On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key

Size: px
Start display at page:

Download "On the Security of a Digital Signature with Message Recovery Using Self-certified Public Key"

Transcription

1 Informatca 29 (2005) On the Securty of a Dgtal Sgnature wth Message Recovery Usng Self-certfed Publc Key Janhong Zhang 1,2, We Zou 1, Dan Chen 3 and Yumn Wang 3 1 Insttuton of Computer Scence & Technology, Peng Unversty, Beng, P.R.Chna E-mal: hzhs@eyou.com, zouwe@cst.pu.edu.cn 2 College of Scences, North Chna Unversty of Technology, Beng, P.R.Chna E-mal: hzhang@ncut.edu.cn 3 State Key Lab.of ISN, Xdan Unversty, X an, Shaanx, P.R.Chna E-mal: ymwang@xdan.edu.cn Keywords: dgtal sgnature, message recovery, self-certfed publc ey, mproved scheme Receved: Aprl 7, 2005 Self-certfed publc eys are proposed to elmnate the burden of verfyng the publc ey before usng. To allevate relance on system authorty and strengthen the securty of system, Chang et al propose a new dgtal sgnature schemes, no redundancy s needed to be embedded n the sgned messages n ths scheme. Moreover, Chang et al clamed that the schemes are stll secure even wthout the trustworthy system authorty, and only the specfed recpent can recover the message n hs authentcaton encrypton schemes. Unfortunately, In ths wor, we analyze the securty of Chang et al scheme and show that f the system authorty s trustless, the scheme s nsecure, namely, the system authorty can recover the message wthout the prvate ey of the recpent n Chang authentcaton encrypton schemes. Fnally, we propose an mproved scheme to overcome the weaness of Chang et al scheme. Povzete: Predstavlena e tehna dgtalnega certfata z avnm lučem. 1 Introducton In tradtonal publc cryptosystem, each user has two eys, a prvate ey and a publc ey. The user can use hs prvate ey to produce a sgnature for a message, and any verfer can chec whether ths sgnature s vald or not by the user s publc ey. The publc ey of all users s publc n a publc drectory. However, these systems suffer from the well-nown authentcaton problem. In order to ensure the authentcty of publshed publc eys, usually there exsts a certfcate authorty (CA) to ssue a certfcate for every publc ey. Then every user reles on CA to valdate publc eys n the system. Shamr ntroduced n 1984 the concept of dentty-based cryptography[1]. The dea s that the publc ey of a user be publcly computed from hs dentty (for example, from a complete name, an emal address or an IP address). Then, the secret ey s derved from the publc ey. In ths way, dgtal certfcates are not needed, because anyone can easly verfy that some publc ey PK U corresponds n fact to user U. However, the user s prvate ey s chosen by a trusted authorty (TA). Ths approach maes user relance on TA. Based on the above ID-based cryptography s problem, the concept of self-certfed publc ey was frst ntroduced by Grault[10] n In the self-certfed publc ey cryptosystem, each user publc ey s generated by the CA, whle the correspondng prvate ey n only nown to the user. The authentcty of publc eys s mplctly verfed wthout the certfcate. That s, the verfcaton of the publc eys can be carred out n the sgnature verfcaton phase smultaneously. Recently, Tseng[8] et al proposed a new dgtal sgnature scheme wth message recovery and two varants based on the self-certfed publc system above. There exsts a trusted system authorty n Tseng et al schemes; however, the trusted authorty s not exstent n real world. Thereby, Ya-Fen Chang et al [3] propose a new dgtal sgnature schemes wth message recovery, whch provde the same functon as Tseng et al s scheme wthout the assumpton that TA s not necessary to be relable. To demonstrate convenently, we call the scheme of lterature [3] as Chang scheme. In ths wor, we gve a securty analyss of Chang scheme, and show

2 344 Informatca 29 (2005) J. Zhang et al. that the scheme s nsecure, namely, the system authorty can recover the message wthout the prvate ey of the recpent n Chang authentcaton encrypton schemes. Fnally, we gve an mproved scheme to overcome the weaness. The organzaton of ths paper s shown as follows. In Secton 2, we revew Chang et al s dgtal sgnature scheme and authentcaton encrypton scheme. In Secton 3, we gve securty analyss to Chang et al scheme. Our mproved dgtal sgnature scheme s presented n Secton 4. Fnally, we draw some conclusons. 2 Revew of Chang et al Scheme In the secton, we wll bref descrbe Chang et al s dgtal sgnature scheme wth usng self-certfed publc ey and hs authentcaton encrypton, the scheme conssts of three phases: the system ntalsaton phase, sgnature generaton and message recovery phase. 2.1 Sgnature Scheme wth Message Recovery System ntalzaton phase: n ths phase, a system authorty (SA) s responsble for generatng system parameters; note that ths system authorty s trustless. He selects two same sze safe large prmes p and q, whch satsfy p= 2p + 1and q= 2q + 1where p and q also are large prme, and he computes RSA modulus N = p q. Then, he chooses a generator g of the order p q and a publc collson-resstant hash functon h() whch accepts a varant-length nput strng of bts and produces a fx-length output strng of bt as specfed n [2]. Fnally, the system authorty eeps p, qpq,, secret, and publshes g, Nh, () publc. When a user U wth hs dentty ID ntends to on ths system, frst he generates hs publc ey. Therefore, he randomly chooses a number x as hs prvate ey and x computes p = g mod N. Then, the user U sends ( ID, p ) to the system authorty. After recevng ( ID, p ), the system authorty computes the publc ey 1 ( ) y ( ) h ID = p ID modn of the useru, the user U can verfy whether t holds by the h( ID) x equaton p ID g mod N + =. Sgnature generaton phase: When a user sgn a message M, the sgnng procedure s as follows: Step1: the user U chooses a random number. Step2: compute r1 = M g mod n, r 1 r2 = M g mod n and s = r1 x h( r2). The resultant sgnature on message M s ( r1, r2, s ). U wants to Message recovery phase: after the recpent receves the sgnature ( r1, r2, s ), he can verfy the sgnature and recover the message M by the followng steps: Step1: the verfer uses ID and p of the sgner to recover the sgned message M by computng s h( ID ) hr ( 2 ) M = r2 g ( p + ID) modn Step2: after recoverng the message, the verfer checs the recovered message M further by the followng equaton 1 r1 ( r 1 1 M ) modn = r2 M modn After the above verfcatons passes, t means that the sgnature s vald. 2.2 Authentcaton Encrypton Scheme Chang et al proposed two authentcaton encrypton schemes based on the scheme above. One s called authentcaton encrypton scheme whch only allows that a specfed recever can verfy and recover the sgned message; the other s called authentcated encrypton scheme wth message lnages that s used to transmt large message. In fact, the second scheme s the extenson of the frst authentcaton encrypton. We only consder the frst scheme n the followng. The scheme s dvded nto three phases: system ntalzaton phase, sgnature generaton phase, and message recovery phase. System Intalzaton Phase The system ntalzaton phase s the same as one of the above Chang et al s sgnature. Because the space s lmted, we omt t Sgnature Generaton Phase If the user U wants to sgn and encrypt a message M to a specfed recever U, the generaton procedure of the sgnature s as follows. Step1: frst chooses a random number. Step2. compute h( ID ) h( ID ) r1 = M ( p + ID) modn r1 r2 = M ( p + ID) modn and s = r1 x h( r2). Step3: U sends the sgnature ( r 1, r 2, s) to the verfer U Message recovery phase After recevng the sgnature ( r 1, r 2, s ), the verfer U recovers the message M and verfes that the sgnature ( r, r, s) s vald by the followng equatons. 1 2 s h( ID ) hr ( 2 ) x 2 ( ( ) ) mod M = r g p + ID n And the verfer U further checs whether 1 r1 ( r M ) modn = r M 1 modn holds or not. 1 2

