WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering

Size: px
Start display at page:

Download "WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering"

Transcription

1 WINNOWING : Proecing P2P Sysems Agains Polluion By Cooperaive Index Filering Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song Deparmen of Compuer Science Norh Carolina Sae Universiy Raleigh, NC kshin2, reeves, rhee, ysong2@ncsu.edu Absrac Polluion (i.e., sharing corruped files, or conaminaing index informaion wih bogus index records) is a de faco problem in many file sharing Peer-o-Peer (P2P) sysems. Since polluion squanders nework resources and frusraes users wih unprofiable downloads (due o pollued files) and unproducive download requess (due o bogus index records), he fuure success of file sharing based P2P sysems is quesionable unless properly addressed. In his paper, we propose a novel ani-polluion scheme called winnowing. Winnowing aims o purify he index records (i.e. he informaion on files or he publishers) held by each index node in he sysem, so ha download aemps based on hese index records are more likely o yield saisfacory resuls. To aain his goal, index nodes block bogus publish messages by verifying he publisher and he conens of he publish message upon receip of a keyword or conen publish message. Second, index nodes collec feedback from he users who have downloaded files via heir index records. The colleced feedback is hen processed and refleced in he maching index record in a novel way. Careful consideraion is given o reducing he impac of false feedback, and malicious index nodes. Publish message verificaion has been implemened on op of he laes emule clien and exensive daa has been colleced from he Kad nework, using his modified clien. The measuremen resuls are summarized in his paper. The he findings from he measuremen sudy are incorporaed ino our analyical model, which is used o invesigae he performance of user feedback mediaion. The model demonsraes he effeciveness of user feedback mediaion: fas convergence o near-opimal performance and insensiiviy o various polluion aacks including he aacks which aemp o bypass winnowing. I. INTRODUCTION Peer-o-Peer (P2P) sysems have emerged as a dominan way o exchange informaion in he Inerne. Unforunaely, he informaion currenly shared in P2P sysems frequenly urns ou o be mislabeled or corruped, wasing nework bandwidh, user ime, and sorage space. For example, iang e al. [] showed ha up o 8% of he copies of popular files in he KaZaA nework are conaminaed. This conaminaion is caused in par by polluion echniques ha are inenionally inroduced by copyrigh holders [ 3]. Because polluion was no considered in he design of P2P sysems, hey are highly vulnerable o such inenional aacks [2]. Subsanial research has been done on he prevenion of polluion in P2P sysems. Several modeling echniques [3 5] have been inroduced, which are useful in undersanding he proliferaion of polluion. Some previous work [, 2, 6, 7] has given general ideas on how polluion can be reduced. Peer repuaions [8, 9] and objec repuaions [] are he major soluions proposed hus far in his lieraure. Unforunaely, no repuaion echnique o dae has been noably successful in pracice a prevening or minimizing polluion. There may be muliple reasons for his failure, including he cold sar problem for newcomers [], vulnerabiliy o Sybil aacks [, 2, 3], and he complexiy of implemenaion of proposed repuaion sysems [, ]. As a resul, i has been found ha a random based selecion approach is mos effecive under severe polluion [4]. In addiion, he fac ha he version populariy of a ile follows a Zipf disribuion in mos file sharing P2P sysems [] srongly indicaes ha users end o selec a file based on is populariy, which is also confirmed by our measuremens on he Kad nework [4] as indicaed in secion VI-A. This paper addresses he polluion problem in DHT-based P2P sysems, wih a focus on he Kad nework. We propose a novel ani-polluion scheme, called winnowing. Winnowing direcly aims o reduce he number of fruiless requess o download non-exising files and he number of downloads of pollued files by offering clean (valid, poining o unpollued files) index records o requesing peers. To aain his goal, index nodes firs deec (and ignore) bogus publish messages by verifying he publisher and he conens of he publish message upon receip of a publish message. Second, index nodes collec feedback from he users who have downloaded files via heir index records. The feedback is processed in a novel way o increase he likelihood ha index records poining o pollued files will quickly be eliminaed or disregarded. Careful consideraion is given o reducing he impac of false feedback, and malicious index nodes. The key insigh behind winnowing is ha he downloads of pollued files can be grealy reduced if index nodes aggressively mainain clean or valid index records. Publish message verificaion frusraes any aemps o inser bogus index records (poining o non-exising files or publishers) ino he sysem. User feedback mediaion helps prospecive users o efficienly find unpollued files wih he help of index nodes and oher downloaders. Winnowing has he following benefis: I can sharply reduce he number of bogus index records poining o non-exising files in a P2P sysem. Our measuremens (during Summer 28) have shown ha

2 beween 27% and 35% of he index records currenly shard in he Kad nework are bogus, which have been successfully filered ou by winnowing. I is easy o implemen, compleely disribued, and scalable. Winnowing does no require any rused hird paries, cenralized servers, or complex securiy mechanisms. Random numbers (crypographic nonces) are used insead for securiy purposes I converges quickly, and provides considerable immuniy o polluion even when accompanied by Sybil aacks. I does no have he cold sar problem as newcomers can immediaely benefi from he effors of index nodes and former downloaders o mainain clean index records. We implemen publish message verificaion on he laes version of emule clien. Using his modified clien, exensive daa has been colleced from he Kad nework. The resuls are summarized in his paper and he findings from he measuremen sudy are incorporaed ino our analyical model which is used o sudy he performance of user feedback mediaion. The model demonsraes he effeciveness of user feedback mediaion: fas convergence o near-opimal performance and insensiiviy o various polluion aacks. The remainder of his paper is as follows: In secion II, some P2P erminology and a brief overview of he Kad nework are inroduced. Exising polluion sraegies are discussed in he laer par of he secion. Secion III briefly describes and analyzes exising mehods of ani-polluion approaches. Secion IV presens he basic proocol descripion of winnowing. Some securiy consideraions are discussed in secion V. The resuls of he measuremen and analysis are presened in secion VI and VII respecively. Secion VIII discusses limiaions of he proposed mehod and possible soluions. Finally, secion IX concludes his paper. II. BACKGROUND In his secion, some P2P erminology and a brief overview of he Kad nework, he larges DHT-based P2P nework in exisence, will be inroduced, emphasizing on he publish and search mechanisms. Exising polluion sraegies will be discussed in he laer par of his secion. A. Basic P2P Terminology Here, we invesigae polluion problems in he DHT-based file sharing P2P neworks, focusing on he disribuion of movies or songs. A specific file, wheher a movie or song or somehing else, is referred o as a ile. There may be differen versions of a ile, and for one version of a ile, muliple copies could exis if he version is downloaded and shared by many users in he nework. There can also be many decoys, which appear o be versions of he ile, bu which do no in fac exis in he nework, or which conain corruped/lowerqualiy conen. Each file has meadaa, which is srucured informaion ha describes he file. Meadaa includes he file name, he file size, and he file ype or forma, ec [, 4]. A hp://emulemorph.sourceforge.ne/ keyword is a single oken exraced from he meadaa of a file, usually from he file name. I mus be composed of a leas hree characers [4]. Each file migh have many keywords. A key is an idenifier used o sore and rerieve informaion in and from he DHT, and has he same bi size as all Kad IDs. There are wo ypes of keys, a conen key and a keyword key. A conen key may be generaed by hashing he enire conen of a file, whereas a keyword key is obained by hashing a keyword of he file. A user is an operaor of a P2P clien applicaion, whereas a peer (or inerchangeably a node) is he clien applicaion iself. A user is called a conen owner (or alernaively a publisher) when he user conribues a file o he P2P nework. A user downloading a file from he he nework is referred o as a downloader. <kk2, ck, meadaa> 2 2 kk=hash( dragon ), keyword publish (kk) <keyword key, conen key, meadaa> <ck, publisher info.> <kk, ck, meadaa> Fig.. A high level absrac overview of he publish mechanism in a DHT-based P2P sysem. In his example, we assume ha he publisher wans o publish a movie file, Dragon War.mpg. Firs, he publisher hashes he enire conen o ge he conen key (ck) of he file and sends conen publish messages o he conen key owner(s). Second, he publisher hashes each keyword (i.e. dragon and war ) o ge a keyword key (kk) and sends keyword publish messages o he keyword key owner(s) of each keyword. B. Publishing and Rerieving Publishing is used o index he informaion abou a file or a publisher o he node(s) in charge of a porion of he Kad ID space. A peer who wans o publish a file (i.e. publisher) firs generaes he conen key by hashing he file conens. The publisher locaes he node ha has he closes Kad ID o he conen key 2 hrough ieraive rouing [4, 5]. Once deermined, he closes node becomes a conen key owner of he file. The conen key owner updaes is local index able wih a record <conen key, locaion informaion>, which is called a conen index record. The locaion informaion includes he basic informaion on he publisher, such as he Kad ID, he IP address, he service (TCP) por number, ec. In addiion, he publisher hashes each keyword of he file o produce a keyword key, one per keyword. For each such keyword key, he publisher locaes he closes node (keyword key owner) o he keyword key, in he same way as before, 2 Currenly, emule uses a fuzzy algorihm which selecs several peers as key owners (i.e. a olerance zone). This means he IDs of he key owners are no necessarily he closes; he deails do no affec our mehod, so we coninue o use he erminology closes for simpliciy.

