Vulnerability Evaluation of Multimedia Subsystem Based on Complex Network
|
|
- Emery Flowers
- 5 years ago
- Views:
Transcription
1 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST Vulnerabiliy valuaion of Mulimedia Subsysem Based on Complex ewor Xiaoling Tang Insiue of Higher ducaion Research, Jilin Business and Technology College, Changchun, China Absrac IP mulimedia subsysems bring huge securiy hreas o he IMS-based nex-generaion newors alhough hey bring IMS-based newor inegraion and business abiliy enhancemen. Therefore, he research on he vulnerabiliy of IP mulimedia subsysems aracs widespread aenion recenly. In his aricle, he securiy hreas of nex-generaion core newors are discussed firs. And hen we analyze he vulnerabiliy characerisics of IP mulimedia subsysems. In order o evaluae he vulnerabiliy of IP mulimedia subsysems effecively, his paper furher applies he complex newor heory o consruc he newor model of IP mulimedia subsysem and propose he vulnerabiliy assessmen indicaor by adoping enropy model. Finally, some simulaion experimens and resul analysis are provided o our evaluaion model. Boh heoreical analysis and numerical simulaions indicae ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of his ind of IP mulimedia subsysems. In addiion, he proposed mehod provides a new idea and scienific basis for he vulnerabiliy assessmen of IP mulimedia subsysems. Index Terms IP Mulimedia Subsysem, ewor Safey, Vulnerabiliy Assessmen, Complex ewor Theory, nropy Model I. ITRODUCTIO Many real-life newors such as he Inerne, power grids and oher self-organizing newors exhibi complex feaures [, 2, 3]. These newors are imporan componens of our daily lives. Their safeies can seriously impac he economic developmen and social sabiliy. Therefore, he relaed researches on he newor safey have araced increasing aenion in recen decades [4, 5, 6]. For compuer newors, heir securiy is more and more imporan. Therefore, i is urgen o develop a suie of measurable and quaniaive merics o evaluae heir vulnerabiliy and furher propose schemes o proec hem. specially, IP mulimedia subsysem is an imporan concep proposed by he mos auhoriaive indusry organizaions 3GPP in he field of 3G mobile communicaions in March 22 [7, 8]. As he core of he nex generaion newors, is funcion eniy is numerous, and he vulnerabiliy disribuion is complicaed [9,, ]. Only when he vulnerabiliy of IP mulimedia subsysems can be evaluaed effecively, we can find ou he ey facors which lead o he securiy performance hreas of IP mulimedia subsysems and conrol he source of securiy hreas wihin IP mulimedia subsysems effecively [2, 3]. Furhermore, we can obain he objecive evaluaion according o various vulnerabiliy impacs on IP mulimedia subsysems. And hen he resilience of IP mulimedia subsysems will be improved and enhanced. Recenly, 3GPP and 3GPP2 Organizaions have proposed he securiy sandards on IP mulimedia subsysems. However, he sudy on he safey of IP mulimedia subsysems is sill in is infancy, which is insufficien o mee he securiy needs. A he same ime, i is difficul o follow he newor safey sandard because he acual configuraion of IP mulimedia subsysems needs o consider he acual condiions and he specific newor needs. Furhermore, in he operaion and mainenance process of IP mulimedia subsysems, here exis oher facors, such as he human negligence and misaes and so on. All hese will lead o securiy hreas of IP mulimedia subsysems. In order o find ou he weanesses of IP mulimedia subsysems, he source of safey hreas and he possibiliy of leaed informaion, he vulnerabiliy assessmen of IP mulimedia subsysems are very imporan and demanding o solve. In his way, he proecion program of IP mulimedia subsysems can be obained. On his basis, we can furher selec and deermine he safey conrol measures o avoid ransfer or reduce he losses. The early IP mulimedia subsysems are he firs sep in he migraion pah. They olerae he differen nown limiaions of securiy which could be challenging o sele in real-life operaions. However, he early IP mulimedia subsysem is omi consciously bu no wihou emphasizing he imporance of considering he sharply decreased securiy [7]. Furhermore, he vulnerabiliy of IP mulimedia subsysem implemenaions and high level service provider securiy demands were examined. And hen an implemenaion mehod o provide he desired degree of safey for IP mulimedia subsysem deploymens was defined [4]. Considering ha communicaions service provider mus deermine how o handle he influences of securiy flaws, a new mehod was emphasized in reference [5], wih examples o deermine he influence of safey-relaed malfuncions and he ey design elemens which are relaed wih modeling service reliabiliy. However, he safey research resuls on IP mulimedia subsysem are relaively lacing in spie of he core posiion of IP 23 ACADMY PUBLISHR doi:.434/jmm
2 44 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 mulimedia subsysem in nex-generaion newors. So far, he vulnerabiliy evaluaion echnology of domesic and inernaional mainsream mainly consis of newor survivabiliy analysis echniques [6], aac ree echnology [7], graph-based newor vulnerabiliy analysis echniques [8, 9]. The above echnologies in solving he problem of vulnerabiliy have some defecs and shorcomings. Acually, he vulnerabiliy assessmen of IP mulimedia subsysem should be a complex nonlinear problem since he vulnerabiliy of IP mulimedia subsysems is uncerain. Considering ha IP mulimedia subsysems are in he core posiion in he nex generaion newors and he exising problems, in his aricle, he securiy hreas of nex-generaion core newors are discussed and he vulnerabiliy characerisics of IP mulimedia subsysems are analyzed firs. And hen we use complex newor heory o build a newor model of IP mulimedia subsysem. According o he characerisics of IP mulimedia subsysem newors, a new soluion for he vulnerabiliy evaluaion of IP mulimedia subsysem newors is pu forward on he basis of he enropy