Trust-based Service Management of Mobile Devices in Ad Hoc Networks
|
|
- Gavin McCarthy
- 5 years ago
- Views:
Transcription
1 Trus-based Service Managemen of Mobile Devices in Ad Hoc Neworks Yaing Wang, Ing-Ray Chen Virginia Tech Deparmen of Compuer Science Falls Church, VA, USA {yaingw, Jin-Hee Cho U.S. Army Research Laboraory Compuaional and Informaion Sciences Direcorae Adelphi, MD, USA Absrac Wih he proliferaion of fairly powerful mobile devices and ubiquious wireless echnology, radiional mobile ad hoc neworks (MANETs) now migrae ino a new era of service oriened MANETs wherein a mobile device can provide and receive service from oher mobile devices i encouners and ineracs wih. We discuss our ongoing research effors in rus managemen and rus-based algorihm design for service-oriened MANET applicaions o answer he challenges of MANET environmens, including no cenralized auhoriy, dynamically changing opology, limied bandwidh and baery power, limied observaions, unreliable communicaion, and he presence of malicious nodes who ac o break he sysem funcionaliy as well as selfish nodes who ac o maximize heir own gain. We also highligh key ideas and experiences learned, and provide fuure research direcions. Keywords-service-oriened mobile ad hoc neworks; muliobjecive opimizaion; rus; performance analysis. I. INTRODUCTION An auonomous service-oriened mobile ad hoc nework (MANET) is populaed wih service providers (SPs) and service requesers (SRs). A realizaion of service-oriened MANETs is a web-based peer-o-peer service sysem wih mobile nodes providing web services and users (hrough heir mobile devices) invoking web services. Unlike a web service sysem in which nodes are conneced o he Inerne, nodes in service-oriened MANETs are mobile and he communicaion beween peers no wihin radio range is muli-hop wih nodes in he sysem serving as rouers. One can view a service-oriened MANET as an insance of Inerne of Things (IoT) sysems [7] wih a wide range of mobile applicaions including smar-ciy, smar ourism, smar car, smar environmenal monioring, and healhcare [1]. I is paricularly suiable o miliary applicaions where all nodes are mobile wih muli-hop communicaion. This paper discusses our ongoing research work in rus managemen and rus-based algorihm design for serviceoriened MANETs, key ideas and experiences learned, and fuure research direcions. Our aims are o (1) idenify rus dimensions for service-oriened MANET applicaions; (2) develop an efficien and effecive rus proocol for serviceoriened MANETs; and (3) develop efficien and effecive rus-based algorihms for a se of service-oriened MANET applicaions. The overarching principle is he design noion of adapive conrol, allowing rus compuaion, aggregaion, propagaion, formaion (ou of muliple rus dimensions) and updae decisions o be dynamically adjused o minimize rus bias and maximize applicaion performance. This goal is o be achieved in he presence of malicious mobile devices performing a wide range of aacks, including bad-mouhing, ballo-suffing, packe dropping, opporunisic service, selfpromoion, conflicing behavior, and on-off service aacks for personal gain. The res of he paper is organized as follows. Secion II discusses relaed work. Secion III discusses he hrea model for service-oriened MANETs. Secion IV presens our soluions oward rus managemen of mobile devices in service oriened MANETs. Secion V presens our soluions oward rus-based service managemen for performance opimizaion of service-oriened MANET applicaions. Secion VI summarizes key research ideas and experiences learned. Finally, Secion VII concludes he paper and oulines fuure research direcions. II. RELATED WORK Many exising rus models for predicing rus are based on Bayesian inference [3]. Bayesian inference reas rus as a random variable following a probabiliy disribuion (e.g., Bea disribuion) wih is model parameers being updaed upon new observaions. A shorcoming of Bayesian inference is ha rus value does no reveal he uncerainy of rus since i is jus a mean. For example, he same rus value can be given o wo nodes despie one node was observed for jus 2 imes, while he oher node was observed for 20 imes. Belief heory or subjecive logic rus models [9] have been proposed o remedy he problem menioned above, by inroducing uncerainy ino rus calculaion. Fuzzy logic based rus models are also well sudied in he lieraure [12]. Insead of using a binary se, a membership funcion is defined indicaing he degree o which a node is considered rusworhy. Relaive o he works cied above based on Bayesian inference, belief heory, or fuzzy logic, we ake an enirely differen approach. Our roo is in saisical analysis. We develop a regression-based rus model o learn he behavior paern of a SP, aking conex informaion ino consideraion o esimae he reliabiliy rus of a SP ha is seleced by a SR o execue a service reques under a paricular environmen conex. A significan amoun of work has been done in he area of rus-based defenses agains aacks in MANETs [13]- [18], [35]-[38]. A common drawback is ha dynamically uning rus parameers may perform poorly when a node