3 ON THE SECURITY OF A DIGITAL... Informatca 29 (2005) Securty Analyss of Chang et al Sgnature and Authentcaton Encrypton Chang et al clamed that ther schemes are secure wthout the assumpton that system authorty s trustworthy. In hs authentcaton encrypton scheme, Chang et al clamed that only the specfed verfer can recover the message M from the sgnature. Unfortunately, we show that f the system authorty s trustless, we can attac ths scheme. Frst, we gve a securty analyss to Chang et al prmtve sgnature, and then we analyze the securty of the authentcaton encrypton. Because the authentcaton encrypton s based on Chang et al sgnature scheme, f Chang et al sgnature scheme s nsecure, then authentcaton encrypton and the extenson vson of ths authentcaton encrypton s also nsecure. In the followng, we wll consder the securty of the scheme. Accordng to the above sgnature phase of Chang et al scheme, we now that a sgnature ( r 1, r 2, s) of a message M satsfes r1 = M g mod N, r M g N r 1 2 = mod Supposed that the system authorty s trustless, because the system authorty nows the factorng of n, he also nows pq, whch s the order of the base g. Hence, he can perform as follows. Step1: ths system authorty computes r1 (1 r1 ) α = = g mod N. r 2 1 Step2: compute β = (1 r) mod pq Step3: compute 1 1 (1 r1) β (1 r1) (1 r1) β γ = α mod N = ( g ) mod N = ( g ) mod N = g mod N Step 4: recover the message M as the followng r M = 1 mod N γ The system authorty can recover the message M from the sgnature ( r 1, r 2, s) wthout the nformaton ( ID, p ) of the sgner U. In the followng, we consder how to attac the Chang et al authentcaton encrypton. Accordng to the sgnature phase of the Chang et al s authentcaton encrypton scheme, we now that the sgnature ( r1, r2, s) satsfy the followng relaton h( ID ) r1 = M ( p + ID) modn h( ID ) r1 2 = ( + ) mod r M p ID N Supposed that the system authorty s trustless, the system authorty nows the factorng of n. Accordng to the above way, the attac procedure s as follows: Step1: ths system authorty computes α r 1 h( ID ) (1 r1 ) = = ( p + ID) modn. r2 1 Step2: compute β = (1 r) mod pq Step3: compute β h( ID ) (1 r1 ) β h( ID ) 1 (1 r1)(1 r1) γ = α mod N = ( p + ID ) mod N = ( p + ID ) modn h( ID ) = ( p + ID ) modn 1 Step 4: recover the message M as the followng r M = 1 mod N γ If the system authorty ntercepts the sgnature ( r1, r2, s) of the message M from the channel between the sgner U and the recpent U, then he can recover the message M wthout the prvate ey of the recpent U. Accordng to the way ale, the attac mounts to the second authentcaton encrypton. 4 An Improved Scheme To overcome the weaness of Chang et al scheme, we suggest an mproved scheme. In our mproved scheme, System ntalzaton phase s the same as one of Chang et.al. scheme. The dfference s Sgnng phase and Verfyng phase. [Sgnng phase] If the user U wants to sgn and encrypt a message M to a specfed recever U, the generaton procedure of the sgnature s as follows. Step1: frst chooses a random number. Step2. compute h( ID ) h( M ) h( ID ) r1 r1 = M ( p + ID ) modn r2 = M ( p + ID ) modn and s = r1 x h( r2). Step3: U sends the sgnature ( r 1, r 2, s) to the verfer U. [Verfyng phase] After recevng the sgnature ( r 1, r 2, s ), the verfer U recovers the message M and verfes that the sgnature ( r1, r2, s) s vald by the followng equatons. s h( ID ) h( r2 ) x M = r2 ( g ( p + ID) ) modn And the verfer U further checs whether

4 346 Informatca 29 (2005) J. Zhang et al. ( r M ) mod N = ( r M ) modn 1 r1 1 hm ( ) 1 2 holds or not. Our mproved scheme can extend to the same authentcaton encrypton as Chang et al scheme. Here we omt t for the lmted space. h( ID ) ( ) h M By revsng r 1 nto r1 = M ( p + ID) modn, we prevent the above attac and mae that anyone (except for the sgner and the specfed recever) cannot recover the message M from the sgnature ( r 1, r 2, s ), even f the system authorty can not recover the message. Compared wth the Chang et al scheme, only one more hash functon s requred n the mprovement scheme; however, the hash computaton s neglgble. Therefore the mprovement preserves the Chang et al clamng merts; namely, our scheme s secure wthout a trusted system authorty and effcent. 5 Concluson Self-certfed publc eys are proposed to elmnate the burden of verfyng the publc ey before usng t. However, there exsts a trusted authorty n ordnary selfcertfed publc ey system; the trusted authorty s not guaranteed to be honest n the real world. To strengthen the securty of system, Chang et al propose a new dgtal sgnature schemes, no redundancy s needed to be embedded n the sgned messages. Moreover, the schemes are stll secure even wthout the trustworthy system authorty. In ths wor, we gve a securty analyss to Chang et al scheme and show that f the system authorty s trustless, the scheme s nsecure. Fnally, we propose an mproved scheme to overcome the weaness of Chang et al scheme. References [1] A. Shamr, Identty-based cryptosystem based on the dscrete logarthm problem, n Proceedngs of CRYPTO_84, 1985, pp [2] Zuhua Shao, mprovement of dgtal sgnature wth message recovery usng self-certfed publc eys and ts varants Appled Mathematcs and Computaton 159 (2004) [3] Y.F.Chang, C.C.Chang, H.F.Huang, Dgtal sgnature wth message recovery usng selfcertfed publc eys wthout trustworthy system authorty[j], Appled Mathematcs and Computaton, Vol 161, n 2005, pp [4] P. Horster, M. Mchels, H. Petersen, Authentcated encrypton schemes wth low communcaton costs, IEE Electroncs Letters 30 (15) (1985) [5] K. Nyberg, R.A. Ruppel, Message recovery for sgnature schemes based on the dscrete logarthm, n: Proceedngs of EUROCRYPT_94, 1994, pp [6] R.L. Rvest, A. Shamr, L. Adelman, A method for obtanng dgtal sgnature and publc ey cryptosystem, Communcatons of ACM 21 (2) (1978) [7] A. Shamr, Identty-based cryptosystem based on the dscrete logarthm problem, n Proceedngs of CRYPTO_84, 1985, pp [8] Y.M. Tseng, J.K. Jan, H.Y. Chen, Dgtal sgnature wth message recovery usng self-certfed publc eys and ts varants, Appled Mathematcs and Computaton 136 (2003) [9] W. D.e, M.E. Hellman, New drectons n cryptography, IEEE Transactons on Informaton Theory IT-22 (6) (1976) [10] M. Grault, Self-certfed publc eys, n: Proceedngs of EUROCRYPT_91, n 1991, LNCS, sprnger-verlag, pp