model. Finally, we provide some simulaion experimens and resul analysis o proof he effeciveness of our evaluaion model. Boh heoreical analysis and numerical simulaions indicae ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of his ind of IP mulimedia subsysems. In addiion, he proposed mehod presens a new soluion mehod for he vulnerabiliy measuremen of IP mulimedia subsysem newors and provides basis for he esablishmen of securiy policy of IP mulimedia subsysems. measures before he aac on he IP mulimedia subsysem newors are invesigaed. This mehod has a more pracical significance o service providers as well as he majoriy of users because i focuses on he difficuly and he impac ha an aacer explois he vulnerabiliy of IP mulimedia subsysem newors. An imporan consideraion is provided o maerial uilizaion cos and ime uilizaion cos which are no direcly associaed wih he vulnerabiliy of IP mulimedia subsysem newors, bu acually are closely relaed o he facors of heir vulnerabiliy uilizaion. On he basis of consideraion, we analyze he vulnerabiliy characerisics of IP mulimedia subsysems and furher presen he assessmen mehod. The proposed vulnerabiliy assessmen of IP mulimedia subsysems is considered saring wih he possibiliy of vulnerabiliy uilizaion firs. Secondly, he consequence of vulnerabiliy uilizaion is an imporan facor which is considered by aacers. Synheically considering above wo aspecs, we obain he following evaluaion facors of vulnerabiliy. The deailed represenaion is as follows. II. VULRABILITY OF IP MULTIMDIA SUBSYSTM AD IP MULTIMDIA SUBSYSTM TWORK Figure. Index sysem of vulnerabiliy assessmen model. A. Vulnerabiliy of IP Mulimedia Subsysem The vulnerabiliy research of compuer newors can be divided ino several problem areas which include vulnerabiliy definiion, vulnerabiliy idenificaion, and vulnerabiliy analysis and vulnerabiliy assessmen. In general, he main purpose of he vulnerabiliy assessmen is he righ vulnerabiliy scoring or raing, he qualiaive and quaniaive analysis of he sysem vulnerabiliy. The sysem can be a service, a compuer on he newor or he compuer newor. In he field of newor securiy, he vulnerabiliy assessmen and he inrusion deecion of sysems, firewalls, virus deecion are four elemens in newor securiy. The research for vulnerabiliy assessmen of IP mulimedia subsysems is sill in is infancy, here are no sysemaic research resuls up o now. Addiionally, i is difficul o obain he facors of vulnerabiliy assessmen. Therefore, according o he curren siuaion of vulnerabiliy assessmen of IP mulimedia subsysems, he analysis mehod of vulnerabiliy dimension srucure is inroduced in his paper firs. The proposed evaluaion mehod considers he securiy reasons of IP mulimedia subsysems mainly from malicious users or aacers perspecive. Defense IP mulimedia subsysems are vulnerable o aacs and malfuncions. The mos imporan reason is ha here are many weanesses in hemselves. Once an aacer explois hese vulnerabiliies, hey are easy o succeed. The vulnerabiliies of IP mulimedia subsysems include he sysem vulnerabiliy which exiss iniially and he poenial vulnerabiliy which is brough by he laer increased safey measures. In oher word, he vulnerabiliy of IP mulimedia subsysems refers o he number of loopholes in he sysem and he resuling damage degree o he poenial hreas. I is an imporan indicaor o measure safey performance of an IP mulimedia subsysem. In general, if he vulnerabiliy degree of an IP mulimedia subsysem is small, i is more secure. Here, he vulnerabiliy of IP mulimedia subsysems is divided ino four caegories: logic errors, sysem flaws, social engineering and sraegy negligence. ach caegory in he above four caegories can be subdivided ino several subcaegories. In order o be convenien o calculae hem, here he facor se of vulnerabiliy assessmen and is corresponding subse of facors are designed. According o he acual siuaion, he weigh is given according o various facors, as shown in Table. 23 ACADMY PUBLISHR
3 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST TABL I. OUR PROPOSD VULRABILITY VALUATIO FACTORS OF IP MULTIMDIA SUBSYSTM Level indicaors Weighs Logic errors.25 Sysem flaws Social engineering Sraegy negligence Secondary indicaors Sysem bug; Hardware bug Firewall filering rules; Securiy conrol measures Adminisraor service qualiy; personnel securiy awareness of IP mulimedia subsysem Securiy policy defecs; Implemenaion effeciveness of securiy policy The corresponding level of he weigh of he higher level.65;.35.35;.65.4;.6.5;.5 Figure 2. Informaion exchange lin graph wihin IP mulimedia subsysem newor B. IP Mulimedia Subsysem ewor based on Complex ewor Theory Wih he rapid developmen of IP mulimedia subsysem, newor consisency rule becomes a very acive opic in newor dynamics. Since small world newors and scale-free newors are proposed, complex newors have become he popular research opic in various disciplines. Some basic conceps and characerisic quaniies such as he shores pah, degree disribuion, clusering coefficien, beweenness and so on are pu forward gradually o describe he opology characerisics and dynamic properies of complex newors. I is found ha here are wo basic characerisics which are large average clusering coefficien and shores pah. Similar wih social relaion feaure in social newor, he acual newors also include a communiy srucure. Tha is, he inner connecion beween nodes of each communiy is very close. These characerisics have paved he way for he sudy of IP mulimedia subsysems. Based on he characerisic analysis of he vulnerabiliy of IP mulimedia subsysems, he archiecure-based vulnerabiliy approach is adoped o invesigae IP mulimedia subsysem newors by combining complex newor heory. The archiecure of is given by is probabilisic conrol flow graph. In his aricle, a graph G is defined by a non-empy se of nodes H and a nonempy se of edges L : G ( H, L), where H v v2 v L { e, e2,, e M } {,,, } is he se of nodes and is he se of edges. The