3 and publishes he index informaion of he file. Each keyword key owner updaes is index able wih a record <keyword key, conen key, meadaa >; his is ermed a keyword index record. For a given key, up o closes nodes can be seleced as key owners, referred o as a olerance zone, o deal wih high churn raes. This conen publishing followed by keyword publishing is called a 2-level publishing scheme [4]. Keys are periodically republished every 5 hours for conen keys and 24 hours for keyword keys. <kk2, ck, meadaa> <kk, ck, meadaa> 3 File download <ck, publisher info.> Fig. 2. A high level absrac overview of he search mechanism in a DHT-based P2P sysem. In his example, we assume ha he downloader wans o find he movie file, Dragon War.mpg, from he sysem. To find he file, firs, he downloader hashes a possible keyword (e.g. dragon in his example) o ge he keyword key. Then, sends keyword search messages o he keyword key owner(s). Second, he downloader selecs one conen key amongs all possible conen keys reurned by he keyword key owner(s) based on he meadaa of each index record and sends conen search messsages o he conen key owner(s). Finally, he downloader downloads he file from he conen owner(s) based on he publisher (i.e. locaion) informaion reurned by he conen key owner(s). Rerieving file informaion from he DHT is essenially he inverse of publishing. A peer wishing o locae a file obains a conen key hrough a keyword search. This conen key is hen used o obain locaion informaion via a conen search. Finally, he user aemps o download he file from he publisher(s) based on he locaion informaion obained. C. Exising Polluion Aacks Depending on he sraegies aken by polluers, polluion can be classified ino hree caegories; conen polluion, meadaa polluion, and index polluion. Conen polluion [, 3, 7] changes he conens of a shared file o degrade is qualiy by insering whie noise, shuffling conens, insering or subsiuing unrelaed informaion, ec. Polluers can easily generae muliple fake files which have he same conen hash value (i.e. he same conen key) by exploiing he weakness of he curren hash funcion of he Kad nework, MD4 [6]. Meadaa polluion [,2] ampers wih he meadaa of a file raher han is conen; as a resul, peers downloading files based on ha meadaa will obain conen differen from wha hey expec. Index nodes may unwiingly sore index records poining o pollued files affeced by conen or meadaa polluion, which are referred o here as 2 corruped index records. Under hese wo sraegies, polluers indeed upload he corruped files a heir own expenses of upload bandwidh. As opposed o he above wo, index polluion [7] direcly aacks he index srucure of a P2P nework. On he one hand, a polluer can generae a random conen key which migh no mach any file in he nework, and publish he informaion <keyword key, random conen key, meadaa> o he maching keyword key owners. One he oher hand, a polluer can generae an invalid IP address ha does no correspond o any nodes (or an unavailable service por number), and publish he informaion <conen key, spurious locaion informaion> o maching conen key owners. Index nodes may unconsciously sore index records poining o non-exising files or publishers, which are referred o here as bogus index records. Wih index polluion, users fail o locae he arge file (or he publisher) when relying upon he informaion in a bogus index record. Since index nodes in mos file-sharing based P2P sysems oday do no auhenicae or verify publish messages, polluers easily conaminae he index records [7]. Moreover, polluers don need o ransfer any files, which makes his polluion sraegy prevalen in curren P2P sysems. III. REATED WORK Due o he imporance of ani-polluion in P2P sysems, here has been considerable work on he problem, saring wih modeling and measuremen. Dumiriu e al. [4] analyzed he influence of file- and nework-argeed aacks on file sharing neworks. They concluded ha randomized reply selecion provides considerable immuniy o polluion aacks, bu significanly hurs sysem performance in he absence of an aack. Kumar e al. [5] developed fluid models o capure he spread of pollued files, and user behavior. ee e al. [3] measured he awareness of real users of pollued files and incorporaed he resuls ino heir analyic model, concluding ha awareness is a key facor in polluion dynamics. One of he major direcions in resolving he polluion problem is peer repuaion [8, 9]. EigenTrus [8] calculaes and mainains a global repuaion for each peer, based on he opinion of all oher peers who have ineraced wih ha peer in he pas. Wih Scrubber [9], a peer idenifies malicious peers (who inenionally disribue pollued files) based on is direc experience, and he peer esimonials given by is neighbors. Scrubber also offers a peer rehabiliaion mechanism by giving incenive o passive polluers who volunarily remove pollued conen. Is decenralized archiecure faciliaes easy deploymens. Previous sudies [4, ], however, have shown ha peer repuaion approaches do no effecively deal wih index polluion, paricularly in a large P2P sysem. Winnowing can address index polluion wih publish message verificaion as indicaed in our measuremen resuls in secion VI. Anoher major direcion is objec (or file) repuaion [, 8]. Credence [] is a disribued voe gahering proocol in which a peer collecs voes from is neighbors o assess he auheniciy of he conen i wans o download. This mehod deermines correlaion beween wo peers based on