2 does no have enough self-observaion experiences wih oher nodes in MANET environmens and mus rely on recommendaions. Differen from he works cied above, we advocae he use a robus saisical kernel o olerae false recommendaions o effecively achieve resiliency agains recommendaion aacks. Also unlike exising work, our goal is no o idenify bad SPs, bu o predic wheher a SP, wheher good or bad, can provide good service, given a se of conex variables characerizing he MANET operaional environmen, including dynamically changing opology, limied bandwidh, baery power, and unreliable communicaion. In our approach, a SR learns and predics a SP s service behavior aking conex informaion ino consideraion, insead of jus judging a SP s rusworhiness from self-observaions or recommendaions received, as having been done in exising works. III. THREAT MODEL Jus like Inerne-based web services, in a serviceoriened MANET here are malicious SPs acing for heir own gain. The common goal of malicious nodes is o increase heir chance of being seleced for providing service. Malicious nodes can collude o achieve his common goal. We consider he following malicious aacks in our research: 1. Bad-mouhing aacks: a malicious node can ruin he rus of a good node (by providing bad recommendaions agains i) so as o decrease he chance of ha node being seleced for service. This is a form of collusion recommendaion aacks, i.e., a malicious node can collaborae wih oher malicious nodes o ruin he rus of a good node. 2. Ballo-suffing aacks: a malicious node can boos he rus of anoher malicious node (by providing good recommendaions) so as o increase he chance of ha malicious node being seleced as a SP. This is anoher form of collusion recommendaion aacks, i.e., a malicious node can collaborae wih oher malicious nodes o boos he rus of each oher. 3. Packe-dropping aacks: when serving as a packe relaying node, a malicious node can delay forwarding or simply drop daa packes o ruin he rus of he source node. 4. Opporunisic service aacks: a malicious node can provide good service o gain high repuaion when i senses is rus saus is low, and can provide bad service when i senses is rus saus is high. 5. Self-promoion aacks: A malicious node can boos is service qualiy informaion so as o increase is chance of being seleced as a SP. 6. Conflicing behavior aacks: a malicious node can selecively provide saisfacory service for some SRs while unsaisfacory for ohers. Here, we noe ha a node s bes service qualiy is dicaed by he environmenal and operaional condiions a he ime a service reques is issued. Therefore, a malicious node can only perform conflicing behavior aacks wih a service qualiy no exceeding is bes service qualiy. 7. On-off aacks: insead of always performing is bes service, a malicious node can perform bad service. Wih on-off aacks, a malicious node performs bad service on and off (or randomly) so as o avoid being labeled as a low rus node and risk iself no being seleced as a SP, as well as no being able o effecively perform badmouhing and ballo-suffing aacks. One can view onoff aacks as random aacks. A malicious node may also perform daa modificaion aacks o ruin he repuaion of a good node. We assume daa/source auhenicaion echniques based on PKI can preven such aacks. A malicious node may also jam he communicaion channel or perform denial of service (DoS) aacks o overwhelm a SP. We assume ha sandard inrusion deecion echniques [8] are in place o miigae such aacks. IV. TRUST MANAGEMENT One challenge for implemening rus managemen in service-oriened MANETs is o reliably esimae he rus levels of SPs in a fully disribued manner, in conras wih an e-commerce sysem wih a cenralized auhoriy for rus managemen. Mos exising works ake direc evidence for direc rus assessmen and propagaes is observaions o oher nodes as recommendaions for indirec rus assessmen. However, a malicious node may violae his proocol. Furher, rus managemen of mobile devices mus ake service conex informaion ino consideraion. Such service conex informaion includes he curren capabiliy of a SP (e.g., energy saus), he service environmen (e.g., congesed wireless raffic), he ideniy of he SR (e.g., a friend or a sranger), he payoff obained (which is applicaion-dependen), and he service cos (e.g., energy consumed). All hese facors are called conex variables based on which he service behavior of a node forms a paern. The key o effecive rus managemen is herefore o learn he service behavior paern of a node oward hese conex variables. The behavior paern learned can be used o assess he reliabiliy rus [3] of a SP when i is seleced o service a reques in a paricular conex sae characerized by hese conex variables. More specifically, wihin a specific ype of service, SR i s observaion s ii a ime of he service qualiy received from SP j is eiher saisfacory or unsaisfacory. If he service qualiy is saisfacory, hen s ii =1 and SP j is considered rusworhy; oherwise, s ii =0 and SP j is considered unrusworhy. Le he operaional and environmenal condiions a ime be characerized by a se of disinc conex variables deemed appropriae for an applicaion, denoed by a column vecor x = [x 0,, x m ], where x i represens he ih conex variable. Then, reliabiliy rus or jus rus for shor is he probabiliy ha SP j is capable of providing saisfacory service under he operaional and environmen condiions a ime described by he conex variable se x. Le k (k i) be a recommender who had a prior service experience wih SP j and is asked by SR i o provide is feedback regarding SP j. The recommendaion from node k is in he form of [x, s kk ] specifying he specific operaional and environmenal conex condiions in x under which he