oal number of nodes in he se H is, and he oal number of edges in he se L is M. In an IP mulimedia subsysem, informaion exchange behavior always occurs a he poin. The main funcion of he subsysems is o connec wo relaively independen componens ogeher. We will also regard any pair of poins allow access as a lin, as is shown in Figure 2. Figure 3. Virual represenaion of IP mulimedia subsysem newor In he following, we mae ensure he componens of IP mulimedia subsysem newor. Then he exchange relaions of informaion and energy among componens are invesigaed he beween componens. When here is he exchange of maer or energy beween he wo componen nodes exising wihin he IP mulimedia subsysem, an edge beween hem is deermined. The odes represen he componens of he applicaion. The edges represen he flow of conrol among he componens. ewors can be direced or undireced. Undireced newors are composed by edges connec a pair of nodes in a ransiive fashion. everheless, direced newors are composed only by direced edges connecing a pair of nodes hrough a given direcion. In general, direced edges are showed by an arrow represening he direcion of he connecion beween a pair of nodes. Here, we will exrac IP mulimedia subsysem ino a direced newor. In order o obain he corresponding adjacency marices of IP mulimedia subsysem, we collec daa and invesigae he relaions among componen nodes and hen obain he adjacency marix. Figure 3 represens he probabilisic conrol flow graph of an IP mulimedia subsysem newor by using UCIT 6., which consiss of 6 nodes. III. PROPOSD SCHM For IP mulimedia subsysem newor, he wo main indicaor of he informaion flow is he imeliness and accuracy of he informaion ransmission, as well as 23 ACADMY PUBLISHR
4 442 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 informaion securiy, namely he newor vulnerabiliy. Considering hese hree aspecs, we use he enropy o consruc he vulnerabiliy assessmen model of IP mulimedia subsysem newor. Based on he above analysis of he vulnerabiliy of IP mulimedia subsysem newors, he uncerainy of microscopic sae of IP mulimedia subsysem newors is described by he enropy in he following. I is relaed wih he number of he possible microscopic saes under macroscopic saes and also wih he occurrence probabiliy of he differen microscopic saes. The enropy reflecs he realiy connecion beween he nodes wihin he newor. The maximum enropy m represens he maximum value of he newor enropy, which represens he mos chaoic sae of he IP mulimedia subsysem newor. The raio of he presen newor enropy and he maximum newor enropy reflecs he unorganized exen of he IP mulimedia subsysem newor. Therefore, we define he ordered degree of an IP mulimedia subsysem newor as follows. R () The value of R characerizes he degree of organizaion of he newor. I is larger, which means ha he ordered degree of newor is higher and heir organizaion is more efficien. In he following, we define he ordered degree of a newor based on he accuracy and newor survivabiliy during informaion ransmission of IP mulimedia subsysem newor respecively in his aricle. And hen we synheically consider he wo aspecs. In his way, newor evaluaion model is proposed on he basis of he consideraion for he accuracy of he response and he newor ani-desroying abiliy. ewor qualiy reflecs he accuracy of he informaion flow beween he nodes in he newor. The qualiy enropy characerizes he size of he uncerainies of informaion qualiy. The oal qualiy enropy is defined as follows. m ( ) (2) p ( )log p ( ) (3) where p ( ) is node o achieve he qualiy of he micro-sae probabiliy? The expression of p ( ) is as follows. p ( ) d d where d is he number of nodes which is direcly lined o node. I is also he above-menioned node degree in IP mulimedia subsysem newor. (4) The maximum qualiy enropy of IP mulimedia subsysem newor is defined as follows. m log d (5) Thus, he qualiy ordered degree is as following. R (6) m Cluser coefficien C represens he cluser level among nodes in he newor. I describes he aggregaion sae of nodes wihin newor. For he cluser coefficien of any node, he following definiion is adoped: C 2 d ( d ) where is he number of acual exising edges among d( d ) neighboring nodes of node. is he maximum 2 connecion number among all neighboring nodes of node. Thus, he average cluser coefficien of he enire IP mulimedia subsysem newor is as follows. C (7) C (8) Obviously, C. Ani-desroying abiliy reflecs he sabiliy size of he newor srucure under differen aac sraegy. Anidesroying enropy describes he uncerainy size of he newor srucure ani-desroying abiliy. Ani-desroying enropy of node characerizes he uncerainy size of he ani-desroying abiliy of node, which is defined as following. ( ) p ( )log p ( ),,2,..., (7) where p ( ) 2 is he microsaes ani-desroying probabiliy of node and he following expression of p ( ) 2 is adoped: p ( ) 2 C According o q. (7) and q. (8), we define ha he ani-desroying enropy of IP mulimedia subsysem newor is as following. ( ) 2 2 C p ( )log p ( ) 2 2 The maximum ani-desroying enropy of IP mulimedia subsysem newor is defined as follows. (8) (9) 23 ACADMY PUBLISHR