4 he similariy of heir voing hisories. Pracical difficulies of he mehod are he slow convergence ime o find srong relaionships [3], and he use of crypographic keys o proec voes. Differen from Credence, a downloader in winnowing needs no individually find such correlaion wih oher users in ha responsible index nodes (i.e. keyword key owners) evaluae he repuaion of an objec on behalf of individual downloaers. IP [8] is a varian of objec repuaion. IP uses a lifeime and populariy based ranking approach o filer ou pollued files. However, he major assumpion ha users end o reain a real file longer and delee a fake file more quickly, is somewha conroversial if he discoveries in [3, 9] are considered. Cosa e al. [3] ake a hybrid approach beween he peer repuaion and objec repuaion mehods. Even hough repuaion sysems are he main sream of ani-polluion in curren P2P sysems, here do exis some oher approaches. Blackising [6] is a way o find he IP address ranges ha include he large majoriy of polluers. This is done by he use of crawlers specially designed o collec meadaa from P2P neworks. This mehodology is efficien and effecive. The cenralized naure of his approach, however, could suffer from scalabiliy, faul-olerance, and securiy problems as menioned in [9]. User Filering [, 9] could reduce a large fracion of polluion if users are aware of he polluion. This approach is, however, no robus o index polluion. The Query Resul Ranking approach [2], Trus based approach [], and Traffic Encrypion approach [7] are also inroduced in his lieraure wihou implemenaion. Recenly Wang e al. [2] inroduced several aacks ha exploi criical design weaknesses of he Kad rouing, which hinders users from searching he index informaion iself. These aacks can be reduced by some minor modificaions of he Kad rouing mechanism, mos of which are already implemened in up-o-dae emule cliens (e.g. emule.49a). Moreover, since hey are insering malicious index nodes in he sysem, winnowing can handle he aacks wih he imbalanced feedback mechanism explained in secion V-B. IV. OUR APPROACH : WINNOWING In his secion we presen he basic proocol descripion of winnowing. Winnowing aims o reduce decoy (i.e. bogus or corruped) index records in P2P sysems 3. This is accomplished by publish message verificaion and user feedback mediaion. A. Publish Message Verificaion To preven index polluion (secion II-C), index nodes in winnowing verify he publisher and he conens of each (keyword and conen) publish message whenever received. The imporan principle here is ha no informaion published is acceped a face value; i is confirmed by he index nodes before accepance. 3 We focus on keyword index records in his paper, for he sake of breviy of explanaion. Publish Message Verificaion User Feedback Mediaion downloader keyword key owner(s) publisher conen key owner(s) KE Y W OR D _ S E A R C H_ R E Q K E Y W O R D _S E A R C H _R E S AFR_REQ and RES CONTENT_DOWNOAD MJR_REQ and RES K E Y W O R D _P U B I S H _R E Q P U B IS HE R _ V E R I_ R E Q P U B I S H E R _ V E R I _ R E S CONT E NT _ KE Y_ VE RI_ RE Q C O N T E N T _K E Y _V E R I _R E S KE Y W OR D _ P U B IS H_ R E S CONTENT_SEARCH_REQ CONTENT_SEARCH_RES AFR_REQ and RES MJR_REQ and RES C ON T E N T _ P U B IS H_ R E Q P U B I S H E R _ V E R I _ R E Q P U B IS HE R _ V E R I_ R E S O C A T I O N _ V E R I _ R E Q OC A T ION _ V E R I_ R E S C ON T E N T _ P U B IS H_ R E S Fig. 3. Message processing in emule wih winnowing. Black solid arrows are he normal emule messages; red dashed arrows are messages added by winnowing. Winnowing uses publish message verificaion (➀ ➃) o preven index polluion and user feedback mediaion (➄ ➉) o address conen and meadaa polluion. ) Publisher Verificaion: Index nodes mus verify wheher he publisher is a member of he nework whenever a publish message is received from a publisher, ermed publisher verificaion. Since he Kad nework adops he ieraive rouing, any peer could send publish messages direcly o maching index nodes once idenified. If no verified, one single polluer, which may or may no be a member of he nework, could repeaedly send bogus publish messages o he index nodes. This would cause he index nodes o keep many bogus index records. Publisher verificaion can simply be accomplished by sending an applicaion level hello message o he publisher (➀ and ➁), and waiing for a response. Any publish messages from he publishers wih no response are disregarded. Publisher verificaion could reduce he effec of IP spoofing presumably aken by polluers. 2) Message Conen Verificaion: The publisher verificaion above canno refrain polluers from sending publish messages wih bogus informaion if hey join he nework as a legiimae member. To block he bogus publish messages received from such polluers, index nodes should aemp o verify he conen of each publish message. Each keyword key owner mus verify he conen key in a keyword publish message, which is called conen key verificaion. A polluer can generae a random conen key which migh no mach any file in he nework, and publish he informaion <keyword key, random conen key, meadaa> o he maching keyword key owners, which is prevalen in curren P2P sysems [7]. Verificaion of he keyword publish

5 message is accomplished by issuing conen search messages, using as a arge he conen key in he keyword publish message (➃). A successful reply indicaes he conen key is valid 4. Only valid conen keys are indexed by maching keyword key owners. To bypass conen key verificaion, he polluer may send conen publish messages o he maching conen owners corresponding wih he random conen key. This, however, coss even more ime, effors, and resources of he polluer. In addiion, since each conen publish message is again verified by he maching conen key owner, he effec of his kind of aack is highly resriced. Moreover, winnowing will furher filer ou such bogus index record wih user feedback mediaion explained below. ocaion verificaion, performed by each conen key owner (➂), is very similar. B. User Feedback Mediaion The verificaion seps explained above canno preven conen and meadaa polluion by hemselves, as index nodes are unable o judge he auheniciy or qualiy of file conens. Therefore, polluers can sill sore corruped informaion (i.e. corruped index records) in he P2P sysem. To deal wih hese polluion aacks, an index node makes use of feedback provided by he users who download files based on informaion mainained and provided by he index node. The index node collecs his feedback (hrough voing) and disseminaes i (in condensed form) o poenial downloaders, along wih he oher index informaion. In fac, user feedback mediaion is a kind of repuaion and he use of repuaion is a raional choice in a disribued sysem wih malicious aackers. The novely of our scheme lies in he way of implemenaion of he repuaion. ) User Feedback Collecion: To collec user feedback, each keyword key owner mainains wo kinds of liss: keyword reference liss (KRs) and conen key voer liss (CKVs). One KR is allocaed o each keyword key and one CKV is assigned o each conen key. Once a keyword key owner receives a keyword search query from a peer P, i generaes a random number R 5 and insers <IP address, R > ino he maching KR (➅). If here is feedback o a conen key from a peer, he keyword key owner checks he KR o see wheher he peer has ever issued a keyword search query before. This can be done based on he peer s IP address and he random number presened as he proof of he peer s keyword search. If yes, hen i checks he mapping CKV o see wheher he peer has previously cas is opinion o he conen key. If no, hen i reflecs he feedback by increasing (for a posiive voe) or decreasing (for a negaive voe) he voing credis for he conen key (➇ and ➉). Finally, he keyword key owner insers <IP address, 4 Conversely, if here is no reply for he conen searches wih he conen key wihin given period of ime, he conen key will be considered as bogus. Noe ha search queries succeeds 99.9% of he ime in curren emule [2], which means he his assumpion is raional. 5 This random number (a crypographic nonce) prevens aackers from using IP addresses on he ouside of heir local sub-neworks. R> ino he CKV, prevening he peer from casing he same voe muliple imes. User feedback collecion done by each conen key owner is virually he same (➄, ➆, and ➈). 2) User Feedback Repors: To help eliminae pollued conen, some fracion of users will repor heir file download experiences o he appropriae index nodes. The user feedback repor comprises he auomaed failure repor (AFR) and he manual judgemen repor (MJR). An auomaed failure repor message is auomaically generaed and marked as pollued by he clien program for every failed download rial (➇, ➆) wihou any user inervenion. The repor is direcly sen o he mapping keyword key owner if no locaion informaion is reurned for he conen key aemped (➇) or o he mapping conen key owner if a download rial wih given locaion informaion has failed (➆). This failure could be caused by eiher a bogus index record no being properly filered ou by he maching index nodes or by a sale index record. If a download aemp is successful, and upon viewing or lisening o he file s conens, he user may send a manual judgemen repor (➉, ➈) by simply marking i as eiher clean or pollued a his or her own discreion. This repor is sen direcly o boh index nodes, keyword key owner (➉) and conen key owner (➈), so ha he resuls are refleced o he voing credis for he mapping index records. 3) Voing Credi Updae Approaches: Wih regard o he voing credi updaing, 3 differen approaches are envisioned: Addiive Increase Addiive Decrease (AIAD), Addiive Increase Muliplicaive Decrease (AIMD), and Muliplicaive Increase Muliplicaive Decrease (MIMD). Noe ha, in all approaches, he iniial amoun of voing credis for an index record is, assuming ha he original publisher of he file auomaically cass a posiive voe. Firs, in he AIAD approach, index nodes add or subrac poin o or from he amoun of voing credis for he index record (i.e. conen key or locaion informaion), if a posiive or negaive voe is received for a index record. This approach would be effecive when he probabiliy ha a downloader cass a voe is high and he cos of casing a voe is almos he same regardless of posiive or negaive. The approach, however, may no fi well wih winnowing if he imbalanced feedback mechanism (secion V-B) is considered. Second, in he AIMD approach, he amoun of voing credis for an index record increases by one whenever a posiive voe is received and conversely decreases by half for a negaive voe. This approach is effecive when more value needs o be given o a negaive voe, which is he case in winnowing due o he imbalanced feedback. Third, in MIMD approach, he amoun of voing credis for an index record doubles for a posiive voe bu decreases by half for a negaive voe. This approach is appropriae when he user feedback rae is relaively low because i increases he amoun of voing credis for he index records of clean files much faser han AIMD. Throughou his paper, we mainly focus on he analysis