5 Informatca 29 (2005) Obect Groupng and Replcaton Algorthms for Word Wde Web A. Mahmood Department of Computer Scence Unversty of Bahran Kngdom of Bahran E-mal: Keywords: Data mnng, document clusterng, obect replcaton, Web, dstrbuted web-server system, document replcaton. Receved: December 4, 2004 Ths paper presents an algorthm to group correlated obects that are most lely to be requested by a clent n a sngle sesson. Based on these groups, a centralzed algorthm that determnes the placements of obects to a cluster of web-servers s proposed to mnmze latency. Due to the dynamc nature of the Internet traffc and the rapd changes n the access pattern of the World-Wde Web, we also propose a dstrbuted algorthm where each ste reles on some collected nformaton to decde what obect should be replcated at that ste. The performance of the proposed algorthms s evaluated through a smulaton study. Povzete: Gruprane obetov na spletu. 1 Introducton An ever-ncreasng popularty of Word Wde Web has brought a huge ncrease n traffc to popular web stes. As a result, users of such web stes often experence poor response tme or denal of a servce (tme-out error) f the supportng web-servers are not powerful enough. Snce these stes have a compettve motvaton to offer better servce to ther clents, the system admnstrators are constantly faced wth the need to scale up ste capacty. There are generally two dfferent approaches to achevng ths [1]. The frst approach s to use powerful server machnes wth advanced hardware support and optmzed server software. Unfortunately, ths approach s expensve and complcated one and the ssue of scalablty and performance may persst wth ever ncreasng user demand. The second approach, whch s more flexble and sustanable, s to use dstrbuted and a hghly nterconnected nformaton system or dstrbuted web server system (DWS). A dstrbuted web server system s any archtecture of multple stand-alone web server hosts that are nterconnected together and act as a logcally sngle server [2]. A DWS s not only cost effectve and more robust aganst hardware falure but t s also easly scalable to meet ncreased traffc by addng addtonal servers when requred. In such systems, an obect (a web page, a fle, etc.) s requested from varous geographcally dstrbuted. As the DWS spreads over a MAN or WAN, movement of documents between server nodes n an expensve operaton [1]. Mantanng multple copes of obects at varous locatons n DWS s an approach for mprovng system performance (e.g. latency, throughput, avalablty, hop counts, ln cost, and delay etc.) [1-3]. Web cachng attempts to reduce networ latency and traffc by storng commonly requested documents as close to the clents as possble. Snce, web cachng s not based on the users access patterns, the maxmum cache ht rato achevable by any cachng algorthm s bounded under 40% to 50% [4]. A Proactve web server system, on the other hand, can decde where to place copes of a document n a dstrbuted web server system. In most exstng DWS systems, each server eeps the entre set of web documents managed by the system. Incomng requests are dstrbuted to the web server nodes va DNS servers [5-7]. Although such systems are smple to mplement but they could easly result n uneven load among the server nodes due to cachng of IP addresses on the clent sde. To acheve better load balancng as well as to avod ds wastage, one can replcate part of the documents on multple server nodes and requests can be dstrbuted to acheve better performance [8-10]. However, some rules and algorthms are then needed to determne number of replcas of each document/obect and ther optmal locatons n a DWS. Choosng the rght number of replcas and ther locatons can sgnfcantly reduce web access delays and networ congeston. In addton, t can reduce the server load whch may be crtcal durng pea tme. Many popular web stes have already employed

6 348 Informatca 29 (2005) A. Mahmood replcated server approach whch reflects upon the popularty of ths method [11]. Choosng the rght number of replcas and ther locaton s a non-trval and non-ntutve exercse. It has been shown that decdng how many replcas to create and where to place them to meat a performance goal s an NP-hard problem [12,13]. Therefore, all the replca placement approaches proposed n the lterature are heurstcs that are desgned for certan systems and wor loads. Ths paper proposes a sut of algorthms for replca placement n a Web envronment. The frst two algorthms are centralzed n nature and thrd s a dstrbuted one. For dstrbuton of requests, we tae nto account ste proxmty and access cost. A detaled formulaton of the cost models and constrants s presented. Snce most of the requests n web envronment are read requests, our formulaton s n the context of read-only requests. The rest of the paper s organzed as follow: Secton 2 revews some exstng wor related to obect replcaton n the web. Secton 3 descrbes the system model, centralzed and dstrbuted replcatons models and the cost functon. Secton 4 presents an algorthm to cluster hghly correlated obects n a web envronment. Secton 5 presents a centralzed and a dstrbuted algorthm for obect replcaton. Secton 6 presents the smulaton results and secton 7 concludes the paper. 2 Related Wor The problem of replca placement n communcaton networs have been extensvely studed n the area of fle allocaton problem (FAP) [14,15] and dstrbuted database allocaton problem (DAP) [16,17]. Both FAP and DAP are modeled as a 0-1 optmzaton problem and solved usng varous heurstcs, such as napsac soluton [18], branch-and-bound [19], and networ flow algorthms [20]. An outdated but useful survey of wor related to FAP can be found n [14]. Most of the prevous wor on FAP and DAP s based on the assumpton that access patterns are nown a pror and reman unchanged. Some solutons for dynamc envronment were also proposed [21-23]. Kwo et al. [24] and Bsdan Patel [25] studed the data allocaton problem n multmeda database systems and vdeo server systems, respectvely. Many proposed algorthms n ths area try to reduce the volume of data transferred n processng a gven set of queres. Another mportant data replcaton problem exsts n Content Delvery Networs (CDN). Unle FAP and DAP, n a CDN, a unt of replcaton/allocaton s the set of documents n a webste that has regstered for some global web hostng servce. In [26], the replca placement problem n CDN s formulated as an uncapactated mnmum K-medan problem. In [27], dfferent heurstcs were proposed based on ths K-medan formulaton to reduce networ bandwdth consumpton. The authors of [28] tae storage constrant nto consderaton and reduce the napsac problem to replca placement problem n CDNs. L [11] proposed a sut of algorthms for determnng the locaton of replca servers wthn a networ. The obectve of ths paper s not to determne the placement of obects themselves but to determne the locatons of multple servers wthn a networ such that the product of dstance between nodes and the traffc traversng the path s mnmzed. Wolfson et al. [29] proposed an adaptve data replcaton algorthm whch can dynamcally replcate obects to mnmze the networ traffc due to read and wrte operatons. The proposed algorthm wors on a logcal tree structure and requres that communcaton traverses along the paths of the tree. They showed that the dynamc replcaton leads to convergence of the set of nodes that replcate the obect. It, however, does not consder the ssue of multple obect replcatons. Further, gven that most obects n the Internet do not requre wrte operaton, the cost functon based on read and wrte operatons mght not be deal for such an envronment. Bestavros [30] consdered the problem of replcatng contents of multple web stes at a gven locaton. The problem was formulated as a constrant-maxmzaton problem and the soluton was obtaned usng Lagrange multpler theorem. However, the soluton does not address the ssue of selectng multple locatons through the networ to do replcaton. In [31], the authors have studed the page mgraton problem and presented a determnstc algorthm for decdng on where to mgrate pages n order to mnmze ts access and mgraton costs. Ths study, however, deals only wth page mgraton assumng that the networ has copes of a page. In addton, t does not address the problem of addng and deletng replcas to the system and presents no specal algorthm for replca selecton. It only assumes that the reads are done only from the nearest replca. Tensaht et al. [13] present two greedy algorthms, a statc and a dynamc one, for replcatng obects n a networ of web servers arranged n a tree-le structure. The statc algorthm assumes that there s a central server that has a copy of each obect and then a central node determnes the number and locaton of replcaton to mnmze a cost functon. The dynamc verson of the algorthm reles on the usage statstcs collected at each server node. A test s performed perodcally at each ste holdng replcas to decde whether there should be any deleton of exstng replcas, creaton of new replcas, or mgraton of exstng replcas. Optmal place of replca n trees has also been studed by Kalpas at el. [3]. They consdered the problem of placng copes of obects n a tree networ n order to mnmze the cost of servng read and wrte requests to obects when the tree nodes have lmted storage and the number of copes permtted s lmted. They proposed a dynamc programmng algorthm for fndng optmal placement of replcas.