5 G R JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST m log C () Thus, he qualiy ordered degree is as following. R 2 2 () 2m The vulnerabiliy measuremen is denoed by R. In order o consider he wo main facors of he accuracy of he informaion ransmission and informaion securiy synheically, he following vulnerabiliy measuremen of IP mulimedia subsysem newor is adoped based on q. (6) and q. (). R R R (2) 2 where and are he weigh coefficiens respecively. In m is he same case, if R is larger, he ordered degree of IP mulimedia subsysem newor is higher. In oher words, IP mulimedia subsysem newor is more efficien. Therefore, he value of R could characerize he vulnerabiliy of IP mulimedia subsysem newor well. To mae a meaningful comparison, we inroduce anoher definiion o discuss he vulnerabiliy of he IP mulimedia subsysem newors. We invesigae heir global conneciviy. A parameer G is proposed o measure he global conneciviy, which is defined as follows. G (3) where is he number of he nodes which can mainain he normal operaions before cascading breadowns, and is he number of he nodes of he whole newor which can mainain he normal operaions a presen. We define ha he load of node is as following. L C ( ) B ( ) ij i jh ij ( ) (4) where ij is he number of all he shores pahs beween node i and node j, ( ) is he number of he shores ij pahs hrough node beween node i and node j. The capaciy of a node represens he maximum load ha he node can olerae. In IP mulimedia subsysem newors, he capaciy of a node is limied by he corresponding cos. Here, we assume ha he capaciy C of node o be proporional o is iniial load, i.e., C ( ) L () ij ( ) (5) i j H ij ( ) ( ) where he parameer is he olerance parameer which reflecs he resisance o he aacs and malfuncions, According o he acual siuaion, L () is calculaed by q.(4) and he capaciy C of node is calculaed by q.(5) in our simulaions. IV. UMRICAL RSULTS In he simulaions, we choose.5 and.5. We use Malab2 as a programming language. In order o implemen our model, he Floyd Warshall algorihm is uilized in his leer. This algorihm follows a dynamic programming mehod o calculae he shores pahs beween all verices of an IP mulimedia subsysem newor. Based on he proposed vulnerabiliy assessmen mehod of IP mulimedia subsysem newor, he IP mulimedia subsysem newor model including 6 nodes will be applied o illusrae he vulnerabiliy of he IP mulimedia subsysem newors which is subjeced o malicious aacs. The beweenness for a node is he number of shores pahs passing hrough he node. We adop he highes beweenness node-based aac o explore he vulnerabiliy phenomenon of he IP mulimedia subsysem newor. If here are some nodes have equivalen beweenness, we choose he node wih he highes degree as he aaced node Figure 4. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of Figure 5. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of.. 23 ACADMY PUBLISHR
6 R G G R 444 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST Figure 6. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of Figure 7. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of Figure 8. The relaion beween he proposed measuremen R and he runime by removing he node wih highes beweenness under our model in he case of.3. In Figs. 4-9, he dynamical behaviors of our proposed vulnerabiliy measuremen based on enropy and he damage size during failure propagaion are repored for an IP mulimedia subsysem newor of 6 nodes a he cases of differen values of he parameer. To mae a meaningful comparison, From Figs. 4, 6 and 8, we can see ha he value of R for a larger cascade increases much more sharply han ha for a smaller one even a he very early sage of malfuncion propagaion when he node wih he larges beweenness is aaced. Therefore, he proposed vulnerabiliy measuremen of IP mulimedia subsysem newor can help us o idenify he larger damage a he very early sage of malfuncion propagaion. I is of grea significance in he prevenion of major accidens in IP mulimedia subsysems. I is because ha he major accidens are no disinc from he smaller malfuncions on he enire scales a he early period of acciden propagaion. In addiion, as shown in Figs. 4, 6 and 8, we also find ha he value of R increases o a pea value and hen decreases o a saionary value during he process of malfuncion propagaion. In oher words, i increases o a maximal value and hen mainains almos unchanged. This resul shows ha our mehod can mae us find he malfuncions and dissolve locally in ime. Thus, he malfuncions from propagaing hroughou he IP mulimedia subsysem newor are prevened effecively Figure 9. The relaion beween he damage size G and he runime by removing he node wih highes beweenness under our model in he case of.3. Figs. 5, 7 and 9 depic he dynamical evolving behaviors of damage size during he malfuncion propagaion in he IP mulimedia subsysem newor of 6 nodes, a he cases of differen values of he parameer. In many IP mulimedia subsysem newors, he parameer is severely limied by he sysem cos. Therefore, our simulaions adop differen values of parameer o invesigae he IP mulimedia subsysem newor. We examine he impac of differen node capaciy of α on he IP mulimedia subsysem newors, as is shown in Figs The comparison resuls of he dynamics of he value of R and damage scale R during malfuncion propagaion are shown in Figs. 4-. We can see ha he value of parameer has significan influence on he malfuncion propagaion in IP mulimedia subsysem newor. Since he value of parameer is limied by he cos of an IP mulimedia subsysem, we should consruc he load disribuion of he IP mulimedia subsysem newors as homogenous as possible o decrease he vulnerabiliy agains he major incidens. By simulaions, we see ha our resuls are in agreemen wih easily he real-life IP mulimedia 23 ACADMY PUBLISHR
7 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST subsysem. For example, in an IP mulimedia subsysem, he more equal he exchange informaion capaciy is, he more sable he IP mulimedia subsysem becomes. Consequenly, our proposed vulnerabiliy evaluaion based on enropy can be used as an indicaor o measure and conrol he vulnerabiliy of IP mulimedia subsysem newors. V. COCLUSIO IP mulimedia subsysem newors provide a powerful IP session-based core for advanced services in nexgeneraion newors. They mus be suiable o mee cusomer needs and service provider. IP mulimedia subsysems are designed o be a generic service enabler plaform which includes he availabiliy requiremens of he presen elecommunicaion operaors newors. In order for faciliae he operaions of his complex and cosly archiecure, we will a pleny of aracive services obaining high user accepance. The vulnerabiliy of he IP mulimedia subsysem user equipmen is also a serious safey hrea. A presen, he vulnerabiliy sudy of IP mulimedia subsysems in