6 of AIMD and MIMD approaches, considering ha () more value should be given o a negaive voe due o he imbalanced feedback of winnowing (he reason for he use of AIMD) and (2) i s difficul o expec exremely high user feedback in real P2P sysems (he reason for he use of MIMD). V. SECURITY ANAYSIS OF WINNOWING The purpose of winnowing is o uilize he index srucure of a P2P sysem o remove decoy index records; non-pollued files will hen be easily locaed by downloaders hrough he remaining valid index records. The obvious response of polluers will be o preserve decoy index records as long as possible. A. Reverse Voing Aack A likely arge of aack will be he user feedback mediaion mechanism of winnowing. Tha is, malicious nodes will lie (i.e., voe posiively for decoy index records and voe negaively for clean index records). This is referred o here as reverse voing. Such users may also aemp o amplify he impac by forging false ideniies (i.e., resoring o he Sybil aack [2]). Winnowing addresses his problem by he IP/24 prefix based binning sraegy wih weighed voing. In his approach, one IP/24 address prefix 6 is mapped ino a bin, and he weigh of a voe in he same bin decreases as he number of voes in he bin increases. This prevens muliple voes in he same IP range from being weighed oo much. The moivaion for his approach is ha i has been found ha he majoriy of users in P2P sysems are benign, and only a small facion of users in a resriced IP range are polluers. This was shown in previous work [6] and confirmed in our own measuremen resuls VI-A. In addiion, noe ha aackers can easily change or creae heir IDs (i.e. Sybil nodes) wih lile cos, bu he use of muliple IP addresses ouside of heir local sub-nes is highly resriced due o he nonce, R, explained in IV-B. B. Index Node Inserion Aack Alernaively, aackers can ry o inser hemselves as an index node of he arge file so ha hey can easily falsify he index records as hey wish. This will be possible if an aacker inenionally manipulaes is Clien ID so ha he ID maches he hash of a keyword or a conen key of he arge file. Once he aacker becomes he index node(s) of he arge ile and reurns only decoy index records whenever asked, a clean copy of he desired file canno be locaed by benign requesers. Aackers may use he Sybil aack o enhance he effeciveness of he aack. To deal wih his problem, winnowing adops a so called imbalanced feedback mechanism in which he size of voing messages differs based on wheher he voing is posiive or negaive. Tha is, he size of a posiive voe is very small (e.g. a few ens of byes) whereas he size of a negaive voe is 6 IP/24 prefix is used for he binning sraegy here based on our observaion, bu any range of prefixes of IP addresses could be applicable depend on he circumsance. relaively large (e.g. a few megabyes). This echnique has wo unique advanages. Firs, i penalizes malicious index nodes in ha index nodes wih decoy index records will suffer from a high volume of negaive voes in erms of quaniy. Second, he echnique makes i more difficul for aackers o cas many reverse voes for clean index records since ha will consume heir own resources. Noe ha even hough he size of negaive voe is large, i will no burden complian users much. This is because since winnowing converges fas, he number of negaive voes which benign users need o cas will be very small in normal case. However, acive polluers need o cas many negaive voes o nullify user feedback mediaion offered by winnowing, which demands exorbian upload bandwidh. C. Keyword Index Hijacking A final aack is simply o creae malicious index nodes (i.e. keyword owners in his case) which own a porion of he keyword address space, and fail o provide any keyword index records for seleced files. By doing so, he aacker prevens legiimae users from finding a conen key for he ile. Unforunaely, he imbalanced feedback mechanism of winnowing won help agains his kind of aack, since no search resuls are provided. We believe such aacks will be difficul and expensive, given he degree of redundancy of keyword index records in curren sysems. For insance, i has been found ha here are an average of 9 keyword key owners for a single keyword in he KAD nework [2], and each ile is indexed by a number of keywords. In addiion, Kad nework adop a so called α query (i.e. loose concurren lookup) [4] where hree searches for one search reques are launched in parallel o avoid sale rouing able enries, which could furher reduce he effec of his ype of aack. VI. MEASUREMENT RESUTS To check he effeciveness of winnowing and for beer undersanding of he Kad nework, parial funcionaliies of winnowing, he publish message verificaion (secion IV-A), is implemened on op of he up-o-dae emule clien (.49a MorphXT version. [22]). Even hough he winnowing clien does no implemen user feedback mediaion (secion IV-B), i suffices o undersand he index polluion problem in he Kad nework and how efficienly winnowing deals wih he problem. Five mp3 songs are invesigaed in he measuremen. The firs 4 famous songs (T T 4 ) were seleced from he Top Songs [23] in June of 28. The las one (T 5 ) is seleced for comparison from he lae 97 s billboard chars, which hi # a ha ime bu is relaively less popular nowadays. To collec resuls, we insered he winnowing cliens ino he Kad nework. Firs, for he keyword key owners, one keyword per each ile (K Ti ) is exraced from he file name and hashed ino he 28-bi keyword key. Then, he clien ID of he mapping keyword key owner is configured o have he same key value as he keyword key. By doing ha, each winnowing clien can receive keyword publish messages for he mapping keyword. Each keyword key owner verifies he