7 OBJECT GROUPING AND REPLICATION... Informatca 29 (2005) The problem of documents replcaton n extendable geographcally dstrbuted web server systems s addressed by Zhuo et al [1]. They proposed four heurstcs to determne the placement of replca n a networ. In addton, they presented an algorthm that determnes the number of copes of each documents to be replcated dependng on ts usage and sze. In [32] the authors also proposed to replcate a group of related documents as a unt nstead of treatng each document as a replcaton unt. They also presented an algorthm to determne the group of documents that have hgh coheson, that s, they are generally accessed together by a clent n a sngle sesson. Xu el al. [33] dscussed the problems of replcaton proxy placement n a tree and data replcaton placement on the nstalled proxes gven that maxmum M proxes are allowed. The authors proposed algorthms to fnd number of proxes needed, where to nstall them and the placement of replcas on the nstalled proxes to mnmze the total data transfer cost n the networ. Karlsson et al. [34] developed a common framewor for the evaluaton of replca placement algorthms. Heddaya and Mrdad [35] have presented a dynamc replcaton protocol for the web, referred to as the Web Wave. It s a dstrbuted protocol that places cache copes of mmutable documents on the routng tree that connects the cached documents home ste to ts clents, thus enablng requests to stumble on cache copes en route to the home ste. Ths algorthm, however, burdens the routers wth the tas of mantanng replca locatons and nterpretng requests for Web obects. Sayal el al. [36] have proposed selecton algorthms for replcated Web stes, whch allow clents to select one of the replcated stes whch s close to them. However, they do not address the replca placement problem tself. In [37], the author has surveyed dstrbuted data management problems ncludng dstrbuted pagng, fle allocaton, and fle mgraton. 3 The System Models A replcated Web conssts of many stes nterconnected by a communcaton networ. A unt of data to be replcated s referred as an obect. Obects are replcated on a number of stes. The obects are managed by a group of processes called replcas, executng at replca stes. We assume that the networ topology can be represented by a graph G(V, E), n whch N = V s the number of nodes or vertces, and E denotes the number of edges (lns). Each node n the graph corresponds to a router, a swtch or a web ste. We assume that out of those N nodes there are n web servers as the nformaton provder. Assocated wth every node v V s a set of nonnegatve weghts and each of the weghts s assocated wth one partcular web server. Ths weght can represent the traffc traversng ths node v and gong to web server ( = 1,2,,n). Ths traffc ncludes the web access traffc generated at the local ste that node v s responsble for and, also, the traffc that passes through ths t on ts way to a target web server. Assocated wth every edge s a nonnegatve dstance (whch can be nterpreted as latency, ln cost, or hop count, etc.). A clent ntates a read operaton for an obect by sendng a read request for obect. The request goes through a sequence of hosts va ther attached routers to the server that can serve the request. The sequence of nodes that a read request goes through s called a routng path, denoted by π. The requests are routed up the tree to the home ste (.e. root of the tree). Note that a route from a clent to a ste forms a routng tree along whch document requests must follow. Focusng on a partcular sever, the access traffc from all nodes leadng to a server can be best represented by a tree structure f the transent routng loop s gnored [11,13,29]. Therefore, for each web server, a spannng tree T can be constructed rooted at. Hence, m spannng trees rooted at m web servers represent the entre networ. The spannng tree T rooted at a ste s formed by the clents that request obects from ste and the processors (clents) that are n the path π of the requests from clents to access obect at ste. 3.1 The Obect Replcaton Models In ths paper, we consder two obect replcaton models: centralzed and dstrbuted. In the centralzed model, each read request for an obect s executed at only one of the replcas, the best replca. If ℵ s the set of stes that LC C, have a replca of obect and denotes the cost of accessng obect at ste from the least cost ste (denoted by LC ), then LC LC =, f a replca of s locally avalable at =, otherwse such that C, s mnmum over all ℵ That s, for a gven request for an obect at ste, f there s a local replca avalable, then the request s servced locally ncurrng a costc,, otherwse the request s sent to ste havng a replca of obect wth the least access cost. In the centralzed model, there s a central arbtrator that decdes on the number of replcas and ther placement based on the statstcs collected at each ste. Upon determnng the placement of replcas for each obect, the central arbtrator re-confgures the system by addng and/or removng replcas accordng to the new placement determned by the arbtrator. The locaton of each replca s broadcasted to all the stes. In addton each ste eeps the followng nformaton:

8 350 Informatca 29 (2005) A. Mahmood LC : The least cost ste to that has a replca of obect. C, : The cost of accessng obect at ste from ste on π., f : The access frequency of obect at ste from ste on π. ℵ : The set of stes that have a replca of obect In the dstrbuted model, there s no central arbtrator. Smlar to centralzed model, for a gven request for an obect at ste, f there s a local replca avalable, then the request s servced locally ncurrng a costc,, otherwse the request s sent to ste havng a replca of obect wth the least access cost. After every tme perod T, each ste maes the decson about acqurng or deletng a copy of an obect based on the local statstcs The Cost Model Determnng an optmal replcaton nvolves generatng new allocatons and determnng ther goodness. The evaluaton s done n terms of an obectve functon subect to system constrants. The desgnaton of an obectve functon reflects the vew of goodness of obect replcaton wth respect to system desgn goals. It s not feasble to completely descrbe a system wth ust one obectve functon; nstead the obectve functon should only capture the crtcal aspects of the system desgn. Also, the form and the parameters of the obectve functon should be proper. That s, f the obectve functon ndcates that an allocaton s better than the other one then the actual measurements should concur. Keepng n mnd these consderatons, we develop the obectve functon for obect replcaton problem as follow: Suppose that the vertces of G ssue read requests for an obect and copes of that obect can be stored at multple vertces of G. Let there are total n stes (web servers) and, m obects. Let f s the number of read requests for a certan perod of tme t ssued at ste for obect to ste on π. Gven a request for an obect at ste, f there s a local replca avalable, then the request s servced locally wth a costc,, otherwse the request s sent to ste havng a least access cost replca of obect wth a cost LC C, as explaned earler. If X s an n m matrx whose entry x = 1 f obect s stored at ste and x = 0 otherwse, then the cost of servng requests for obect ( 1 m) at ste ( 1 n) s gven by TC = ( 1 x ) f C + x, LC,, LC f, C (1) The cost of servng requests for all the obects at ste s: TC = = m = 1 TC = = m [ + ], LC, LC,, 1 x ) f C x f C = 1 ( (2) Hence, the cumulatve cost over the whole networ for all the obects can be wrtten as: n m = =, LC, LC,, CC( X ) = (1 x ) f C + x f C 1 1 LC Now, the replca placement problem can be defned as a 0-1 decson problem to fnd X that mnmzes (3) under certan constrants. That s, we want to n m = =, LC, LC,, mnmzecc( X ) = mn (1 x ) f C + x f C 1 1 LC (4) Subect to n = 1 m = 1 x x 1 for all1 m s TS x {0,1, for all, for all1 m The frst constrant specfes that each obect should have at least one copy. If s denotes sze of obect and TS s the total storage capacty of ste then the second constrant specfes that the total sze of all the obects replcated at node should not exceed ts storage capacty. 4 Obect Groupng Almost all the proposed obect/document placement and replcaton algorthms for web on web servers decde about the placement/replcaton of a complete web ste or ndvdual obects comprsng a web ste. Both of these methods are not realst. It has been shown n varous studes that each group of users generally accesses a subset of related pages durng a sngle sesson. Therefore, t s logcal to group documents whch have hgh correlaton that s, the documents that are very lely to be requested by a clent n a sngle sesson. Ths would reduce the HTTP redrecton throughout a HTTP sesson and hence mprove the response tme. Each group then can be replcated on web servers as a unt hence reducng the search space. In ths secton, we propose an algorthm to group obects that are hghly correlated n the sense that they have hgh (3) (5) (6) (7)

9 OBJECT GROUPING AND REPLICATION... Informatca 29 (2005) probablty of beng accessed by a clent n a sngle sesson. The proposed algorthm s an adaptaton of the algorthm proposed n [38]. The maor dfference s that the algorthm n [38] produces non-overlappng groups, that s, each document s placed n a sngle group but the proposed algorthm may nclude an obect n more than one group. Ths s partcularly mportant snce dfferent users may request for dfferent correlated obects durng each sesson. Also, we use multple sessons, nstead of a sngle sesson, orgnatng from a clent to obtan obect groups for the reasons explaned. The proposed algorthm groups the obects nto correlated obect clusters based on the user access patterns whch are stored n the system access log fles. An access log fle typcally ncludes the tme of request, the URL requested, and the machne from whch the request orgnated (.e. IP address of the machne). Below, we explan maor steps of the algorthm. 1. Frst the log fle s processed and dvded nto sessons where a sesson s a chronologcal sequence of document requests from a partcular machne n a sngle sesson. We assume that each sesson spans over a fnte amount of tme. It s mportant to note that the log fle may have multple sessons for the same user. Ths gves a better pcture of the usage pattern of a user. Also, note that we have to mae sure that each request from a machne should be recorded n the log fle to obtan an accurate access pattern of users. Ths can be accomplshed by dsablng cachng, that s, every page sent to a machne contans a header sayng that t expres mmedately and hence browsers should load a new copy every tme a user vews that page. 2. In step 2, we create a correlaton matrx. The correlaton between two obects O 1 and O 2 s the probablty that they are accessed n the same user sesson. To calculate correlaton between O 1 and O 2, we scan the log fle and count the number of dstnct sessons n whch O 1 was accessed after O 2 (count(o 1,O 2 )) and calculate p(o 1 O 2 )=count(o 1,O 2 )/s(o 1 ), where p(o 1 O 2 ) s the probablty of a clent vstng O 1 f t has already vsted O 2 and s(o 1 ) s the number of sessons n whch O 1 was accessed by a clent. Smlarly, we compute p(o 2 O 1 )=count(o 2, O 1 )/s(o 2 ), where p(o 2 O 1 ) s the probablty of O 2 beng accessed after O 1 n a sesson, count(o 2, O 1 ) s the number of sessons n whch O 2 s accessed after O 1 and s(o 2 ) s the total number of sessons n whch O 2 s assessed. The correlaton between O 1 and O 2 s the mn(p(o 1 O 2 ), p(o 2 O 1 )) to avod mstang a asymmetrc relatonshp for a true case of hgh correlaton. 3. At step three, we frst create a graph correspondng to correlaton matrx n whch each obect s a vertex and each non-zero cell of the correlaton matrx s mapped to an edge. The length of an edge s equal to the correlaton probablty between two vertces. The edges wth a small value are removed from the graph. We then group documents by dentfyng clques n the graph. A clque s a subgraph n whch each par of vertces has an edge between them. The algorthm to dentfy clques f gven n fgure 1. The algorthm always starts wth a par of vertces that have the longest edge between them. Both of these vertces are ncluded n the group and edge s removed. Then we examne the rest of the vertces that have not been ncluded n the group and select the next best vertex (a vertex wth the hghest edge value) that s connected to the vertces already ncluded n the group and nclude t n the group. In ths way we choose the obects that are hghly correlated. The sze of the clque s bounded by the longest sesson of ts members snce there s no need of ncludng an obect to a group f t s not accessed n the longest sesson. Each vertex that s not ncluded n any of groups s ncluded n a separate group havng that vertex as ts only member. R = {vertces connected to at least one edge whle (R φ) { Fnd the longest edge n R wth vertces O 1 and O 2 V = { O 1, O 2 G = R \ V, C = φ l=maxmum sze of V whle ( V l ) { for (each vertex O n G) { f (O s connected to all vertces n V ){ Record the shortest edge between o and vertces n V Add O to V f (C φ ) { Choose the vertex O shortest edge to V s longest Add O to V Delete O from G and R C = φ l=l+1 Fgure 1.Obect groupng algorthm whose else { delete O 1 and O 2 O 1 and O 2 from G and R brea Construct a group for each remanng vertex