is infancy, no more influence resuls are pu forward by auhoriaive expers or insiuions. Therefore, i is no easy for us o quanify each evaluaion aribues of he vulnerabiliy for IP mulimedia subsysem newors. There is oo lile safey and oo many resricions imposed upon he users and cusomers ha mae operaing adequae securiy of IP mulimedia subsysems such a grand challenge. The enropy is iniially inroduced as a hermodynamic concep. I is a measure for he sysem disorder. The enropy is widely used due o is unique conen and peneraion. Recenly, as a physical descripion of complex sysem srucure, he enropy is more and more aenion and becomes an imporan research ool for complex sysems in he heory of complex sysems [2, 2]. The macro significance of enropy is a measuremen for he uniformiy of he sysem energy disribuion. The change direcion of he complex sysem sae can be expressed by he enropy. The energy disribuion is more uniform, he greaer he enropy is. Based on his, in order o avoid subjecive weighing mehod of uncerainy caused by he vague and conroversial and deermine he scienific and reasonable vulnerabiliy evaluaion mehod, we inroduce he concep of enropy o explore he vulnerabiliy of IP mulimedia subsysem newors. In his paper, on he basis of he emergence complex newor heory in recen years, we analyze complex feaures of IP mulimedia subsysem newors and explore he facors of he vulnerabiliy uilizaion for IP mulimedia subsysem newors. Based on he vulnerabiliy analysis, we inroduce he complex newor o build a newor model according he feaures of IP mulimedia subsysems. The concep of he newor enropy is proposed o quanify he vulnerabiliy of IP mulimedia subsysem newors. Finally, we provide some simulaion experimens and resul analysis o confirm he effeciveness and he pracicaliy of our evaluaion model. Boh numerical simulaion resuls show ha he proposed vulnerabiliy measuremen is a simple and effecive new mehod o evaluae he overall vulnerabiliy of IP mulimedia subsysems. The proposed mehod provides a new soluion mehod for he vulnerabiliy measuremen of IP mulimedia subsysem newors and also provides basis for he esablishmen of securiy policy of IP mulimedia subsysems. RFRCS [] S. V. Buldyrev, R. Parshani, G. Paul, H.. Sanley, and S. Havlin, Caasrophic cascade of failures in inerdependen newors, aure, vol. 464, pp. 25, 2. [2] P. S. Kousourelais, Assessing srucural vulnerabiliy agains earhquaes using muli-dimensional fragiliy surfaces: a Bayesian framewor, Probab. ng. Mech, vol. 25, pp. 49-6, 2. [3] M.. J. ewman, The srucure and funcion of complex newors, Siam Review, vol. 45, pp , 23. [4] A. A. Moreira, J. S. Andrade, H. J. Herrmann, and J. O. Indeeu, How o mae a fragile newor robus and vice versa, Physical Review Leers, vol. 2, pp. 87, 29. [5] Y. Q. Jiao, J. Weir and W. Q. Yan, Flame deecion in surveillance, Journal of Mulimedia, vol. 6(), pp , 2. [6] J. L. Wan and Y. H. Liu, Muli-regions exure subsiuion for image and video, Journal of Mulimedia, vol. 7(6), pp , 22. [7] Third Generaion Parnership Projec (3GPP). Securiy aspecs of early IP Mulimedia Subsysem (IMS) (Release 8).TR V.., 28. [8] J. L. Wan and Y. H. Liu, Signalling cases and QoS managemen wihin TISPA G residenial environmens, Journal of Mulimedia, vol. 2(2), pp , 27. [9] A. Barnawi, A. H Alalhi, M. R. J. Qureshi and A. I. Khan, valuaion of IP mulimedia subsysem based mobile mass examinaion sysem, I. J. Compuer ewor and Informaion Securiy, vol. 4, pp. -2, 22. [] J. H. Lee, Y. B. Huh, S. W. Woo and J. S. Sohn, Rouing mechanism for VoIP emergency calls in IP Mulimedia Sysem Advanced Communicaion Technology (ICACT), 2 The 2h Inernaional Conference on. Vol., pp , I, 2. [] C. Y. Chen, K. D. Chang, J. L. Chen and H. C. Chao, xending emergency services coverage in cooperaive IMS newors, Inernaional Journal of Auonomous and Adapive Communicaions Sysems, vol. 5(4), pp , 22. [2] P. Bellavisa, G. Cardone, A. Corradi and L. Foschini, The Fuure Inerne convergence of IMS and ubiquious smar environmens: An IMS-based soluion for energy efficiency, Journal of ewor and Compuer Applicaions, vol. 35(4), pp , 22. [3] A. Berger, I. Gojmerac and O. Jung, Inerne securiy mees he IP mulimedia subsysem: an overview, Securiy and Communicaion ewors, vol. 3(2-3), pp , 2. [4].. Anderlind, D. W. Faucher,. H. Grosse, e al., IMS securiy, Bell Labs Technical Journal, vol. (), pp , 26. [5] H. Pan, A. R. McGee, U. Chandrashehar and S. H. Richman, Opimal availabiliy and securiy for IMS-based VoIP newors, Bell Labs Technical Journal, vol. (3), pp , ACADMY PUBLISHR
8 446 JOURAL OF MULTIMDIA, VOL. 8, O. 4, AUGUST 23 [6] D. Farmer and W. Venema, Vulnerabiliy assessmen franwor, ewyor: CIAO Publicaion, pp , 26. [7] C. R. Ramarishnan and R. Sear, Survivabiliy analysis of newor specificaions, ew Yor: CIAO Publicaion, pp , 25. [8] L. Wang, S. oel and S. Jajodia, Minimum-cos newor hardening using aac graphs, Compuer Communicaions, vol. 29(8), pp , 26. [9] S. Jajodia and S. oel, Topological vulnerabiliy analysis, In Cyber Siuaional Awareness, Springer US, pp , 2. [2] M. Casera and M. C. odar, A cross enropy based algorihm for reliabiliy problems, Journal of Heurisics, vol. 5(5), pp , 29. [2] F. Aliparma and B. Dengiz, A cross enropy approach o design of reliable newors, uropean Journal of Operaional Research, vol. 99(2), pp , ACADMY PUBLISHR
A Matching Algorithm for Content-Based Image Retrieval
A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using
More informationSTEREO PLANE MATCHING TECHNIQUE
STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo
More informationImplementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)
Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,
More informationThe Impact of Product Development on the Lifecycle of Defects
The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes
More informationImproving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services
Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585