7 2:3 7:3 22:3 3:3 8:3 3:3 8:3 23:3 4:3 9:3 3 x 4 4 K T K T2 K T3 K T4 K T5 35 K T K T2 K T3 K T4 K T5.9 oal number of keyword publish messages conenkey search failure rae (%) fracion of failed keyword publish messages K T K T2 K T3 K T4 T 5 k 5. ime of he day 2:3 7:3 22:3 3:3 8:3 3:3 8:3 23:3 4:3 9:3 ime of he day fracion of disinc IPs of he publishers (a) oal # of keyword publish messages (b) conen key verificaion failure rae per hour (c) CDF of publishers of failed ones 6% conen key verificaion failure rae (cumulaive) 55% 5% 45% 4% 35% 3% 25% 2% 5% K T K T2 K T3 K T4 K T5 PDF of copies (log scale) T T 2 T 3 T 4 T 5 PDF of copies (log scale) 2 3 T T 2 T 3 T 4 T 5 % 2:3 7:3 22:3 3:3 8:3 3:3 8:3 23:3 4:3 9:3 ime of he day 2 conenkey number (ordered by populariy log scale) 4 2 conen key number (ordered by populariy log scale) (d) cumulaive conen key verificaion failure rae (e) op conen keys passed (f) op conen keys failed Fig. 4. Keyword publish saisics in he Kad nework publisher whenever i receives a keyword publish message by sending a KADEMIA HEO REQ message (i.e. PUB- ISHER VERI REQ). Conen key verificaion follows for he keyword publish message which has passed he publisher verificaion by sending KEDEMIA SEARCH REQ (i.e. CONTENT KEY VERI REQ) messages. If any reply is reurned wihin 45 seconds, he conen key is reaed as successful and will no be esed furher in following keyword publicaions. The failed conen keys, however, are coninually being verified. Only he conen keys which have never passed he conen key verificaion hroughou he measuremen period are marked as bogus. Second, for each conen key owner, he opmos popular conen key (i.e. version) amongs all conen keys of each ile is seleced. The conen key mus pass he wo verificaions by he maching keyword key owner. The opmos popular conen key is hen configured as is clien ID. Conen key owners carry ou he publisher verificaion and locaion verificaion in a similar way. Daa is colleced for 48 hours for keyword publish messages and hours for conen publish messages, hus reflecing a wice long ime period of he normal republish cycle. A. Keyword Publish Saisics Figure 4(a) shows he oal number of keyword publish messages received by each keyword key owner. I clearly demonsraes he ime of day effec on he oal number of keyword publish messages. I also describes load inequaliies in keyword key owners by an order of magniude. Figure 4(b) presens he conen key verificaion failure raes per hour wih respec o he oal number of keyword publish messages which have passed he publisher verificaion. The average failure rae was.6% for he publisher verificaion (graph is no shown) and 7.69% for he conen key verificaion respecively. Ineresingly, similar o 4(a), he conen key verificaion failure rae also shows he ime of day effec bu exacly in reverse. This indicaes ha some fixed amoun of bogus keyword publish messages coninue o be published by polluers. Thus, when here exiss a relaively high number of legiimae keyword publishes, he rae is low, bu as he number of legiimae keyword publishes decrease, he rae increases. Figure 4(c) plos he cumulaive disribuion funcion (CDF) for he fracion of keyword publish messages failed wih respec o he fracion of disinc IPs of he publishers. In his figure, IPs are reordered according o he number of keyword publish messages hey adverised (he mos, he firs). As indicaed, more han 6% of failed keyword publish messages are published from less han 2% of IPs for he 4 famous mp3 songs. This clearly shows ha here exiss a small fracion of users who cas massive bogus keyword publish messages for he famous songs. In fac, we idenified wo IP/24 ranges in which mos polluers reside, which appear in all he 4 mp3 songs. I is, however, no rue for he las less popular song. The polluion so far is described in erms of he oal number of keyword publish messages received by each keyword key owner. I is noed, however, ha here exis muliple keyword publish messages for he same conen key. In addiion, each keyword key owner receives he keyword publish messages no only for he arge keyword, bu also for he keywords whose hash values are numerically close enough o is clien ID. Since a user firs sends a keyword search message o find a ile, and he resuls include only he conen keys whose file

8 name includes he keyword, we need o consider he index polluion level in erms of disinc conen keys. Figure 4(d) demonsraes he cumulaive conen key verificaion failure raes wih regard o he oal number of disinc conen keys whose file name ruly includes he arge keyword. This falls in he range from 27% o 35%. Meaning ha, if a user sends a keyword search message wih he keyword K T2 o find he ile of T 2, up o 35% of conen keys amongs all he conen keys reurned are bogus, herefore he user canno find any locaion informaion wih he conen keys. Finally, version populariy of each arge song is invesigaed. In he Kad nework, he number of keyword publish messages for a conen key represens he populariy of he version (i.e. conen key) because here mus be a keyword publish message whenever a version is downloaded. To check he populariy, conen keys are ordered based on he number of keyword publish messages received during he measuremen period. Figure 4(e) demonsraes he PDF on a log-log scale for he number of copies wih respec o he op conen keys which have passed he conen key verificaion. The near lineariy of he curves confirms ha he version populariy of a ile in he Kad nework follows a Zipf disribuion, which addiionally confirms he resuls of previous sudies [, 9] on oher P2P sysems. Similar examinaion was made for he conen keys failed in he conen key verificaion. Figure 4(f) shows he PDF on a log-log scale for he number of copies wih respec o he op conen keys failed. The resuls shows ha mos bogus conen keys are published only once. B. Conen Publish Saisics Similar measuremens are conduced for conen publish messages, bu only he resuls for he saisics of users who have downloaded he same version in he same IP/24 ranges are shown here because he resuls are mos relevan o he analyic models in secion VII. TABE I THE NUMBER OF USERS PER IP/24 users / IP24 T T2 T3 T4 T5 2,362 6,827 4,292 4, ,435 9, Table I shows he number of users in each IP/24 for he opmos popular conen key of each ile. Ineresingly, he average number of users per IP/24 range who have downloaded he same version was only.. Noe ha he daa was colleced for hours, which is wice longer han he conen republish cycle, meaning ha he acual number migh be lower. VII. MODE BASED ANAYSIS AND RESUTS In his secion, we develop an analyical model for winnowing o sudy he relaive performance of he approach, focusing on user feedback mediaion (secion IV-B). The model exends previous analyical models [3 5] and capures he dynamics of he proliferaion of he good and bad copies of a single ile in he sysem. Here, he model is briefly described and compared wih previous models (he random selecion model and he populariy based selecion model in [3 5]). Noaion used in his analysis is shown in able II. TABE II SUMMARY OF NOTATIONS IN THIS SECTION M oal # of fresh users joining he nework λ user arrival rae a ime (Mλ users join he sysem a ime ) G # of good copies currenly shared in he nework a ime Nv G # of good versions (assume Nv G = G ) B # of bad copies currenly shared in he nework a ime Nv B # of bad versions (assume Nv B = B ) G # of users downloading a good version a ime B # of users downloading a bad version a ime R # of rerials a ime V G oal amoun of voing credis of good versions a ime V B oal amoun of voing credis of bad versions a ime p a probabiliy ha a user recognizes he polluion p s probabiliy ha a user shares a file afer download p v probabiliy ha a user cass a voe afer download α weighing facor([.]) maximum slackness (ime from download o auheniciy check) A. Analyic Models Iniially, here exis G differen good versions fed by benign users and B differen bad versions inroduced by polluers for he arge ile in he sysem. e M be he oal number of non-malicious, fresh users joining he sysem o download a version of he arge ile (users wih inen o download only desired iles). The users arrive he sysem wih he rae of λ a ime. When a user queries for he ile, he maching keyword key owner reurns o he user a lis of versions (conen keys) available in he sysem. Then, he user selecs one from he lis a is own discreion. We will make he following assumpions abou user behavior. The iniial benign users and polluer(s) who have inroduced he incipien versions never leave he sysem and he versions keep being copied by oher users. Once a user has downloaded a version, he auheniciy of he version is checked wihin j hours, which is an independen and idenically disribued (i.i.d.) random variable wih an upper bound. If he version is auhenic, he user decides wheher o share i wih probabiliy p s. If pollued, hen he user immediaely delees i and ries anoher download by issuing a new query unil a valid copy is obained. When checking he auheniciy of a version, users migh fail o deec he polluion of a bad version (false negaive) wih he probabiliy p a. For he auhenic ones, however, no false posiive is assumed. For aack models, here exiss only one inenional polluer for he arge ile, bu he polluer could operae muliple machines (polluing peers) wih differen IP addresses. Wihou loss of generaliy, he iniial bad versions (B ) are inroduced by his polluer.

