-Hamadi and I. R. Chen, Adapive Nework Defense Managemen for Counering Smar Aack and Selecive Capure in Wireless Sensor Neworks, IEEE Transacions on Nework and Service Managemen, 2015, in press. [41] R. Michell and I. R. Chen, Modeling and Analysis of Aacks and Couner Defense Mechanisms for Cyber Physical Sysems, IEEE Transacions on Reliabiliy, 2015, in preess. [42] R. Michell and I. R. Chen, Behavior Rule Based Inrusion Deecion Sysems for Safey Criical Smar Grid Applicaions, IEEE Transacions on Smar Grid, vol. 4, no. 3, Sep. 2013, pp

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks

Recommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks 215 Recommendaions Based QoS Trus Aggregaion and Rouing in Mobile Adhoc Neworks Nageswararao Sirisala 1 and C.Shoba Bindu 2 1 CSE Dep, Vardhaman College of Engg, Hyderabad, India 2 CSE Dep, JNTUACE, Ananapur,

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Web System for the Remote Control and Execution of an IEC Application

Web System for the Remote Control and Execution of an IEC Application Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,

More information

Let s get physical - EDA Tools for Mobility

Let s get physical - EDA Tools for Mobility Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened

More information

Reliability Analysis for Cryptographic Key Management

Reliability Analysis for Cryptographic Key Management Reliabiliy Analysis for Crypographic Key Managemen 1 Sheng Xiao, 2 Weibo Gong, 3 Don Towsley, 4, 5 Qingquan Zhang, 5 Ting Zhu 1 College of Informaion Science and Engineering, Hunan Universiy, China 2 Dep.

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u

Open Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network

Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services

A Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

Reinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi

Reinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi Reinforcemen Learning by Policy Improvemen Making Use of Experiences of The Oher Tasks Hajime Kimura and Shigenobu Kobayashi Tokyo Insiue of Technology, JAPAN genfe.dis.iech.ac.jp, kobayasidis.iech.ac.jp

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS

PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS Jun Peng Elecrical Engineering Deparmen, Universiy of Texas Rio Grande Valley, Edinburg, Texas, USA ABSTRACT Unmanned

More information

Video streaming over Vajda Tamás

Video streaming over Vajda Tamás Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng 3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

Rule-Based Multi-Query Optimization

Rule-Based Multi-Query Optimization Rule-Based Muli-Query Opimizaion Mingsheng Hong Dep. of Compuer cience Cornell Universiy mshong@cs.cornell.edu Johannes Gehrke Dep. of Compuer cience Cornell Universiy johannes@cs.cornell.edu Mirek Riedewald

More information

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering WINNOWING : Proecing P2P Sysems Agains Polluion By Cooperaive Index Filering Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song Deparmen of Compuer Science Norh Carolina Sae Universiy Raleigh, NC

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1 This is he auhor's version of an aricle ha has been published in his journal. Changes were made o his version by he publisher prior o publicaion. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX,

More information

Autonomic Cognitive-based Data Dissemination in Opportunistic Networks

Autonomic Cognitive-based Data Dissemination in Opportunistic Networks Auonomic Cogniive-based Daa Disseminaion in Opporunisic Neworks Lorenzo Valerio, Marco Coni, Elena Pagani and Andrea Passarella IIT-CNR, Pisa, Ialy Email: {marco.coni,andrea.passarella,lorenzo.valerio}@ii.cnr.i

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

Distributed Task Negotiation in Modular Robots

Distributed Task Negotiation in Modular Robots Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios

Network Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios 1 Nework Slicing for Ulra-Reliable Low Laency Communicaion in Indusry 4.0 Scenarios Anders Ellersgaard Kalør, René Guillaume, Jimmy Jessen Nielsen, Andreas Mueller, and Pear Popovski arxiv:1708.09132v1

More information

An Experimental QoS Manager Implementation

An Experimental QoS Manager Implementation An Experimenal QoS Manager Implemenaion Drago Žagar, Goran Marinović, Slavko Rupčić Faculy of Elecrical Engineering Universiy of Osijek Kneza Trpimira 2B, Osijek Croaia drago.zagar@efos.hr Absrac-- Qualiy

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Coded Caching in a Multi-Server System with Random Topology

Coded Caching in a Multi-Server System with Random Topology Coded Caching in a Muli-Server Sysem wih Random Topology iish Mial, Deniz Gündüz and Cong Ling Deparmen of Elecrical and Elecronic Engineering, Imperial College London Email: {n.mial, d.gunduz, c.ling}@imperial.ac.uk