3 observaion in s kk was made. For noaional conveniences, le S ii = s 0 ii,, s n ii, i j, denoe he cumulaive evidence gahered by SR i regarding SP j s service qualiy over [ 0, n ] including self-observaions and recommendaions. Also le X = [x 0,, x n] denoe he corresponding operaional and environmenal conex condiions when he observaions are made. The problem is o learn he service behavior paern of SP j by a laen variable β j beween S ii and X, and predic he probabiliy ha SP j is rusworhy a ime, given he conex environmen se a ime n+1, x n+1, as inpu, i.e., T n+1 i,j = Pr s n+1 ii = 1 x n+1, β j. Essenially T n+1 i,j obained above is he reliabiliy rus of SP j a ime n+1 from SR i s perspecive. The service qualiy a ime n+1, n+1 s ii, can be prediced by seing a rus hreshold, depending on he SR s olerance for he risk. A common pracice is o se he rus hreshold as a value greaer han 0.5. For example, if he rus hreshold is se o be 0.6 by SR i hen he requesed service performed by SP j is prediced o be saisfacory when he prediced reliabiliy rus is greaer han 0.6. In [2], we uilized logi regression as he behavior paern learning mechanism o solve he above rus assessmen problem, resuling in a rus managemen proocol which we call LogiTrus. LogiTrus assesses each SP in erms of is service behavior paerns in response o operaional and environmenal changes characerized by hree conex variables: x e, x c, x p for energy, capabiliy, and price (or reward). Energy is used o measure he cos of ask execuion. In a congesed environmen he probabiliy of wireless channel conenion and signal inerference will be high, so i will cos more for a SP o execue a ask because he SP needs o consume more energy in lisening o he channel and repeaing packe ransmission. The reasons for considering he above conex variables in service-oriened MANET environmens are: (a) a SP is more likely o provide inferior service when he cos of servicing he ask is high (b) a SP is likely o provide inferior service when i is limied in resources and capabiliy; and (c) a profi-aware SP is more likely o provide qualiy service when he SR offers a higher price. SR i will assess he hree conex variables x e, x c, x p while i sends a service reques o SP j as follows: x e is esimaed by he number of neighbors sharing he channel as more energy is consumed for channel conenion and packe reransmission when here are more nodes sharing he channel; x c is esimaed by he packe raffic o SP j as more raffic o SP j hinders is processing capabiliy; x p is SR i s reward o SP j upon saisfacory service compleion. When SP j complees he service, SR i will assess if he service is saisfacory (1) or no (0), and sore he service oucome ogeher wih x e, x c, x p conex informaion as one record in he daase se for learning. I can also pass his experience record o anoher node as a recommendaion. A SR in he sysem uses is own self-observaions and recommendaions received o learn he behavior paern of a SP, and predic he reliabiliy rus of he SP on a service reques in a paricular conex environmen. Relying on is robus learning engine, LogiTrus is highly effecive agains dishones recommendaions (hrough bad-mouhing and ballo-suffing aacks). I significanly ouperforms exising rus compuaion models such as Bea repuaion wih belief discouning [3] and Adapive Trus Managemen [4] in erms of rus accuracy because i akes conex informaion ino consideraion in service behavior assessmen. LogiTrus is also efficien in erms of compuaional complexiy as i uilizes a simple linear model o model he relaion beween conex variables and observaions. Wih conflicing behavior aacks, a SP can selecively provide saisfacory service for some SRs while providing unsaisfacory service for ohers. In general, he relaion beween a SR and a SP deermines he SP s service aiude oward he SR. This is naurally solved by LogiTrus since LogiTrus is based on SR-SP pairing. Tha is, each SR evaluaes each SP based on is own self-observaions and filered recommendaions. If SP j provides bad services o a paricular SR, hen his evidence will be considered by his SR as i learns SP j s behavior paern (ha is, β j ) and will no rus SP j wih is service reques. Wih on-off aacks, a malicious node will aack only randomly so as o evade deecion and avoid being classified as a malicious node. To he sysem, his malicious node is no 100% of he ime providing bad service, bu jus a percenage of ime providing bad service. Therefore, SP j performing on-off aacks ranslaes ino SP j providing bad service only randomly insead of persisenly, which is a paern ha can be learned by SR as LogiTrus learns SP j s behavior paern (ha is, β j ). This in effec allows each SR o cope wih a paricular SP s on-off aack behavior. V. TRUST-BASED ALGORITHM DESIGN FOR APPLICATION PERFORMANCE MAXIMIZATION Service-oriened MANET applicaions are on he rise hanks o he proliferaion of fairly powerful mobile devices and ubiquious wireless echnology. We aim o design and validae rus-based algorihms for applicaion performance maximizaion for service-oriened MANET applicaions wih he goal of saisfying muliple objecives wih conflicing goals o achieve muli-objecive opimizaion (MOO). Trus-based service composiion and binding (wih or wihou MOO) has been sudied in he web services domain bu only a single-rus, i.e., a single dimension of rus, was considered. This largely ignores he fac ha rus is mulidimensional. Idenifying proper rus componens and forming he overall rus ou of muliple rus componens o maximize applicaion performance is of paramoun imporance. We advocae he use of wo key rus dimensions in service reques execuion, namely, compeence and inegriy, as he building blocks of a composie rus meric. Below we discuss our rus-based service managemen