More informationSimple Network Management Based on PHP and SNMP
Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper
More informationVideo Content Description Using Fuzzy Spatio-Temporal Relations
Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer
More informationAn efficient approach to improve throughput for TCP vegas in ad hoc network
Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc
More informationDesign and Application of Computer-aided English Online Examination System NONG DeChang 1, a
3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi
More informationIDEF3 Process Description Capture Method
IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod
More informationCAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL
CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz
More informationOpen Access Research on an Improved Medical Image Enhancement Algorithm Based on P-M Model. Luo Aijing 1 and Yin Jin 2,* u = div( c u ) u
Send Orders for Reprins o reprins@benhamscience.ae The Open Biomedical Engineering Journal, 5, 9, 9-3 9 Open Access Research on an Improved Medical Image Enhancemen Algorihm Based on P-M Model Luo Aijing
More informationTowards a Realistic Model for Failure Propagation in Interdependent Networks
Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,
More informationLearning in Games via Opponent Strategy Estimation and Policy Search
Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen
More informationMORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES
MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image
More informationDesign Alternatives for a Thin Lens Spatial Integrator Array
Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of
More informationUser Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System
Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded
More informationAML710 CAD LECTURE 11 SPACE CURVES. Space Curves Intrinsic properties Synthetic curves
AML7 CAD LECTURE Space Curves Inrinsic properies Synheic curves A curve which may pass hrough any region of hreedimensional space, as conrased o a plane curve which mus lie on a single plane. Space curves
More informationAccelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng
3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions
More informationTest - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version
Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing
More informationVisual Indoor Localization with a Floor-Plan Map
Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson
More informationA Tool for Multi-Hour ATM Network Design considering Mixed Peer-to-Peer and Client-Server based Services
A Tool for Muli-Hour ATM Nework Design considering Mied Peer-o-Peer and Clien-Server based Services Conac Auhor Name: Luis Cardoso Company / Organizaion: Porugal Telecom Inovação Complee Mailing Address:
More informationCoded Caching with Multiple File Requests
Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a
More informationCOSC 3213: Computer Networks I Chapter 6 Handout # 7
COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:
More informationAn Adaptive Spatial Depth Filter for 3D Rendering IP
JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod
More informationThe Effects of Multi-Layer Traffic on the Survivability of IP-over-WDM Networks
The Effecs of Muli-Layer Traffic on he Survivabiliy of IP-over-WDM Neworks Peera Pacharinanakul and David Tipper Graduae Telecommunicaions and Neworking Program, Universiy of Pisburgh, Pisburgh, PA 15260,
More informationECO-friendly Distributed Routing Protocol for Reducing Network Energy Consumption
ECO-friendly Disribued Rouing Proocol for Reducing Nework Energy Consumpion Daisuke Arai and Kiyohio Yoshihara KDDI R&D Laboraories Inc. 2-1-15 Ohara Fujimino-shi Saiama, Japan Email: {di-arai, yosshy}@kddilabs.jp
More informationHandling uncertainty in semantic information retrieval process
Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,
More informationService Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks
Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available
More informationMoBAN: A Configurable Mobility Model for Wireless Body Area Networks
MoBAN: A Configurable Mobiliy Model for Wireless Body Area Neworks Majid Nabi 1, Marc Geilen 1, Twan Basen 1,2 1 Deparmen of Elecrical Engineering, Eindhoven Universiy of Technology, he Neherlands 2 Embedded
More informationWeb System for the Remote Control and Execution of an IEC Application
Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,
More informationVoltair Version 2.5 Release Notes (January, 2018)
Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For
More informationA time-space consistency solution for hardware-in-the-loop simulation system
Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong
More informationSTRING DESCRIPTIONS OF DATA FOR DISPLAY*
SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac
More informationFIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS
FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2
More informationProtecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches
Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2
More informationNetwork management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);
QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is
More informationLOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD
21 s Inernaional Conference on Composie Maerials Xi an, 20-25 h Augus 2017 LOW-VELOCITY IMPACT LOCALIZATION OF THE COMPOSITE TUBE USING A NORMALIZED CROSS-CORRELATION METHOD Hyunseok Kwon 1, Yurim Park
More informationModelling of Conflict Controlled Networks
Oleksii Ignaenko 4, Glushkov Avenue, CSP 368, Kyiv 187, Ukraine oigna@isofs.kiev.ua ABSTRACT Game heoreical echniques have recenly become prevalen in many engineering applicaions, noably in communicaions.