10 352 Informatca 29 (2005) A. Mahmood 5 Obect Placement and Replcaton Algorthms The replca placement problem descrbed n the prevous secton reduces to fndng 0-1 assgnment of the matrx X that mnmzes the cost functon subect to a set of constrants. The tme complexty of ths type of problems s exponental. In the next secton, we present our proposed centralzed obect replcaton algorthms. 5.1 Centralzed Greedy Algorthm Our frst algorthm s a polynomal tme greedy algorthm that s executed at a central server and decdes the placements of replcas for each obect. The algorthm proceeds as follows: Frst all the obects groups are organzed n descendng value of ther densty to mae sure that the obects that are heavly accessed are assgned to the best server. For each obect, we determne the number of replcas that should be assgned to varous servers usng the algorthm proposed n [32] (R denotes the number of replca each obect should have). The frst obect n a group s assgned to most sutable server and then all the other obects n the same group are allocated to the same server f t has enough capacty. The dea s that the documents n the same group have hgh probablty of beng accessed n the same sesson by a clent; therefore, eepng them together wll mprove the response tme. If an obect cannot be assgned to the same server then we fnd a server wth mnmum access cost and assgned the obect on that server. After a copy of an obect s assgned, then we assgn the remanng replca of each obect to best servers not havng a copy of that obect and have the capacty for that obect. The complete algorthm s gven n fgure Dstrbuted Obect Replcaton Algorthm The algorthm presented n the prevous secton are centralzed n the sense that a central arbtrator collects all the necessary statstcs, determnes the placement of the obects, and reconfgures the system n accordance wth the newly determned allocaton. Ths mght nvolve removng/deletng replcas and addng or mgratng replcas by the central arbtrator. However, n the dstrbuted model, there s no central arbtrator. Rather, each ste determnes for tself whch obects t should add/remove based on the current replca placement and Group obects usng obect group algorthm Arrange obect groups n descendng order of ther densty Arrange obects n each group n descendng order of ther densty Determne the number of replcas for each obect for (=1; <= no_of_obects; ++) replca_assgned =0 for g = 1 to no_of_groups { whle (G φ ) { = frst_obect_n _G A = // set of obects allocated to f ( has not been allocated) { = ste wth mnmum value of (2) such that no constrant s volated f a replca of s allocated to Allocate at replca_assgned = replca_assgned + 1 G = G - whle ( has capacty and G φ and ) { = frst_obect_n _G Allocate at replca_assgned = replca_assgned + 1 G = G - A= A for ( each n A ) { for (r= replca_assgned ; r R ; r++) { Fnd a ste not havng a replca of and has mnmum value of replca of s assgned at and no constrant s volated Assgned at replca_assgned = replca_assgned + 1 Fgure 2: Proposed replcaton algorthm (algorthm 1) C, and f a

11 OBJECT GROUPING AND REPLICATION... Informatca 29 (2005) K ) { for (each obect If (server s the only server havng a replca of obect ) proft = a_max_number else proft =,, ( TC f C ) / s // TC then the cost of servng requests for obect // at ste from the least cost ste for (each obect ) { proft = ( TC locally collected statstcs as descrbed n secton 3.1. Our proposed dstrbuted obect replcaton algorthm s a polynomal tme greedy algorthm where each ste eeps the replcas of those obects that are locally evaluated to be the best replcas. Assume that X (an n m matrx) represents the current obect replcaton. Intally X can be determned by usng the algorthm proposed n the prevous secton. If K and ξ s the set of obects that are replcated at ste and the set of obects that are not replcated at ste respectvely then each ste, after every tme perod t, determnes whch obects t should add/remove based on the current replca placement and locally collected statstcs usng the followng proposed algorthm. The algorthm frst calculates the unt loss/proft of removng the local replcas and then the unt proft of havng replcas of those obects whch are not avalable locally. It then sorts all the obects n descendng values of ther proft and replcates top n obects whch t can accommodate wthout volatng the constrants. The complete algorthm s gven n fgure 4. 6 Expermental Results Ths secton presents some performance measures obtaned by smulaton of the proposed algorthms. We have run several smulaton trals. In each smulaton run, we model the web as a set of trees havng stes. The total obects to be replcated were 2000 n all the smulaton runs. We use dfferent obect szes whch follows a normal dstrbuton. The average obect sze s taen as 10 KB and maxmum sze was taen as 100KB. About 64% obects szes were n the range of 2KB and 16KB. The storage capacty of a server was set randomly n such a way that total storage of all the servers was enough to hold at least one copy of each obect at one of the servers. In each tral, we run the replca placement algorthms for 200,000 requests for dfferent obects. We created log fles by generatng requests for obects for ξ f, C, ) / s C, LC / Sort all the obects n K ξ n descendng order of ther proft values. Replcate the obects from the sorted lst one by one untl there s space avalable on server. Fgure 4. The proposed dstrbuted algorthm (algorthm 2) s multple sessons. Ths log fle was used to group obects. The same log fle was used by the proposed algorthms to collect varous statstcs. Durng a smulaton run, each ste eeps a count c of the total number of requests t receves for an obect. The latences are updated perodcally for each replca usng the formula T = 1/( µ λ) where λ s the average arrval rate and µ s the average servce tme. Exponental servce tme s assumed wth an average servce rate of 100 transactons/second. The value of T s propagated to the clents n the shortest path spannng tree. The cost (latency) at dfferent stes s computed as follows: At the replca ste, the average arrval rate s computed and the latency T = 1/( µ λ) s broadcast to all the stes of the tree rooted as ths replca. At a ste of the tree, the communcaton cost (set randomly) at the neghborng ste from whch T s propagated s added to T. Ths qualty wll be the cost of accessng the replca from ste. At the end of every 20,000 requests, the mean latency requred to servce all the 20,000 requests s calculated and used as a performance measure of the smulated algorthms. We studed the performance of our proposed algorthms and compared t wth that of random allocaton algorthm [28] and greedy algorthm [13]. The random algorthm stores replcas at randomly selected nodes subect to system constrants. The number of replcas for each obect was determned by densty algorthm [1]. We pc one replca at a tme wth unform probablty and one node also wth unform probablty; and store that replca at that node. If the node already has a replca of that obect or allocaton of replca at that node volates any of the constrants then another node s selected randomly untl the replca s placed at a node. Snce the obect placement problem s NP-Complete and hence optmal soluton cannot be obtaned for large problems n a

12 354 Informatca 29 (2005) A. Mahmood reasonable amount of tme, the random algorthm provdes a good basc on whch we can determne how good a heurstc performs than that of a smple random algorthm. Fgure 5 shows the average latency for all the smulaton runs for dfferent tree szes. The fgure shows that the average latency decreases for all the algorthms as the number of stes ncreases n the system. Ths s because of the fact that as the number of stes ncreases, more replca of an obect can be placed. Also, note that the performance of algorthm 1 and algorthm 2 s comparable demonstratng the effectveness of the dstrbuted algorthm. The fgure 6 shows the average performance of the algorthms for all the system confguratons. It s evdent that the proposed algorthms perform, on average, better than the greedy and the random algorthm. To demonstrate how algorthm 2 adapts to the access patterns, we performed a set of experments. The ntal allocaton was obtaned by randomly placng replcas of each obect as explaned before. After each requests, the algorthm s run on each ste. We observed the mprovement n latency, frst by calculatng the latency f no reallocaton of obects s done and then by allowng the algorthm to adust the replcaton usng the statstcs. The results are shown n fgure 7. It s evdent from the fgure that the algorthm reduces the latency every tme t s executed. Intally the mprovement s sgnfcantly hgh snce the ntal allocaton was obtaned randomly. After a number of runs, the performance of algorthm 2 s comparable wth that of algorthm 1. 7 Conclusons Obect replcaton on a cluster of web servers s a promsng technque to achevng better performance. However, one needs to determne the number of replcas of each obect and ther locatons n a dstrbuted web server system. Choosng rght number of replcas and ther locaton s a non-trval problem. In ths paper, we presented an obect groupng algorthm and two obect replcaton algorthms. The obect groupng algorthm groups web obects based on the clent access patterns stored n access log fle. The documents that are correlated and have hgh probablty of beng accessed by a clent n a sngle sesson are put nto the same group so that they can be allocated, preferably on the same server. The frst proposed for obect replcaton s a centralzed one n the sense that a central ste determnes the replca placement n a graph to mnmze a cost functon subect to the capacty constrants of the stes. The second algorthm s a dstrbuted algorthm and hence does not need a central ste for determnng obect placement. Rather, each ste collects certan statstcs and decsons are made locally at each ste on the obects to be stored at the ste. Taen each algorthm ndvdually, smulaton results show that each algorthm mproves the latency of the transactons performed at dfferent stes as the number of stes s ncreased. A comparson of the proposed algorthms wth greedy and random algorthms demonstrates the superorty of the proposed algorthms. Average Latency Average Latency % Improvement # of stes Alg. 1 Alg. 2 Greedy Random Fgure 5. Mean latency for dfferent tree szes Alg. 1 Alg. 2 Greedy Random Fgure6. Average latency for all smulaton runs Run# Fgure 7. Average % mprovement n latency acheved by algorthm 2 References [1] ZHUO, L., WANG, C-L. and LAU, F. C. M., Document Replcaton and Dstrbuton n Extensble Geographcally Dstrbuted Web Servers, J. of Parallel and Dstrbuted Computng, Vol. 63, 2003, No. 10, pp [2] PHOHA, V. V., IYENGAR S. S. and KANNAN, R., Faster Web Page Allocaton wth Neural