4 algorihm designs for solving wo service-oriened MANET applicaions wih MOO. In [5], we invesigaed a rus-based dynamic ask assignmen algorihm for performing dynamic ask-o-node service assignmens o saisfy muliple objecives wih conflicing goals. The resuls demonsraed ha our rusbased soluion has low complexiy and ye can achieve performance comparable o ha of he ideal soluion wih perfec knowledge of node reliabiliy, and can significanly ouperform he non-rus-based soluion. We analyzed how MOO is achieved by he ideal, rus-based and non-rusbased soluions, and idenified parameer seings under which he rus proocol performance in erms of MOO is opimized for he rus-based soluion which can bes balance muliple objecives wih conflicing goals. The resuls obained are useful for dynamic rus managemen o maximize applicaion performance in erms of MOO in he presence of malicious aacks. In [6], we invesigaed a rus-based service composiion algorihm designed o saisfy mobile user service requess wih muliple objecives including maximizing qualiy-ofservice (QoS) and qualiy-of-informaion (QoI) while minimizing he service cos (e.g., pricing) wih he user saisfacion ulimaely measuring success. Wih a service reques in hand, a SR has o firs formulae a service composiion plan based on he available SPs i encouners and ineracs wih dynamically, and hen deermine he bes node-o-service assignmen for achieving MOO. Dynamic service composiion and binding is especially complicaed in MANETs because of he space-ime complexiy of mobile devices. This issue is furher compounded by he fac ha he informaion received is ofen malicious, erroneous, parly rused, uncerain and incomplee in MANET environmens. Our rus-based service composiion and binding algorihm based on muli-rus ouperforms he non-rus-based counerpar using blacklising, as well as a single-rus-based algorihm using a radiional bea repuaion sysem. Our rus-based algorihm has a linear runime complexiy and is able o achieve a soluion qualiy approaching ha generaed by Ineger Linear Programming wihou sacrificing much soluion accuracy. We conduced a comparaive performance analysis of single-rus vs. mulirus proocols for peer-o-peer rus evaluaion in serviceoriened MANETs. We uilized rus o effecively preven malicious nodes from disruping he operaion of a serviceoriened MANET. We conduced a deailed performance analysis and demonsraed ha our rus-based algorihm can effecively penalize malicious nodes performing badmouhing, ballo-suffing packe dropping, self-promoion, or opporunisic service aacks, hus filering ou malicious nodes from service paricipaion, and can ulimaely lead o high user saisfacion. VI. KEY IDEAS AND EXPERIENCES LEARNED The major difference beween a service-oriened MANET and an Inerne-based web service sysem is ha he informaion received in MANET environmens is ofen malicious, erroneous, parly rused, uncerain and incomplee. In his paper we discussed key research ideas for rus-based service managemen of mobile devices in service-oriened MANETs wherein every node can be a service provider or a service requeser. The firs key idea is o ake special characerisics of service-oriened MANET environmens ino consideraion so as o design an efficien and effecive rus proocol. We discussed a novel logi regression-based rus model called LogiTrus o dynamically esimae he rus of a mobile device based on how i behaves in response o dynamically changing MANET environmens characerized by a se of conex variables. LogiTrus ouperforms radiional approaches based on Bayesian Inference wih belief discouning in erms of rus accuracy and resiliency agains aacks, while mainaining a low false posiive rae. I is efficien as i adops a simple liner model for behavior learning wih low compuaional complexiy. I is effecive since i reflecs dynamic MANET characerisics, such as limied bandwidh and baery power, as conex variables in he learning model formulaion. The 2nd key idea is o use muli-rus insead of singlerus for rus-based algorihm design, recognizing mulidimensional rus assessmen is criical for decision makings. The 3rd key idea is ha muli-rus-based algorihm design is applicaion specific. One mus apply he bes rus formaion ailored o he applicaion requiremens o achieve applicaion performance maximizaion, especially for hose applicaions wih muli-objecive opimizaion goals. We demonsraed ha our muli-rus-based algorihm ouperforms is non-rus-based and single-rus-based counerpars wih muli-objecive opimizaion over a range of service-oriened MANET applicaions, including nodeo-service composiion and binding, and node-o-ask assignmen MANET applicaions. Furhermore, we demonsraed ha our muli-rus-based algorihms for solving hese problems are efficien (wih linear runime complexiy) and effecive wihou compromising soluion opimaliy, when compared wih non-rus-based soluions, and oher single-rus-based soluions based on Bayesian inference. VII. FUTURE RESEARCH DIRECTIONS There are several fuure research direcions for rus managemen of mobile devices in service-oriened MANETs: Firs, we plan o address he issue of runime learning and decision making for MANET nodes wih limied sorage and compuaion resources. This may involve he use of heurisics for each resource-limied node o sore mos relevan rus records [10]. Second, we plan o incorporae adapive conrol o he rus proocol design. A possible direcion is o use a recommendaion filering mechanism o dynamically decide if a recommendaion is o be aken or no. Adapive conrol may be achieved by adjusing he recommender filering hreshold value based on he hosiliy level in he environmen. When he hosiliy level is low (i.e., no many bad nodes are ou here), one can se a low hreshold so as o ake in recommendaions ino he daase, because chances are all recommendaions are benign. On he oher