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate 20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra

More information

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips

A Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips 16.3 A Progressive-ILP Based Rouing Algorihm for Cross-Referencing Biochips Ping-Hung Yuh 1, Sachin Sapanekar 2, Chia-Lin Yang 1, Yao-Wen Chang 3 1 Deparmen of Compuer Science and Informaion Engineering,

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING

CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder, Jun Wang and Jie Shan Geomaics Engineering, School of Civil Engineering, Purdue Universiy 550 Sadium Mall Drive, Wes

More information

Multiple View Discriminative Appearance Modeling with IMCMC for Distributed Tracking

Multiple View Discriminative Appearance Modeling with IMCMC for Distributed Tracking Muliple View Discriminaive ing wih IMCMC for Disribued Tracking Sanhoshkumar Sunderrajan, B.S. Manjunah Deparmen of Elecrical and Compuer Engineering Universiy of California, Sana Barbara {sanhosh,manj}@ece.ucsb.edu

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Evaluation and Improvement of Multicast Service in b

Evaluation and Improvement of Multicast Service in b Evaluaion and Improvemen of Mulicas Service in 802.11b Chrisian Bravo 1 and Agusín González 2 1 Universidad Federico Sana María, Deparmen of Elecronics. Valparaíso, Chile chbravo@elo.ufsm.cl 2 Universidad

More information

Improving Occupancy Grid FastSLAM by Integrating Navigation Sensors

Improving Occupancy Grid FastSLAM by Integrating Navigation Sensors Improving Occupancy Grid FasSLAM by Inegraing Navigaion Sensors Chrisopher Weyers Sensors Direcorae Air Force Research Laboraory Wrigh-Paerson AFB, OH 45433 Gilber Peerson Deparmen of Elecrical and Compuer

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets

Thwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets Thwaring lackhole acks in Disrupion-Toleran Neworks using ncouner Tickes Feng Li, Jie Wu Dep. of ompuer Science and ngineering Florida lanic Universiy oca Raon, FL 33431 vinash Srinivasan Dep. of Mah,

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,

More information

Relevance Ranking using Kernels

Relevance Ranking using Kernels Relevance Ranking using Kernels Jun Xu 1, Hang Li 1, and Chaoliang Zhong 2 1 Microsof Research Asia, 4F Sigma Cener, No. 49 Zhichun Road, Beijing, China 100190 2 Beijing Universiy of Poss and Telecommunicaions,

More information

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013.

This is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013. hp://www.diva-poral.org This is he published version of a paper presened a The 2013 IEEE Inernaional Conference on Inerne of Things, Beijing, China, 20-23 Augus 2013. Ciaion for he original published paper:

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Research Article A Priority-Based CSMA/CA Mechanism to Support Deadline-Aware Scheduling in Home Automation Applications Using IEEE

Research Article A Priority-Based CSMA/CA Mechanism to Support Deadline-Aware Scheduling in Home Automation Applications Using IEEE Hindawi Publishing Corporaion Inernaional Journal of Disribued Sensor Neworks Volume 213, Aricle ID 13984, 12 pages hp://dx.doi.org/1.1155/213/13984 Research Aricle A Prioriy-Based CSMA/CA Mechanism o

More information

Outline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state

Outline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state Ouline EECS 5 - Componens and Design Techniques for Digial Sysems Lec 6 Using FSMs 9-3-7 Review FSMs Mapping o FPGAs Typical uses of FSMs Synchronous Seq. Circuis safe composiion Timing FSMs in verilog

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

A Web Browsing Traffic Model for Simulation: Measurement and Analysis

A Web Browsing Traffic Model for Simulation: Measurement and Analysis A Web Browsing Traffic Model for Simulaion: Measuremen and Analysis Lourens O. Walers Daa Neworks Archiecure Group Universiy of Cape Town Privae Bag, Rondebosch, 7701 Tel: (021) 650 2663, Fax: (021) 689

More information

A MAC layer protocol for wireless networks with asymmetric links

A MAC layer protocol for wireless networks with asymmetric links A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

Partition-based document identifier assignment (PBDIA) algorithm. (long queries)

Partition-based document identifier assignment (PBDIA) algorithm. (long queries) ( ) Pariion-based documen idenifier assignmen (PBDIA) algorihm PBDIA (long queries) (parallel IR) :,,,, d-gap Compressing an invered file can grealy improve query performance of an informaion rerieval

More information