9 In addiion o he above assumpions, for simpliciy, we only focus on how efficienly users can find a good version in he sysem raher han how fas hey can download i. So, we assume ha i equally akes one ime slo (one hour) for all users o download a copy (including he query reques and response ime). In his sense, for winnowing, only he user feedback mediaion (secion IV-B) done by (maching) keyword key owners will be considered. Iniially, no aacks excep he iniial bad copies are considered o develop each model, bu will be discussed furher laer in secion VII-B. ) Random Selecion Model: When a user sends a keyword search message, he maching keyword key owner reurns a lis of possible versions of he ile currenly available in he sysem. In he random selecion model, i is assumed ha he user randomly selecs one from he lis. So, he iniial N probabiliy ha he user selecs a good version is G v Nv G+N. As v B a consequence, a ime, he number of users downloading a good version is G Nv G = Mλ Nv G + Nv B and he number of users downloading a bad version is B Nv B = Mλ Nv G + Nv B (). (2) Since he downloaded copies are immediaely shared in mos file sharing P2P sysems including he Kad nework, he number of good copies shared a ime + would be G + G. Some of he users, however, migh decide eiher no o share heir downloaded good copies or leave he sysem (wih probabiliy p s ). Assume ha such decision happens wihin j ime slos wih equal probabiliy /. Then, he number of good copies shared in he nework a ime + is G + = G + G ( p s) j= G + j. (3) Wih regard o bad copies, a downloaded bad copy will be deleed if he user deecs he polluion (p a ) or decides no o share i ( p s ) afer polluion deecion failure. Thus, he number of bad copies shared in he nework a ime + is B + = B + B (p a + ( p a )( p s )) j= B + j. (4) If a user deecs ha he downloaded copy is pollued (wih probabiliy p a ), he user immediaely delees i and issues a new search query. So, he number of rerial a ime + will be B + j R + = p a (5) j= If he rerials are considered, he equaion and 2 need o be updaed as seen below. G = (Mλ + R ) N G v N G v + N B v (6) B = (Mλ + R ) N G v N B v + N B v. (7) Noe ha under he random selecion model, he probabiliy ha a user selecs a good version remains consan over ime. So does he probabiliy ha a user selecs a bad version. 2) Populariy Based Selecion Model: If users base heir download selecion purely on versions, he download experiences of former users are useless for new arrival users. If he experiences are shared, however, he probabiliy ha a new arriving user selecs a good version could increase. In fac, in mos file sharing P2P, when an inquiry is made, index nodes reurn a lis of versions wih informaion regarding how many copies of each version are available in he nework. In he populariy based selecion model, i is assumed ha a user selecs one version from he lis based on is populariy. Tha is, he probabiliy ha a version is seleced is proporional o he number of is copies currenly shared in he nework. So, he probabiliy ha a user selecs a good version a ime G is G +B. Thus, a ime, he number of users downloading a good version is G G = (Mλ + R ) (8) G + B and he number of users downloading a bad version is B B = (Mλ + R ). (9) G + B The fac ha he populariy of versions of a ile follows a Zipf disribuion in he Kad nework (secion VI-A) srongly indicaes ha Kad users ac as hose in his model. 3) Voing Credi Based Selecion Model (winnowing): In winnowing, each keyword key owner collecs user feedback for each version (conen key) via voing from users who have downloaded he version. Upon reques, he index nodes reurn a lis of versions wih he voing credis for each version o he requesing user. Iniially each version ges poin when published regardless of is auheniciy assuming ha he original publisher of he version auomaically cass a posiive voe for he version. Under his model, i is assumed ha users selec a version from he lis based on he voing credis of he version. Tha is, he probabiliy ha a version is seleced is proporional o he amoun of is voing credis. As a consequence, a ime, he number of users downloading a good version is G = (Mλ + R ) V G V G + V B and he number of users downloading a bad version is B = (Mλ + R ) V G V B + V B (). () Wih regard o he voing credi updae approaches, AIMD and MIMD are analyzed and evaluaed here due o he reasons discussed in secion IV-B3.

10 AIMD approach: The amoun of voing credis of a version increases by one whenever a posiive voe is received and conversely decreases by half for a negaive voe. Wihou loss of generaliy, a user can cas is voe afer checking he auheniciy of he downloaded version. If he probabiliy ha a user cass is voe afer download is p v, hen he oal amoun of voing credis for all good versions a ime + will be V+ G = V G + p v j= G + j (2) Nex, how much will voing credis be reduced if here is one negaive voe? Since here are Nv B bad versions and he oal amoun of voing credis for all bad versions a ime is V B, one negaive voe reduces he credis by V B Nv B 2 on average. So, he amoun of voing credis afer reflecing he firs negaive voe is V B V B = V B 2N B 2Nv B v. If one more negaive voe 2Nv B is refleced, hen he amoun of voing credis will be V B 2N B v V B 2N B 2Nv B v = V B (2N B (2Nv B v )2 )2. In his way, he (2Nv B oal amoun of final voing credis for )2 all bad versions afer n negaive voes will be V B (2N B v )n = V B (2Nv B)n ( ) n. Since here are 2N B v n EN = p a p v j= B + j possible effecive negaive voes (n EN ) a ime and a porion ( p a ) of users who fail o deec he polluion will cas a posiive voe wih he probabiliy p v. Thus, we have V B + = V B ( 2N B v ) nen + ( p a)p v j= j= B + j. (3) MIMD approach : The amoun of voing credis for a version doubles for a posiive voe bu decreases by half for a negaive voe. We can simply calculae he amoun of voing credis ha are increased by one posiive voe. Since here are Nv G good versions and he oal amoun of voing credis for all good versions a ime is V G, one posiive voe increases he credis by V G Nv G on average. So, he oal amoun of voing credis for all good versions afer reflecing he firs posiive voe is V G + V G = V G N B Nv G v +. Afer similar ieraion, he final Nv G voing credis wih n posiive voes will be V G (+ ) n. Nv G Since here are n EP G + j = p v possible effecive posiive voes (n EP ) a ime, we ge V G + = V G ( + N G v ) nep. (4) By he way, wih bad versions, one posiive voe and one negaive voe offse each oher wih regard o V+, B and he number of possible effecive negaive voes is n EN B + j B + j = p ap v ( p a)p v j= = (2p a )p v j= B + j j= In his case, if n EN, hen V+ B decreases bu increases oherwise. So, we have V B + = { V B ( ) nen 2Nv B V B ( + N B v ) nen when n EN oherwise. (5) Using hese resuls, he effeciveness of user-mediaed feedback is now examined for a specific scenario. B. Analyical Resuls ) The scenario: For numerical comparison, values of key parameers were se as follows: M = 2,, G = 25, B = 5, and = 48. These values were adaped from previous sudies [3 5]. Wih regard o he user arrival rae (λ ), RedHa 9 Torren racker race [24] is used o reflec he realisic user ineres and arrival rae. The meric for comparison is goodpu, which is defined as he raio of he number of good copies (G ) o he oal number of copies (G + B ) shared in he sysem G a ime (i.e. goodpu = G +B ). The final goodpu refers o goodpu where = 6 [5]. Unless oherwise specified, hese basic seings were used o generae all resuls. 2) Wihou oher aacks excep B : Figure 5(a) shows goodpus of he differen models, as a funcion of ime, under perfec condiions (p a =, p s =, p v = ). The upper bound ha is shown would be achieved if each user always seleced a good (non-pollued) file version; he lower bound is if each user always seleced a bad (pollued) file version. This is possible if here exiss an omnipoen big broher in he sysem who les users know wha versions are auhenic whenever asked, which is he upper bound of any repuaion sysem. The lower bound is he reverse case, so ha he probabiliy ha a user selecs a good copy is always, which is he ulimae objecive of polluers. As seen in his graph, if no polluion aack excep B is performed, winnowing wih eiher AIMD or MIMD reaches opimal performance much faser han eiher he populariy based approach or he random selecion approach. The random selecion approach does no reach he opimal performance level even under perfec condiions. Perfec condiions are obviously unrealisic in real sysems. Therefore, he relaive performance of each approach is invesigaed under more realisic condiions (p a =.8, p s =.6, p v =.6). In his case, p a and p s are adaped from he previous work [3 5] whereas p s is se under he assumpion ha users who decide o share he

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

Difficulty-aware Hybrid Search in Peer-to-Peer Networks

Difficulty-aware Hybrid Search in Peer-to-Peer Networks Difficuly-aware Hybrid Search in Peer-o-Peer Neworks Hanhua Chen, Hai Jin, Yunhao Liu, Lionel M. Ni School of Compuer Science and Technology Huazhong Univ. of Science and Technology {chenhanhua, hjin}@hus.edu.cn

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II

CS 152 Computer Architecture and Engineering. Lecture 7 - Memory Hierarchy-II CS 152 Compuer Archiecure and Engineering Lecure 7 - Memory Hierarchy-II Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

An Efficient Delivery Scheme for Coded Caching

An Efficient Delivery Scheme for Coded Caching 201 27h Inernaional Teleraffic Congress An Efficien Delivery Scheme for Coded Caching Abinesh Ramakrishnan, Cedric Wesphal and Ahina Markopoulou Deparmen of Elecrical Engineering and Compuer Science, Universiy

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding

Image segmentation. Motivation. Objective. Definitions. A classification of segmentation techniques. Assumptions for thresholding Moivaion Image segmenaion Which pixels belong o he same objec in an image/video sequence? (spaial segmenaion) Which frames belong o he same video sho? (emporal segmenaion) Which frames belong o he same

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2 Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks

Performance Evaluation of Implementing Calls Prioritization with Different Queuing Disciplines in Mobile Wireless Networks Journal of Compuer Science 2 (5): 466-472, 2006 ISSN 1549-3636 2006 Science Publicaions Performance Evaluaion of Implemening Calls Prioriizaion wih Differen Queuing Disciplines in Mobile Wireless Neworks

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley.