13 OBJECT GROUPING AND REPLICATION... Informatca 29 (2005) Networs. IEEE Internet Computng, Vol. 6, 2002, No. 6, pp [3] KALPAKIS, K., DASGUPTA, K. and WOLFSON, O., Optmal Placement of Replcas n Trees wth Read, Wrte and Storage Costs. IEEE Trans. On Parallel and Dstrbuted Systems, Vol. 12, 2001, No. 6, pp [4] ABRAMS, M., STANDRIDGE, C. R., ABDULLA, G., WILLIAMS, S., and FOX, E. A., Cachng Proxes: Lmtatons and Potentals. Proc. 4 th Internatonal World Wde Web Conference, Boston, Dec. 1995, pp [5] CARDELLINI, V. COLAJANNI, M., and YU, P. S., Dynamc Load Balancng on Web-Server Systems. IEEE Internet Computng, Vol. 3, 1999, No. 3, pp [6] COLAJANNI, M., YU, P. S., Analyss of Tas Assgnment Polces n Scalable Dstrbuted Web Server Systems. IEEE Trans. On Parallel and Dstrbuted Systems, Vol. 9, 1988, No. 6, pp [7] KWAN, T. T., MCGRATH, R. E. and REED, D. E., NCSA s World Wde Web Server: Desgn and Performance. IEEE Computer, Vol. 28, 1995, No. 11, pp [8] BAKER, S. M. and MOON, B., Scalable Web Server Desgn for Dstrbuted Data Management. Proc. Of 15 th Int. Conference on Data Engneerng, Sydney, March 1999, pp [9] LI, Q. Z. and MOON, B., Dstrbuted Cooperatve Apache Web Server. Proc. 10 th Int. World Wde Web Conference, Hong Kong, May [10] RISKA, A. Sun, W., SMIMI, E, and CIARDO, G., ADATPTLOAD: Effectve Load Balancng n Clustered Web Servers Under Transent Load Condtons. Proc. 22 nd Int. Conf. on Dstrbuted Systems, Austra, July [11] LI, B., Content Replcaton n a Dstrbuted and Controlled Envronment. J. of Parallel and Dstrbuted Computng, Vol. 59, 1999, No. 2, pp [12] KARLSSON, M. and KARAMANOLIS, C., Choosng Replca Placement Heurstcs for Wde- Area Systems. Internatonal Conference on Dstrbuted Computng Systems (ICDCS) 2004, avalable at [13] TENZAKHTI, F., DAY, K. and OLUD-KHAOUA, M., Replcaton Algorthms for the Word-Wde Web. J. of System Archtecture, Vol. 50, 2004, pp [14] DOWDY, L. and FOSTER, D., Comparatve Models of the Fle Assgnment Problem. Computer Surveys, Vol.14, 1982, No. 2, pp [15] CHU, W. W., Optmal Fle Allocaton n a Multple Computer System. IEEE Trans. On Computers, Vol. 18, 1969, No. 10, pp [16] OZSU, M. T. and VALDURIEZ, P., Prncples of Dstrbuted Database System. Englewood Clff, N. J.: Prentce Hall, [17] APERS, P. G. M., Data Allocaton n Dstrbuted Database Systems. ACM transactons on Database Systems, Vol. 13, 1998, No. 3, pp [18] CERI, S., MARTELLA, G. and G. PELAGATTI, G., Optmal Fle Allocaton n a Computer Networ: A Soluton Method Based on Knapsac Problem. Computer Networs, Vol. 6, 1982, No. 11, pp [19] FISHER, M. K. and HOCHBAUM, D. S., Database Locaton n Computer Networs. J. ACM, Vol. 27, 1980, No. 10, pp [20] CHANG, S. K. and LIU, A. C., Fle Allocaton n Dstrbuted Database. Int. J. Computer Informaton Scence. Vol. 11, 1982, pp [21] AWERBUCH, B., BARTAL, Y. and A. FIAT, A., Compettve Dstrbuted Fle Allocaton. Proc. 25 th Annual ACM Symposum on Theory of Computng, Vctora, May 1993, pp [22] LOIKOPOULOS, T. and AHMED, I., Statc and Dynamc Data Replcaton Algorthms for Fast Informaton Access n Large Dstrbuted Systems. 20 th IEEE conference on Dstrbuted Computng Systems, Tape, [23] GAVISH, B. and SHENG, O. R. L., Dynamc Fle Mgraton n Dstrbuted Computer Systems. Comm. of ACM, Vol. 33, 1990, No. 1, pp [24] KWOK, Y. K., KARLAPALEM, K., AHMED, I. and PUN, N. P., Desgn and Evaluaton of Data Allocaton Algorthms for Dstrbuted Multmeda Database Systems. IEEE J. Selected Areas of Communcatons, Vol.17, 1996, No. 7, pp [25] BISDIKIAN, C. and PATEL, B., Cost-Based Program Allocaton for Dstrbuted Multmeda-On- Demand Systems. IEEE Multmeda, Vol. 3, 1996, No. 3, pp [26] QIU, L., PADMANABHAM, V. N. and VOELKER, G. M., On the Placement of Web Server Replcas. In Proc. Of 20th IEEE INFOCOM, Anchorage, USA, Aprl 2001, pp [27] RADOSLAVOV, P., GOVINDAN, R. and ESTRIN, D., Topology Informed Internet Replca Placement. Proc. 6th Int. worshop on Web Cachng and Content Dstrbuton, Boston, June 2001, Avalable at wcw01-proceedngs. [28] KANGASHARJU, J., ROBERTS, J. and ROSS, K. W., Obect Replcaton Strateges n Content Dstrbuton Networs. Computer Communcatons, Vol. 25, 2002, No. 4, pp [29] WOLFSON, O. JAJODIA, S. and HUANG, Y., An Adaptve Data Replcaton Algorthm. ACM Trans. Database Systems, Vol. 22, 1997, No. 2, pp [30] BESTAVROS, A.: Demand-Based Document Dssemnaton to Reduce Traffc and Balance Load n Dstrbuted Informaton Systems. Proc. IEEE Symp. On Parallel and Dstrbuted Processng, 1995, pp