More informationFUZZY HUMAN/MACHINE RELIABILITY USING VHDL
FUZZY HUMN/MCHINE RELIBILITY USING VHDL Carlos. Graciós M. 1, lejandro Díaz S. 2, Efrén Gorroiea H. 3 (1) Insiuo Tecnológico de Puebla v. Tecnológico 420. Col. Maravillas, C. P. 72220, Puebla, Pue. México
More informationNonparametric CUSUM Charts for Process Variability
Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand
More informationIntentSearch:Capturing User Intention for One-Click Internet Image Search
JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang
More informationLess Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks
Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research
More informationAnalysis of Various Types of Bugs in the Object Oriented Java Script Language Coding
Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened
More informationImproved TLD Algorithm for Face Tracking
Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,
More informationLet s get physical - EDA Tools for Mobility
Le s ge physical - EDA Tools for Mobiliy Aging and Reliabiliy Communicaion Mobile and Green Mobiliy - Smar and Safe Frank Oppenheimer OFFIS Insiue for Informaion Technology OFFIS a a glance Applicaion-oriened
More informationA Numerical Study on Impact Damage Assessment of PC Box Girder Bridge by Pounding Effect
A Numerical Sudy on Impac Damage Assessmen of PC Box Girder Bridge by Pounding Effec H. Tamai, Y. Sonoda, K. Goou and Y.Kajia Kyushu Universiy, Japan Absrac When a large earhquake occurs, displacemen response
More informationWhy not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems
Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen
More informationReal Time Integral-Based Structural Health Monitoring
Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy
More informationImage segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding
Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same
More information4.1 3D GEOMETRIC TRANSFORMATIONS
MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions
More informationMB86297A Carmine Timing Analysis of the DDR Interface
Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl
More informationShortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.
Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah
More informationAN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY
AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY QIN Zhong-yuan 1,3, CHEN Qi 2, LV You 2, QIANG Yong 2, GUO Ai-wen 2, SHEN Ri-sheng 1,3, Zhang Qunfang 4 1 Informaion Science and Engineering School,
More informationRestorable Dynamic Quality of Service Routing
QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying
More informationMIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch
CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple
More informationA Face Detection Method Based on Skin Color Model
A Face Deecion Mehod Based on Skin Color Model Dazhi Zhang Boying Wu Jiebao Sun Qinglei Liao Deparmen of Mahemaics Harbin Insiue of Technology Harbin China 150000 Zhang_dz@163.com mahwby@hi.edu.cn sunjiebao@om.com
More informationDynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles
Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial
More informationComputer representations of piecewise
Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom
More informationModeling of IEEE in a Cluster of Synchronized Sensor Nodes
Modeling of IEEE 802.15.4 in a Cluser of Synchronized Sensor Nodes Kenji Leibniz, Naoki Wakamiya, and Masayuki Muraa Graduae School of Informaion Science and Technology, Osaka Universiy, 1-5 Yamadaoka,
More informationReliability Analysis for Cryptographic Key Management
Reliabiliy Analysis for Crypographic Key Managemen 1 Sheng Xiao, 2 Weibo Gong, 3 Don Towsley, 4, 5 Qingquan Zhang, 5 Ting Zhu 1 College of Informaion Science and Engineering, Hunan Universiy, China 2 Dep.
More informationY. Tsiatouhas. VLSI Systems and Computer Architecture Lab
CMOS INEGRAED CIRCUI DESIGN ECHNIQUES Universiy of Ioannina Clocking Schemes Dep. of Compuer Science and Engineering Y. siaouhas CMOS Inegraed Circui Design echniques Overview 1. Jier Skew hroughpu Laency
More informationDistributed Task Negotiation in Modular Robots
Disribued Task Negoiaion in Modular Robos Behnam Salemi, eer Will, and Wei-Min Shen USC Informaion Sciences Insiue and Compuer Science Deparmen Marina del Rey, USA, {salemi, will, shen}@isi.edu Inroducion
More informationMotion Level-of-Detail: A Simplification Method on Crowd Scene
Moion Level-of-Deail: A Simplificaion Mehod on Crowd Scene Absrac Junghyun Ahn VR lab, EECS, KAIST ChocChoggi@vr.kais.ac.kr hp://vr.kais.ac.kr/~zhaoyue Recen echnological improvemen in characer animaion
More informationLecture 18: Mix net Voting Systems
6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified
More informationA New Semantic Cache Management Method in Mobile Databases
Journal o Compuer Science 1 (3): 351-354, 25 ISSN 1549-3636 Science Publicaions, 25 A New Semanic Cache Managemen Mehod in Mobile Daabases Shengei Shi, Jianzhong Li and Chaokun Wang School o Compuer Science
More informationA Formalization of Ray Casting Optimization Techniques
A Formalizaion of Ray Casing Opimizaion Techniques J. Revelles, C. Ureña Dp. Lenguajes y Sisemas Informáicos, E.T.S.I. Informáica, Universiy of Granada, Spain e-mail: [jrevelle,almagro]@ugr.es URL: hp://giig.ugr.es
More informationTime Expression Recognition Using a Constituent-based Tagging Scheme
Track: Web Conen Analysis, Semanics and Knowledge Time Expression Recogniion Using a Consiuen-based Tagging Scheme Xiaoshi Zhong and Erik Cambria School of Compuer Science and Engineering Nanyang Technological
More informationA GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER
A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.