Shortest Path Algorithms. Lecture I: Shortest Path Algorithms. Example. Graphs and Matrices. Setting: Dr Kieran T. Herley. Shores Pah Algorihms Background Seing: Lecure I: Shores Pah Algorihms Dr Kieran T. Herle Deparmen of Compuer Science Universi College Cork Ocober 201 direced graph, real edge weighs Le he lengh of a pah

More information

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links

Opportunistic Flooding in Low-Duty-Cycle Wireless Sensor Networks with Unreliable Links 1 in Low-uy-ycle Wireless Sensor Neworks wih Unreliable Links Shuo uo, Suden Member, IEEE, Liang He, Member, IEEE, Yu u, Member, IEEE, o Jiang, Suden Member, IEEE, and Tian He, Member, IEEE bsrac looding

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

An Adaptive Spatial Depth Filter for 3D Rendering IP

An Adaptive Spatial Depth Filter for 3D Rendering IP JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE, VOL.3, NO. 4, DECEMBER, 23 175 An Adapive Spaial Deph Filer for 3D Rendering IP Chang-Hyo Yu and Lee-Sup Kim Absrac In his paper, we presen a new mehod

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS

MOTION DETECTORS GRAPH MATCHING LAB PRE-LAB QUESTIONS NME: TE: LOK: MOTION ETETORS GRPH MTHING L PRE-L QUESTIONS 1. Read he insrucions, and answer he following quesions. Make sure you resae he quesion so I don hae o read he quesion o undersand he answer..

More information

Improving Ranking of Search Engines Results Based on Power Links

Improving Ranking of Search Engines Results Based on Power Links IPASJ Inernaional Journal of Informaion Technology (IIJIT) Web Sie: hp://www.ipasj.org/iijit/iijit.hm A Publisher for Research Moivaion... Email: edioriiji@ipasj.org Volume 2, Issue 9, Sepember 2014 ISSN

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

An Improved Square-Root Nyquist Shaping Filter

An Improved Square-Root Nyquist Shaping Filter An Improved Square-Roo Nyquis Shaping Filer fred harris San Diego Sae Universiy fred.harris@sdsu.edu Sridhar Seshagiri San Diego Sae Universiy Seshigar.@engineering.sdsu.edu Chris Dick Xilinx Corp. chris.dick@xilinx.com

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

Restorable Dynamic Quality of Service Routing

Restorable Dynamic Quality of Service Routing QOS ROUTING Resorable Dynamic Qualiy of Service Rouing Murali Kodialam and T. V. Lakshman, Lucen Technologies ABSTRACT The focus of qualiy-of-service rouing has been on he rouing of a single pah saisfying

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

NRMI: Natural and Efficient Middleware

NRMI: Natural and Efficient Middleware NRMI: Naural and Efficien Middleware Eli Tilevich and Yannis Smaragdakis Cener for Experimenal Research in Compuer Sysems (CERCS), College of Compuing, Georgia Tech {ilevich, yannis}@cc.gaech.edu Absrac

More information

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks

Analyzing of RESPIRE, a novel approach to automatically blocking SYN flooding attacks Analyzing of RESPIRE, a novel approach o auomaically blocking SYN flooding aacks ANDRÁS KORN, JUDIT GYIMESI, DR. GÁBOR FEHÉR Budapes Universiy of Technology and Economics, Deparmen of Telecommunicaion

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

4.1 3D GEOMETRIC TRANSFORMATIONS

4.1 3D GEOMETRIC TRANSFORMATIONS MODULE IV MCA - 3 COMPUTER GRAPHICS ADMN 29- Dep. of Compuer Science And Applicaions, SJCET, Palai 94 4. 3D GEOMETRIC TRANSFORMATIONS Mehods for geomeric ransformaions and objec modeling in hree dimensions

More information

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis

SREM: A Novel Multicast Routing Algorithm - Comprehensive Cost Analysis REM: A Novel Mulicas Rouing Algorihm - Comprehensive Cos Analysis Yewen Cao and Khalid Al-Begain chool of Compuing, Universiy of Glamorgan, CF37 DL, Wales, U.K E-mail:{ycao,kbegain}@glam.ac.uk Absrac Ever-increasing

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Attack-Resilient Time Synchronization for Wireless Sensor Networks

Attack-Resilient Time Synchronization for Wireless Sensor Networks ack-resilien Time Synchronizaion for Wireless Sensor Neworks Hui Song, Sencun Zhu, and Guohong Cao Deparmen of Compuer Science & Engineering The Pennsylvania Sae Universiy Universiy Park, P 1682 Email:

More information

Using CANopen Slave Driver

Using CANopen Slave Driver CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer

More information

BI-TEMPORAL INDEXING

BI-TEMPORAL INDEXING BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,

More information

Design Alternatives for a Thin Lens Spatial Integrator Array

Design Alternatives for a Thin Lens Spatial Integrator Array Egyp. J. Solids, Vol. (7), No. (), (004) 75 Design Alernaives for a Thin Lens Spaial Inegraor Array Hala Kamal *, Daniel V azquez and Javier Alda and E. Bernabeu Opics Deparmen. Universiy Compluense of

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER ABSTRACT Modern graphics cards for compuers, and especially heir graphics processing unis (GPUs), are designed for fas rendering of graphics.

More information

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles

Dynamic Route Planning and Obstacle Avoidance Model for Unmanned Aerial Vehicles Volume 116 No. 24 2017, 315-329 ISSN: 1311-8080 (prined version); ISSN: 1314-3395 (on-line version) url: hp://www.ijpam.eu ijpam.eu Dynamic Roue Planning and Obsacle Avoidance Model for Unmanned Aerial

More information

IntentSearch:Capturing User Intention for One-Click Internet Image Search

IntentSearch:Capturing User Intention for One-Click Internet Image Search JOURNAL OF L A T E X CLASS FILES, VOL. 6, NO. 1, JANUARY 2010 1 InenSearch:Capuring User Inenion for One-Click Inerne Image Search Xiaoou Tang, Fellow, IEEE, Ke Liu, Jingyu Cui, Suden Member, IEEE, Fang

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = );

It is easier to visualize plotting the curves of cos x and e x separately: > plot({cos(x),exp(x)},x = -5*Pi..Pi,y = ); Mah 467 Homework Se : some soluions > wih(deools): wih(plos): Warning, he name changecoords has been redefined Problem :..7 Find he fixed poins, deermine heir sabiliy, for x( ) = cos x e x > plo(cos(x)