5 hand, when he hosiliy level is high, one can se a high hreshold o filer ou false recommendaions so as no o conaminae he daase for effecive behavior learning. Third, alhough we have refleced MANET environmen characerisics such as limied bandwidh and energy power as conex variables in our rus model formulaion, we have no considered node social behaviors which can also be reaed as conex informaion. A conex variable such as friendship can dicae wheher a node will perform good service or bad service oward anoher node, or if a node will perform ballo-suffing or bad-mouhing aack oward anoher node. We plan o furher es he resiliency of LogiTrus [2] agains more complicaed environmenal and operaional scenarios such as noisy environmens, socialbased service behaviors, as well as more sophisicaed aack behaviors such as opporunisic, collusion and insidious aacks [11]. Lasly, we plan o leverage game heory and arificial inelligence principles [19]-[23], and sochasic Peri ne modeling echniques [24]-[34] o capure he dynamics beween aacker/defense behaviors [39]-[42] and reason how a service requeser can perform couneraacks by adapive rus-based service managemen for achieving muli-objecive opimizaion of service qualiy. ACKNOWLEDGMENT This work is suppored in par by he U. S. Army Research Laboraory and he U. S. Army Research Office under conrac number W911NF This research was also parially suppored by he Deparmen of Defense (DoD) hrough he office of he Assisan Secreary of Defense for Research and Engineering (ASD (R&E)). The views and opinions of he auhor(s) do no reflec hose of he DoD or ASD (R&E). REFERENCES [1] E. Borgia, "The Inerne of Things vision: Key feaures, applicaions and open issues," Compuer Communicaions, vol. 54, 2014, pp [2] Y. Wang, Y. C. Lu, I. R. Chen, J. H. Cho, A. Swami, and C. T. Lu, "LogiTrus: A Logi Regression-based Trus Model for Mobile Ad Hoc Neworks," 6h ASE Inernaional Conference on Privacy, Securiy, Risk and Trus, Boson, MA, Dec. 2014, pp [3] A. Jøsang and R. Ismail, "The Bea Repuaion Sysem," 15h Bled Elecronic Commerce Conf., 2002, pp [4] I. R. Chen, J. Guo, and F. Bao, "Trus Managemen for SOAbased IoT and Is Applicaion o Service Composiion," IEEE Transacions on Service Compuing, 2015, in press. [5] Y. Wang, I. R. Chen, and J. H. Cho, "Trus-Based Task Assignmen in Auonomous Service-Oriened Ad Hoc Neworks," IEEE 12h Inernaional Symposium on Auonomous Decenralized Sysems, Taichung, Taiwan, March 2015, pp [6] Y. Wang, I. R. Chen, J. H. Cho, K. S. Chan, and A. Swami, "Trus-based Service Composiion and Binding for Tacical Neworks wih Muliple Objecives," 32h IEEE Miliary Communicaions Conference (MILCOM 2013), San Diego, CA, USA, Nov. 2013, pp [7] F. Bao and I. R. Chen, Dynamic Trus Managemen for Inerne of Things Applicaions, 2012 Inernaional Workshop on Self-aware Inerne of Things, San Franscisco, CA, USA, Sep. 2012, pp [8] R. Michell and I. R. Chen, A Survey of Inrusion Deecion in Wireless Nework Applicaions, Compuer Communicaions, vol. 42, April 2014, pp [9] A. Jøsang, A Logic for Uncerain Probabiliies, Inernaional Journal of Uncerainy, Fuzziness and Knowledge-based Sysems, vol. 9, no. 3, 2001, pp [10] I. R. Chen, F. Bao, and J. Guo, Trus-based Service Managemen for Social Inerne of Things Sysems, IEEE Trans. on Dependable and Secure Compuing, 2015, in press. [11] R. Michell and I. R. Chen, Effec of Inrusion Deecion and Response on Reliabiliy of Cyber Physical Sysems, IEEE Transacions on Reliabiliy, vol. 62, no. 1, 2013, pp [12] H. Xia, Z. Jia, L. Ju, and Y. Zhu, Trus Managemen Model for Mobile Ad Hoc Nework Based on Analyic Hierarchy Process and Fuzzy Theory, IET Wireless Sensor Sysems, vol. 1, no. 4, 2011, pp [13] I. R. Chen, J. Guo, F. Bao, and J. H. Cho, Trus Managemen in Mobile Ad Hoc Neworks for Bias Minimizaion and Applicaion Performance Maximizaion, Ad Hoc Neworks, vol. 19, Augus 2014, pp [14] I. R. Chen, F. Bao, M. Chang, and J. H. Cho, Dynamic Trus Managemen for Delay Toleran Neworks and Is Applicaion o Secure Rouing, IEEE Transacions on Parallel and Disribued Sysems, vol. 25, no. 5, 2014, pp [15] P. Michiardi and R. Molva, Core: A Collaboraive Repuaion Mechanism o Enforce Node Cooperaion in Mobile Ad Hoc Neworks, IFIP 6h Join Working Conference on Communicaions and Mulimedia Securiy, Pororož, Slovenia, 2002, pp [16] J. H. Cho, A. Swami, and I. R. Chen, Modeling and Analysis of Trus Managemen for Cogniive Mission-Driven Group Communicaion Sysems in Mobile Ad Hoc Neworks, in In l. Conf. Compuaional Science and Engineering, 2009, pp [17] J. H. Cho, A. Swami, and I. R. Chen, Modeling and analysis of Trus Managemen wih Trus Chain Opimizaion in Mobile Ad Hoc Neworks, Journal of Nework and Compuer Applicaions, vol. 35, no. 3, 2012, pp [18] K. Govindan and P. Mohapara, Trus Compuaions and Trus Dynamics in Mobile Adhoc Neworks: A Survey, IEEE Comm. Survey and Tuorials, vol. 14, no. 2, 2012, pp [19] D. Korzhyk, V. Conizer, and R. Parr, Solving Sackelberg Games wih Uncerain Observabiliy, 10h Inernaional Conference on Auonomous Agens and Muliagen Sysems, Taipei, Taiwan, May 2010, pp [20] J. Wang and I. R. Chen, Trus-based Daa Fusion Mechanism Design in Cogniive Radio Neworks, IEEE Conference on Communicaions and Nework Securiy (CNS), San Francisco, Oc. 2014, pp [21] I. R. Chen and F. B. Basani,, Effec of Arificial-Inelligence Planning-Procedures on Sysem Reliabiliy, IEEE Transacions on Reliabiliy, vol. 40, no. 3, 1991, pp [22] I. R. Chen, F. B. Basani, and T. W. Tsao, On he Reliabiliy of AI Planning Sofware in Real-ime Applicaions, IEEE Transacions on Knowledge and Daa Engineering, vol. 7, no. 1, 1995, pp [23] F. B. Basani, I. R. Chen, and T. W. Tsao, Reliabiliy of Sysems wih Fuzzy-Failure Crierion, Annual Reliabiliy and Mainainabiliy Symposium, Anaheim, California, USA, 1994, pp