More informationM(t)/M/1 Queueing System with Sinusoidal Arrival Rate
20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra
More informationAutomatic Calculation of Coverage Profiles for Coverage-based Testing
Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a
More informationsource managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The
Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)
More informationEP2200 Queueing theory and teletraffic systems
EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help
More informationAn Improved Square-Root Nyquist Shaping Filter
An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com
More informationAn Experimental QoS Manager Implementation
An Experimenal QoS Manager Implemenaion Drago Žagar, Goran Marinović, Slavko Rupčić Faculy of Elecrical Engineering Universiy of Osijek Kneza Trpimira 2B, Osijek Croaia drago.zagar@efos.hr Absrac-- Qualiy
More informationPerformance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks
Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks
More informationPacket Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers
Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering
More informationAudio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA
Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,
More informationQuantitative macro models feature an infinite number of periods A more realistic (?) view of time
INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many
More informationAn Efficient Delivery Scheme for Coded Caching
201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy
More informationMichiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters
SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy
More informationImproving Ranking of Search Engines Results Based on Power Links
IPASJ Inernaional Journal of Informaion Technology (IIJIT) Web Sie: hp://www.ipasj.org/iijit/iijit.hm A Publisher for Research Moivaion... Email: edioriiji@ipasj.org Volume 2, Issue 9, Sepember 2014 ISSN
More informationMATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008
MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o
More informationTrust-based Service Management of Mobile Devices in Ad Hoc Networks
Trus-based Service Managemen of Mobile Devices in Ad Hoc Neworks Yaing Wang, Ing-Ray Chen Virginia Tech Deparmen of Compuer Science Falls Church, VA, USA Email: {yaingw, irchen}@v.edu Jin-Hee Cho U.S.
More informationFuture Generation Computer Systems. Self-healing network for scalable fault-tolerant runtime environments
Fuure Generaion Compuer Sysems 26 (2010) 479 485 Conens liss available a ScienceDirec Fuure Generaion Compuer Sysems journal homepage: www.elsevier.com/locae/fgcs Self-healing nework for scalable faul-oleran
More informationA Fast Stereo-Based Multi-Person Tracking using an Approximated Likelihood Map for Overlapping Silhouette Templates
A Fas Sereo-Based Muli-Person Tracking using an Approximaed Likelihood Map for Overlapping Silhouee Templaes Junji Saake Jun Miura Deparmen of Compuer Science and Engineering Toyohashi Universiy of Technology
More informationA Hierarchical Object Recognition System Based on Multi-scale Principal Curvature Regions
A Hierarchical Objec Recogniion Sysem Based on Muli-scale Principal Curvaure Regions Wei Zhang, Hongli Deng, Thomas G Dieerich and Eric N Morensen School of Elecrical Engineering and Compuer Science Oregon
More informationDelay in Packet Switched Networks
1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link
More informationReinforcement Learning by Policy Improvement. Making Use of Experiences of The Other Tasks. Hajime Kimura and Shigenobu Kobayashi
Reinforcemen Learning by Policy Improvemen Making Use of Experiences of The Oher Tasks Hajime Kimura and Shigenobu Kobayashi Tokyo Insiue of Technology, JAPAN genfe.dis.iech.ac.jp, kobayasidis.iech.ac.jp
More informationUtility-Based Hybrid Memory Management
Uiliy-Based Hybrid Memory Managemen Yang Li Saugaa Ghose Jongmoo Choi Jin Sun Hui Wang Onur Mulu Carnegie Mellon Universiy Dankook Universiy Beihang Universiy ETH Zürich While he memory fooprins of cloud
More informationHierarchical Recurrent Filtering for Fully Convolutional DenseNets
Hierarchical Recurren Filering for Fully Convoluional DenseNes Jo rg Wagner1,2, Volker Fischer1, Michael Herman1 and Sven Behnke2 1- Bosch Cener for Arificial Inelligence - 71272 Renningen - Germany 2-
More informationDefinition and examples of time series
Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is
More informationWho Thinks Who Knows Who? Socio-cognitive Analysis of Networks. Technical Report
Who Thinks Who Knows Who? Socio-cogniive Analysis of Email Neworks Technical Repor Deparmen of Compuer Science and Engineering Universiy of Minnesoa 4-192 EECS Building 200 Union Sree SE Minneapolis, MN
More informationLocation. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471
Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae
More informationCHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING
CHANGE DETECTION - CELLULAR AUTOMATA METHOD FOR URBAN GROWTH MODELING Sharaf Alkheder, Jun Wang and Jie Shan Geomaics Engineering, School of Civil Engineering, Purdue Universiy 550 Sadium Mall Drive, Wes
More informationRECENT advancements in vehicular communication and
Reliabiliy-oriened Opimizaion of Compuaion Offloading for Cooperaive Vehicle-Infrasrucure Sysems Jianshan Zhou, Daxin Tian, Senior Member, IEEE, Yunpeng Wang, Zhengguo Sheng, Xuing Duan, and Vicor C.M.
More informationThe University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach
The Universiy of Sheffield Deparmen of Compuer Science Indexing XML Daabases: Classificaions, Problems Idenificaion and a New Approach Research Memorandum CS-7-5 Mohammed Al-Badawi Compuer Science Dep
More informationSEINA: A Stealthy and Effective Internal Attack in Hadoop Systems
SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey
More informationJoint Feature Learning With Robust Local Ternary Pattern for Face Recognition
Join Feaure Learning Wih Robus Local Ternary Paern for Face Recogniion Yuvaraju.M 1, Shalini.S 1 Assisan Professor, Deparmen of Elecrical and Elecronics Engineering, Anna Universiy Regional Campus, Coimbaore,
More informationA Survey on mobility Models & Its Applications
A Survey on mobiliy Models & Is Applicaions Prof. Vikas Kumar Jain 1, Prof. Raju Sharma 2, Prof. Bhavana Gupa 3 1,2,3 Compuer Science & Engineering, CIST Absrac In his paper, we survey he curren scenario
More information