More information

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate

M(t)/M/1 Queueing System with Sinusoidal Arrival Rate 20 TUTA/IOE/PCU Journal of he Insiue of Engineering, 205, (): 20-27 TUTA/IOE/PCU Prined in Nepal M()/M/ Queueing Sysem wih Sinusoidal Arrival Rae A.P. Pan, R.P. Ghimire 2 Deparmen of Mahemaics, Tri-Chandra

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

Definition and examples of time series

Definition and examples of time series Definiion and examples of ime series A ime series is a sequence of daa poins being recorded a specific imes. Formally, le,,p be a probabiliy space, and T an index se. A real valued sochasic process is

More information

Rao-Blackwellized Particle Filtering for Probing-Based 6-DOF Localization in Robotic Assembly

Rao-Blackwellized Particle Filtering for Probing-Based 6-DOF Localization in Robotic Assembly MITSUBISHI ELECTRIC RESEARCH LABORATORIES hp://www.merl.com Rao-Blackwellized Paricle Filering for Probing-Based 6-DOF Localizaion in Roboic Assembly Yuichi Taguchi, Tim Marks, Haruhisa Okuda TR1-8 June

More information

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory CS 152 Compuer Archiecure and Engineering Lecure 6 - Memory Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game The Beer Dock 2002-08-13 17:55:44-0700 The Beer Dock: Three and a Half Implemenaions of he Beer Disribuion Game Michael J. Norh[1] and Charles M. Macal Argonne Naional Laboraory, Argonne, Illinois Absrac

More information

Project #1 Math 285 Name:

Project #1 Math 285 Name: Projec #1 Mah 85 Name: Solving Orinary Differenial Equaions by Maple: Sep 1: Iniialize he program: wih(deools): wih(pdeools): Sep : Define an ODE: (There are several ways of efining equaions, we sar wih

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion

More information

Motor Control. 5. Control. Motor Control. Motor Control

Motor Control. 5. Control. Motor Control. Motor Control 5. Conrol In his chaper we will do: Feedback Conrol On/Off Conroller PID Conroller Moor Conrol Why use conrol a all? Correc or wrong? Supplying a cerain volage / pulsewidh will make he moor spin a a cerain

More information

Computer representations of piecewise

Computer representations of piecewise Edior: Gabriel Taubin Inroducion o Geomeric Processing hrough Opimizaion Gabriel Taubin Brown Universiy Compuer represenaions o piecewise smooh suraces have become vial echnologies in areas ranging rom

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time

Quantitative macro models feature an infinite number of periods A more realistic (?) view of time INFINIE-HORIZON CONSUMPION-SAVINGS MODEL SEPEMBER, Inroducion BASICS Quaniaive macro models feaure an infinie number of periods A more realisic (?) view of ime Infinie number of periods A meaphor for many

More information

The Roots of Lisp paul graham

The Roots of Lisp paul graham The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728

More information

Visually Summarizing the Web using Internal Images and Keyphrases

Visually Summarizing the Web using Internal Images and Keyphrases Visually Summarizing he Web using Inernal Images and Keyphrases M.V.Gedam, S. A. Taale Deparmen of compuer engineering, PUNE Universiy Vidya Praishhan s College of Engg., India Absrac Visual summarizaion

More information

Locating Internet Bottlenecks: Algorithms, Measurements, and Implications

Locating Internet Bottlenecks: Algorithms, Measurements, and Implications Locaing Inerne Bolenecks: Algorihms, Measuremens, and Implicaions Ningning Hu Li (Erran) Li Zhuoing Morley Mao Carnegie Mellon Universiy Bell Laboraories Universiy of Michigan hnn@cs.cmu.edu erranlli@bell-labs.com

More information

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication

A Scheme to Reduce Packet Loss during PMIPv6 Handover considering Authentication Inernaional Conference on Compuaional Sciences and Is Applicaions ICCSA 2008 A Scheme o Reduce Loss during P Handover considering Auhenicaion Seonggeun Ryu, Gye-Young Kim, Byunggi Kim, and Youngsong Mun

More information

Utility-Based Hybrid Memory Management

Utility-Based Hybrid Memory Management Uiliy-Based Hybrid Memory Managemen Yang Li Saugaa Ghose Jongmoo Choi Jin Sun Hui Wang Onur Mulu Carnegie Mellon Universiy Dankook Universiy Beihang Universiy ETH Zürich While he memory fooprins of cloud

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

COMP26120: Algorithms and Imperative Programming

COMP26120: Algorithms and Imperative Programming COMP26120 ecure C3 1/48 COMP26120: Algorihms and Imperaive Programming ecure C3: C - Recursive Daa Srucures Pee Jinks School of Compuer Science, Universiy of Mancheser Auumn 2011 COMP26120 ecure C3 2/48

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Sociey Convenion Paper Presened a he 119h Convenion 2005 Ocober 7 10 New Yor, New Yor USA This convenion paper has been reproduced from he auhor's advance manuscrip, wihou ediing, correcions,

More information

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory CS 152 Compuer Archiecure and Engineering Lecure 6 - Memory Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

EECS 487: Interactive Computer Graphics

EECS 487: Interactive Computer Graphics EECS 487: Ineracive Compuer Graphics Lecure 7: B-splines curves Raional Bézier and NURBS Cubic Splines A represenaion of cubic spline consiss of: four conrol poins (why four?) hese are compleely user specified

More information

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages An HTTP Web Traffic Model Based on he Top One Million Visied Web Pages Rasin Pries, Zsol Magyari, Phuoc Tran-Gia Universiy of Würzburg, Insiue of Compuer Science, Germany Email: {pries,rangia}@informaik.uni-wuerzburg.de

More information

Towards a Realistic Model for Failure Propagation in Interdependent Networks

Towards a Realistic Model for Failure Propagation in Interdependent Networks Towards a Realisic Model for Failure Propagaion in Inerdependen Neworks Agosino Suraro, Simone Silvesri, Mauro Coni, Sajal K. Das Deparmen of Mahemaics, Universiy of Padua, email: agosino.suraro@sudeni.unipd.i,

More information

Modelling urban travel time variability with the Burr regression technique

Modelling urban travel time variability with the Burr regression technique Ausralasian Transpor Research Forum 2011 Proceedings 28-30 Sepember 2011, Adelaide, Ausralia Publicaion websie: hp://www.parec.org/arf.aspx Modelling urban ravel ime variabiliy wih he Burr regression echnique

More information

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:!

! errors caused by signal attenuation, noise.!! receiver detects presence of errors:! Daa Link Layer! The Daa Link layer can be furher subdivided ino:!.! Logical Link Conrol (LLC): error and flow conrol!.! Media Access Conrol (MAC): framing and media access! differen link proocols may provide

More information

EP2200 Queueing theory and teletraffic systems

EP2200 Queueing theory and teletraffic systems EP2200 Queueing heory and eleraffic sysems Vikoria Fodor Laboraory of Communicaion Neworks School of Elecrical Engineering Lecure 1 If you wan o model neworks Or a comple daa flow A queue's he key o help

More information

Partition-based document identifier assignment (PBDIA) algorithm. (long queries)

Partition-based document identifier assignment (PBDIA) algorithm. (long queries) ( ) Pariion-based documen idenifier assignmen (PBDIA) algorihm PBDIA (long queries) (parallel IR) :,,,, d-gap Compressing an invered file can grealy improve query performance of an informaion rerieval

More information

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER

A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER A GRAPHICS PROCESSING UNIT IMPLEMENTATION OF THE PARTICLE FILTER Gusaf Hendeby, Jeroen D. Hol, Rickard Karlsson, Fredrik Gusafsson Deparmen of Elecrical Engineering Auomaic Conrol Linköping Universiy,

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Data Structures and Algorithms

Data Structures and Algorithms Daa Srucures and Algorihms The maerial for his lecure is drawn, in ar, from The Pracice of Programming (Kernighan & Pike) Chaer 2 1 Goals of his Lecure Hel you learn (or refresh your memory) abou: Common

More information