6 [24] I. R. Chen and D. C. Wang, Analyzing Dynamic Voing using Peri Nes, 15h IEEE Symposium on Reliable Disribued Sysems, Niagara Falls, Canada, 1996, pp [25] I. R. Chen and D. C. Wang, Analysis of Replicaed Daa wih Repair Dependency, The Compuer Journal, vol. 39, no. 9, 1996, pp [26] R. Michell and I. R. Chen, Behavior Rule Specificaionbased Inrusion Deecion for Safey Criical Medical Cyber Physical Sysems, IEEE Transacions on Dependable and Secure Compuing, vol. 12, no. 1, 2015, pp [27] I. R. Chen, T. M. Chen, and C. Lee, Performance Evaluaion of Forwarding Sraegies for Locaion Managemen in Mobile Neworks, The Compuer Journal, vol. 41, no. 4, 1998, pp [28] B. Gu and I. R. Chen, Performance Analysis of Locaion- Aware Mobile Service Proxies for Reducing Nework Cos in Personal Communicaion Sysems, Mobile Neworks and Applicaions, vol. 10, no. 4, 2005, pp [29] O. Yilmaz and I. R. Chen, Uilizing Call Admission Conrol for Pricing Opimizaion of Muliple Service Classes in Wireless Cellular Neworks, Compuer Communicaions, vol. 32, 2009, pp [30] I. R. Chen and T. H. Hsi, Performance Analysis of Admission Conrol Algorihms based on Reward Opimizaion for Real-Time Mulimedia Servers, Performance Evaluaion, vol. 33, no. 2, pp , [31] I. R. Chen, T. M. Chen, and C. Lee, Agen-based forwarding sraegies for reducing locaion managemen cos in mobile neworks, Mobile Neworks and Applicaions, vol. 6, no. 2, 2001, pp [32] S. T. Cheng, C. M. Chen, and I. R. Chen, Dynamic Quoabased Admission Conrol wih Sub-Raing in Mulimedia Servers, Mulimedia Sysems, vol. 8, no. 2, 2000, pp [33] I. R. Chen, O. Yilmaz, and I. L. Yen, Admission Conrol Algorihms for Revenue Opimizaion wih QoS Guaranees in Mobile Wireless Neworks, Wireless Personal Communicaions, vol. 38, no. 3, 2006, pp [34] Y. Li and I. R. Chen, Design and Performance Analysis of Mobiliy Managemen Schemes Based on Poiner Forwarding for Wireless Mesh Neworks, IEEE Transacions on Mobile Compuing, vol. 10, no. 3, 2011, pp [35] H. Zhu, S. Du, Z. Gao, M. Dong, and Z. Cao, A Probabilisic Misbehavior Deecion Scheme Towards Efficien Trus Esablishmen in Delay-Toleran Neworks, IEEE Transacions on Parallel and Disribued Sysems, vol. 25, no. 1, 2014, pp [36] L. Xiong and L. Liu, PeerTrus: Supporing Repuaion- Based Trus for Peer-o-Peer Elecronic Communiies, IEEE Trans. on Knowledge and Daa Engineering, vol. 16, no. 7, 2004, pp [37] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina, The EigenTrus Algorihm for Repuaion Managemen in P2P Neworks, 12h Inernaional Conference on World Wide Web, Budapes, Hungary, May 2003, pp [38] Z. Su e al., ServiceTrus: Trus Managemen in Service Provision Neworks, IEEE Inernaional Conference on Services Compuing, Sana Clara, CA, 2013, pp [39] J. H. Cho, I. R. Chen, and P. G. Feng, "Effec of Inrusion Deecion on Reliabiliy of Mission-Oriened Mobile Group Sysems in Mobile Ad Hoc Neworks," IEEE Transacions on Reliabiliy, vol. 59, no. 1, 2010, pp [40] H. Al-Hamadi and I. R. Chen, Adapive Nework Defense Managemen for Counering Smar Aack and Selecive Capure in Wireless Sensor Neworks, IEEE Transacions on Nework and Service Managemen, 2015, in press. [41] R. Michell and I. R. Chen, Modeling and Analysis of Aacks and Couner Defense Mechanisms for Cyber Physical Sysems, IEEE Transacions on Reliabiliy, 2015, in preess. [42] R. Michell and I. R. Chen, Behavior Rule Based Inrusion Deecion Sysems for Safey Criical Smar Grid Applicaions, IEEE Transacions on Smar Grid, vol. 4, no. 3, Sep. 2013, pp
Simple Network Management Based on PHP and SNMP
Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper
More informationLearning in Games via Opponent Strategy Estimation and Policy Search
Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen
More informationAn efficient approach to improve throughput for TCP vegas in ad hoc network
Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc
More informationNetwork management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);
QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is
More informationsource managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The
Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)
More informationImplementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)
Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,
More informationRecommendations Based QoS Trust Aggregation and Routing in Mobile Adhoc Networks
215 Recommendaions Based QoS Trus Aggregaion and Rouing in Mobile Adhoc Neworks Nageswararao Sirisala 1 and C.Shoba Bindu 2 1 CSE Dep, Vardhaman College of Engg, Hyderabad, India 2 CSE Dep, JNTUACE, Ananapur,
More informationCoded Caching with Multiple File Requests
Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a
More informationCOSC 3213: Computer Networks I Chapter 6 Handout # 7
COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:
More informationWeb System for the Remote Control and Execution of an IEC Application
Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,
More informationLet s get physical - EDA Tools for Mobility
Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened
More informationReliability Analysis for Cryptographic Key Management
Reliabiliy Analysis for Crypographic Key Managemen 1 Sheng Xiao, 2 Weibo Gong, 3 Don Towsley, 4, 5 Qingquan Zhang, 5 Ting Zhu 1 College of Informaion Science and Engineering, Hunan Universiy, China 2 Dep.