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Needed Information to do Allocation

Needed Information to do Allocation Complexty n the Database Allocaton Desgn Must tae relatonshp between fragments nto account Cost of ntegrty enforcements Constrants on response-tme, storage, and processng capablty Needed Informaton to

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Efficient Content Distribution in Wireless P2P Networks

Efficient Content Distribution in Wireless P2P Networks Effcent Content Dstrbuton n Wreless P2P Networs Qong Sun, Vctor O. K. L, and Ka-Cheong Leung Department of Electrcal and Electronc Engneerng The Unversty of Hong Kong Pofulam Road, Hong Kong, Chna {oansun,

More information

Support Strong Consistency for Mobile Dynamic Contents Delivery Network

Support Strong Consistency for Mobile Dynamic Contents Delivery Network Nnth IEEE Internatonal Symposum on Multmeda 27 Support Strong Consstency for Moble Dynamc Contents Delvery Networ Zhou Su, Jro Katto and Yasuho Yasuda Graduate School of Scence and Engneerng, Waseda Unversty,

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

A Proactive Non-Cooperative Game-theoretic Framework for Data Replication in Data Grids

A Proactive Non-Cooperative Game-theoretic Framework for Data Replication in Data Grids Eghth IEEE Internatonal Symposum on Cluster Computng and the Grd A Proactve Non-Cooperatve Game-theoretc Framewor for Data Replcaton n Data Grds Al H. Elghran, Student Member, IEEE, Ry Subrata, Member,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm

Research of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm , pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems

A Genetic Algorithm Based Dynamic Load Balancing Scheme for Heterogeneous Distributed Systems Proceedngs of the Internatonal Conference on Parallel and Dstrbuted Processng Technques and Applcatons, PDPTA 2008, Las Vegas, Nevada, USA, July 14-17, 2008, 2 Volumes. CSREA Press 2008, ISBN 1-60132-084-1

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Programming in Fortran 90 : 2017/2018

Programming in Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Programmng n Fortran 90 : 2017/2018 Exercse 1 : Evaluaton of functon dependng on nput Wrte a program who evaluate the functon f (x,y) for any two user specfed values

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network

Pricing Network Resources for Adaptive Applications in a Differentiated Services Network IEEE INFOCOM Prcng Network Resources for Adaptve Applcatons n a Dfferentated Servces Network Xn Wang and Hennng Schulzrnne Columba Unversty Emal: {xnwang, schulzrnne}@cs.columba.edu Abstract The Dfferentated

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning

Outline. Type of Machine Learning. Examples of Application. Unsupervised Learning Outlne Artfcal Intellgence and ts applcatons Lecture 8 Unsupervsed Learnng Professor Danel Yeung danyeung@eee.org Dr. Patrck Chan patrckchan@eee.org South Chna Unversty of Technology, Chna Introducton

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Cost-efficient deployment of distributed software services

Cost-efficient deployment of distributed software services 1/30 Cost-effcent deployment of dstrbuted software servces csorba@tem.ntnu.no 2/30 Short ntroducton & contents Cost-effcent deployment of dstrbuted software servces Cost functons Bo-nspred decentralzed

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG

Distributed Secret Key Management Based on ECC for Ad-hoc Network Yi-xuan WU, Hua-wei CHEN * and Lei WANG 2017 2nd Internatonal Conference on Computer, Network Securty and Communcaton Engneerng (CNSCE 2017) ISBN: 978-1-60595-439-4 Dstrbuted Secret Key Management Based on ECC for Ad-hoc Network Y-xuan WU, Hua-we

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Adaptive Power-Aware Prefetch in Wireless Networks

Adaptive Power-Aware Prefetch in Wireless Networks Adaptve Power-Aware Prefetch n Wreless Networks Langzhong Yn, Student Member, IEEE, and Guohong Cao, Member, IEEE Abstract Most of the prefetch technques used n the current cache management schemes do

More information

Available online at Available online at Advanced in Control Engineering and Information Science

Available online at   Available online at   Advanced in Control Engineering and Information Science Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced

More information

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science

EECS 730 Introduction to Bioinformatics Sequence Alignment. Luke Huan Electrical Engineering and Computer Science EECS 730 Introducton to Bonformatcs Sequence Algnment Luke Huan Electrcal Engneerng and Computer Scence http://people.eecs.ku.edu/~huan/ HMM Π s a set of states Transton Probabltes a kl Pr( l 1 k Probablty

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling

Application of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling , pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Content Classification for Caching under CDNs

Content Classification for Caching under CDNs Content Classfcaton for Cachng under CDNs George Palls 1,2, Charlaos homos 2, Konstantnos Stamos 2, Athena Vakal 2, George Andreads 3 1 Department of Computer Scence, Unversty of Cyprus 2 Department of

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

Unsupervised Learning

Unsupervised Learning Pattern Recognton Lecture 8 Outlne Introducton Unsupervsed Learnng Parametrc VS Non-Parametrc Approach Mxture of Denstes Maxmum-Lkelhood Estmates Clusterng Prof. Danel Yeung School of Computer Scence and

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET

OPTIMAL CONFIGURATION FOR NODES IN MIXED CELLULAR AND MOBILE AD HOC NETWORK FOR INET OPTIMAL CONFIGURATION FOR NODE IN MIED CELLULAR AND MOBILE AD HOC NETWORK FOR INET Olusola Babalola D.E. Department of Electrcal and Computer Engneerng Morgan tate Unversty Dr. Rchard Dean Faculty Advsor

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Consistency and Update in Mobile Overlay Networks. Zhou SU, Jiro KATTO, Yasuhiko YASUDA, and Yu CHEN, Members, IEEE

Consistency and Update in Mobile Overlay Networks. Zhou SU, Jiro KATTO, Yasuhiko YASUDA, and Yu CHEN, Members, IEEE 1 Consstency and Update n Moble Overlay Networs Zhou SU, Jro KATTO, Yasuho YASUDA, and Yu CHEN, Members, IEEE Contact Emal: zhousu@asag.waseda.p Abstract Wth the development whereby moble content dstrbuton

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7

Channel 0. Channel 1 Channel 2. Channel 3 Channel 4. Channel 5 Channel 6 Channel 7 Optmzed Regonal Cachng for On-Demand Data Delvery Derek L. Eager Mchael C. Ferrs Mary K. Vernon Unversty of Saskatchewan Unversty of Wsconsn Madson Saskatoon, SK Canada S7N 5A9 Madson, WI 5376 eager@cs.usask.ca

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Hierarchical clustering for gene expression data analysis

Hierarchical clustering for gene expression data analysis Herarchcal clusterng for gene expresson data analyss Gorgo Valentn e-mal: valentn@ds.unm.t Clusterng of Mcroarray Data. Clusterng of gene expresson profles (rows) => dscovery of co-regulated and functonally

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information