More informationDifficulty-aware Hybrid Search in Peer-to-Peer Networks
Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn
More informationPART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR
. ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral
More informationThe Impact of Product Development on the Lifecycle of Defects
The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes
More informationOpen Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u
Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing
More informationPerformance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks
Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks
More informationAnalysis of Various Types of Bugs in the Object Oriented Java Script Language Coding
Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened
More informationChapter 8 LOCATION SERVICES
Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home
More informationScheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012
EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule
More informationVulnerability Evaluation of Multimedia Subsystem Based on Complex Network
JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 439 Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College,
More informationVisual Indoor Localization with a Floor-Plan Map
Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson
More informationProtecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches
Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2
More informationSelective Offloading in Mobile Edge Computing for the Green Internet of Things
EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan
More informationA time-space consistency solution for hardware-in-the-loop simulation system
Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong
More informationImproving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services
Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585
More informationA Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services
A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:
More informationLess Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks
Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research
More informationAn Adaptive Spatial Depth Filter for 3D Rendering IP
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod
More informationReinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi
Reinforcemen Learning by Policy Improvemen Making Use of Experiences of The Oher Tasks Hajime Kimura and Shigenobu Kobayashi Tokyo Insiue of Technology, JAPAN genfe.dis.iech.ac.jp, kobayasidis.iech.ac.jp
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing
More informationLecture 18: Mix net Voting Systems
6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified
More informationCAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL
CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz
More informationPERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS
PERFORMANCE OF TCP CONGESTION CONTROL IN UAV NETWORKS OF VARIOUS RADIO PROPAGATION MODELS Jun Peng Elecrical Engineering Deparmen, Universiy of Texas Rio Grande Valley, Edinburg, Texas, USA ABSTRACT Unmanned
More informationVideo streaming over Vajda Tamás
Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.
More informationLHP: An end-to-end reliable transport protocol over wireless data networks
LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.
More information4 Error Control. 4.1 Issues with Reliable Protocols
4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can
More informationVideo Content Description Using Fuzzy Spatio-Temporal Relations
Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer
More informationOpportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links
1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding
More informationImage segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding
Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same
More informationAccelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng
3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions
More informationA Matching Algorithm for Content-Based Image Retrieval
A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using
More informationRule-Based Multi-Query Optimization
Rule-Based Muli-Query Opimizaion Mingsheng Hong Dep. of Compuer cience Cornell Universiy mshong@cs.cornell.edu Johannes Gehrke Dep. of Compuer cience Cornell Universiy johannes@cs.cornell.edu Mirek Riedewald
More informationWINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering
WINNOWING : Proecing P2P Sysems Agains Polluion By Cooperaive Index Filering Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song Deparmen of Compuer Science Norh Carolina Sae Universiy Raleigh, NC
More informationMichiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters
SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy
More informationRestorable Dynamic Quality of Service Routing
QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX, NO. XX, XX XXXX 1
This is he auhor's version of an aricle ha has been published in his journal. Changes were made o his version by he publisher prior o publicaion. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. XX,
More informationAutonomic Cognitive-based Data Dissemination in Opportunistic Networks
Auonomic Cogniive-based Daa Disseminaion in Opporunisic Neworks Lorenzo Valerio, Marco Coni, Elena Pagani and Andrea Passarella IIT-CNR, Pisa, Ialy Email: {marco.coni,andrea.passarella,lorenzo.valerio}@ii.cnr.i
More informationA GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER
A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.
More informationDynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles
Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial
More informationDistributed Task Negotiation in Modular Robots
Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion
More informationUser Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System
Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded
More informationAn Efficient Delivery Scheme for Coded Caching
201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy
More informationNetwork Slicing for Ultra-Reliable Low Latency Communication in Industry 4.0 Scenarios
1 Nework Slicing for Ulra-Reliable Low Laency Communicaion in Indusry 4.0 Scenarios Anders Ellersgaard Kalør, René Guillaume, Jimmy Jessen Nielsen, Andreas Mueller, and Pear Popovski arxiv:1708.09132v1
More informationAn Experimental QoS Manager Implementation
An Experimenal QoS Manager Implemenaion Drago Žagar, Goran Marinović, Slavko Rupčić Faculy of Elecrical Engineering Universiy of Osijek Kneza Trpimira 2B, Osijek Croaia drago.zagar@efos.hr Absrac-- Qualiy
More informationA Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication
Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun
More informationCoded Caching in a Multi-Server System with Random Topology
Coded Caching in a Muli-Server Sysem wih Random Topology iish Mial, Deniz Gündüz and Cong Ling Deparmen of Elecrical and Elecronic Engineering, Imperial College London Email: {n.mial, d.gunduz, c.ling}@imperial.ac.uk
More informationMATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008
MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o
More informationM(t)/M/1 Queueing System with Sinusoidal Arrival Rate
20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra
More informationA Progressive-ILP Based Routing Algorithm for Cross-Referencing Biochips
16.3 A Progressive-ILP Based Rouing Algorihm for Cross-Referencing Biochips Ping-Hung Yuh 1, Sachin Sapanekar 2, Chia-Lin Yang 1, Yao-Wen Chang 3 1 Deparmen of Compuer Science and Informaion Engineering,
More informationLow-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany
Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,
More informationDefinition and examples of time series
Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is
More informationSEINA: A Stealthy and Effective Internal Attack in Hadoop Systems
SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey
More informationI. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.
Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1
More informationCHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING
CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder, Jun Wang and Jie Shan Geomaics Engineering, School of Civil Engineering, Purdue Universiy 550 Sadium Mall Drive, Wes
More informationMultiple View Discriminative Appearance Modeling with IMCMC for Distributed Tracking
Muliple View Discriminaive ing wih IMCMC for Disribued Tracking Sanhoshkumar Sunderrajan, B.S. Manjunah Deparmen of Elecrical and Compuer Engineering Universiy of California, Sana Barbara {sanhosh,manj}@ece.ucsb.edu
More informationAssignment 2. Due Monday Feb. 12, 10:00pm.
Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how
More informationDesign Alternatives for a Thin Lens Spatial Integrator Array
Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of
More informationIntentSearch:Capturing User Intention for One-Click Internet Image Search
JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang
More informationMIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch
CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple
More informationVoltair Version 2.5 Release Notes (January, 2018)
Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For
More informationAutomatic Calculation of Coverage Profiles for Coverage-based Testing
Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a
More information4. Minimax and planning problems
CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems
More informationMOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018
MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationMOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:
MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically
More informationTowards a Realistic Model for Failure Propagation in Interdependent Networks
Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,
More informationEvaluation and Improvement of Multicast Service in b
Evaluaion and Improvemen of Mulicas Service in 802.11b Chrisian Bravo 1 and Agusín González 2 1 Universidad Federico Sana María, Deparmen of Elecronics. Valparaíso, Chile chbravo@elo.ufsm.cl 2 Universidad
More informationImproving Occupancy Grid FastSLAM by Integrating Navigation Sensors
Improving Occupancy Grid FasSLAM by Inegraing Navigaion Sensors Chrisopher Weyers Sensors Direcorae Air Force Research Laboraory Wrigh-Paerson AFB, OH 45433 Gilber Peerson Deparmen of Elecrical and Compuer
More informationMB86297A Carmine Timing Analysis of the DDR Interface
Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl
More informationEP2200 Queueing theory and teletraffic systems
EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help
More informationDesign and Application of Computer-aided English Online Examination System NONG DeChang 1, a
3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi
More informationThwarting Blackhole Attacks in Distruption-Tolerant Networks using Encounter Tickets
Thwaring lackhole acks in Disrupion-Toleran Neworks using ncouner Tickes Feng Li, Jie Wu Dep. of ompuer Science and ngineering Florida lanic Universiy oca Raon, FL 33431 vinash Srinivasan Dep. of Mah,
More informationLocation. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471
Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae
More informationSTEREO PLANE MATCHING TECHNIQUE
STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo
More informationNRMI: Natural and Efficient Middleware
NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac
More informationMORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES
MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image
More informationNonparametric CUSUM Charts for Process Variability
Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand
More informationAudio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,
More informationRelevance Ranking using Kernels
Relevance Ranking using Kernels Jun Xu 1, Hang Li 1, and Chaoliang Zhong 2 1 Microsof Research Asia, 4F Sigma Cener, No. 49 Zhichun Road, Beijing, China 100190 2 Beijing Universiy of Poss and Telecommunicaions,
More informationThis is the published version of a paper presented at The 2013 IEEE International Conference on Internet of Things, Beijing, China, August 2013.
hp://www.diva-poral.org This is he published version of a paper presened a The 2013 IEEE Inernaional Conference on Inerne of Things, Beijing, China, 20-23 Augus 2013. Ciaion for he original published paper:
More informationHandling uncertainty in semantic information retrieval process
Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,
More informationOn the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs
On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a
More informationReal Time Integral-Based Structural Health Monitoring
Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy
More informationResearch Article A Priority-Based CSMA/CA Mechanism to Support Deadline-Aware Scheduling in Home Automation Applications Using IEEE
Hindawi Publishing Corporaion Inernaional Journal of Disribued Sensor Neworks Volume 213, Aricle ID 13984, 12 pages hp://dx.doi.org/1.1155/213/13984 Research Aricle A Prioriy-Based CSMA/CA Mechanism o
More informationOutline. EECS Components and Design Techniques for Digital Systems. Lec 06 Using FSMs Review: Typical Controller: state
Ouline EECS 5 - Componens and Design Techniques for Digial Sysems Lec 6 Using FSMs 9-3-7 Review FSMs Mapping o FPGAs Typical uses of FSMs Synchronous Seq. Circuis safe composiion Timing FSMs in verilog
More informationCENG 477 Introduction to Computer Graphics. Modeling Transformations
CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World
More informationA Web Browsing Traffic Model for Simulation: Measurement and Analysis
A Web Browsing Traffic Model for Simulaion: Measuremen and Analysis Lourens O. Walers Daa Neworks Archiecure Group Universiy of Cape Town Privae Bag, Rondebosch, 7701 Tel: (021) 650 2663, Fax: (021) 689
More informationA MAC layer protocol for wireless networks with asymmetric links
A MAC layer proocol for wireless neworks wih asymmeric links Guoqiang Wang, Damla Turgu, Ladislau Bölöni, Yongchang Ji, Dan C. Marinescu School of Elecrical Engineering and Compuer Science, Universiy of
More informationAn Improved Square-Root Nyquist Shaping Filter
An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com
More informationPartition-based document identifier assignment (PBDIA) algorithm. (long queries)
( ) Pariion-based documen idenifier assignmen (PBDIA) algorihm PBDIA (long queries) (parallel IR) :,,,, d-gap Compressing an invered file can grealy improve query performance of an informaion rerieval
More information