CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT

Size: px
Start display at page:

Download "CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT"

Transcription

1 CONTROLLING INFORMATION FLOWS DURING SOFTWARE DEVELOPMENT Shh-Chen Chou Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Tawan ABSTRACT Informaton flow control (IFC) s useful n preventng nformaton leakage durng software executon. Our survey reveals that no IFC model s appled on the entre software development process. Applyng an IFC model on the entre software development process offers the followng features: (1) vewponts of all stakeholders (.e., customers and analysts) can be ncluded and (2) the IFC model helps correctng statements that may leak nformaton durng every development phase. In addton that no IFC model s appled to the entre software development process, we faled to dentfy an IFC model that can reduce runtme overhead. Accordng to the above descrpton, we desgned a new IFC model named PrcIFC (process IFC). PrcIFC s appled on the entre software development process. Moreover, PrcIFC s dsabled after software testng to reduce runtme overhead. KEYWORDS Software securty, nformaton flow control, software development process, reduce runtme overhead 1. INTRODUCTION Informaton securty covers many ssues such as cryptography, authentcaton, and access control. Informaton flow control (IFC) s a branch of access control. It prevents nformaton leakage durng software executon. Informaton leakage occurs when persons or other software llegally obtan senstve nformaton from a software system. In general, persons can obtan nformaton from fles or output devces and software can obtan nformaton from fles. Informaton leakage may thus happen when senstve nformaton s output. In the early days, IFC s appled n a sngle system. In the recent years, IFC has been appled to operatng systems [1-3], web servces [4-7], and even cloud applcatons [8-9]. In other words, IFC has been appled to the entre Internet. IFC s thus essental n nformaton securty. We nvolved n the research of IFC for years and dentfed that no IFC model s appled on the entre software development process. Applyng IFC on the entre software development process offers the followng features: (1) vewponts of all stakeholders (.e., customers and analysts) can be ncluded and (2) the IFC model helps correctng statements that may leak nformaton durng every development phase. We also dentfed that no IFC model take runtme overhead reducng nto consderaton, n whch the overhead s nduced by embeddng IFC models n software. We thus desgned a new IFC model to overcome the problems mentoned above. The desgn s based on the followng consderatons: DOI : /jsptm

2 a. Embeddng the IFC model nto software specfcatons and desgn documents. Tradtonal models are embedded n software only, whch may exclude the vewponts of some stakeholders. b. Executng the specfcatons and desgn documents n whch the IFC model s embedded. Ths executon causes the IFC correctness of specfcatons and desgn documents to be checked. c. Embeddng the IFC model n the software durng testng. The testng thus tests both the correctness of functons and IFC. After testng, the model s dsabled to remove runtme overhead nduced by IFC model. As descrbed n term c above, the IFC model proposed n ths paper s dsabled after testng. Nevertheless, software that passes the testng s not ensured to be correct. Therefore, the operatng system should ntercept software output nformaton to ensure securty (OS ntercepts only output nformaton because only output nformaton may be leaked to persons or other software). In our research, we desgn the IFC model and let the OS ntercepton as a future work. Snce the model s appled n the entre software development process, we name t PrcIFC (process IFC). The core of PrcIFC s the same as NetIFC [10] we desgned before. When desgnng PrcIFC, we gnored the affect of vruses and Trojan horses because they belong to other research areas. Durng the development of PrcIFC, we dentfed the followng facts. a. Snce only output nformaton may be leaked (to persons or other programs), only output statements need to be controlled. As to other statements, the jon operaton [11] should be used to adjust varable senstvty after executon. Ths adjustment prevents possble nformaton leakage when the varable s output later. b. Informaton should be separated n dfferent group for compatblty. For example, prces wth the unts of USD and EUR are ncomparable. Accordng to the facts, PrcIFC controls output statements and uses jon operatons to adjust nformaton senstvty for other statements. PrcIFC presented n ths paper offers the followng major features: a. PrcIFC s appled on the entre software development process. Therefore, t wll not exclude the vewponts of any stakeholders and helps correctng statements that may leak nformaton durng every phase of the development. b. PrcIFC s removed when software s onlne, whch remove runtme overhead. 2. RELATED WORK Tradtonal lattce-based model [12-13] s a MAC (mandatory access control) whch s crtczed as too restrcted. The decentralzed label model [11, 14] uses labels to mark the securty levels of varables. A label s composed of polces to be smultaneously obeyed. The model n [15] uses ACLs of objects to compute ACLs of executons. The model Trust-Serv [16] uses state machnes to dynamcally choose web servces at run tme. It uses trust negotaton [17] to select web servces that can be nvoked. The kernel component to determne whether a web servce can be nvoked s credental. The model proposed n [18] uses dgtal credentals for negotaton. It defnes strateges for negotaton polces. SCIFC [6] uses varous mechansm and algorthms to make sure whether a servce chan can be successfully nvoked. 2

3 Flume [1] s a decentralzed nformaton flow control (DIFC) model for operatng systems. It tracks nformaton flows n a system usng tags and labels. The control granularty s detaled to processes. The secrecy tags prevent nformaton leakage and ntegrty tags prevent nformaton corrupton. Flume also avods nformaton leaked to untrusted channel. The functon of Lamnar [2] s smlar to that of Flume. The model proposed n [19] uses X-GTRBAC [20] to control the access of web servces. X- GTRBAC can be used n heterogeneous and dstrbuted stes. Moreover, t apples TRBAC [21] to control the factor related to tme. The model n [22] uses RBAC (role-based access control) concept [23-24] to defne polces of accessng a web servce. It s a two-levelled mechansm. The frst level checks the roles assgned to requesters and web servces. The second level uses parameters as attrbutes and assgns permssons to the attrbutes. An authorzed requester can nvoke a web servce only when t possesses the permssons to access the attrbutes. The model n [25] dentfes dependences among I/O parameters of servces to decde whether servce nvocatons wll leak nformaton. The model n [26] offers functons to check ntracomponent nformaton flows through the JIF language [27]. The model n [8] appled the Chnese Wall model [28] to control nformaton flows n the IaaS level. As to servces n the SaaS level, the model cannot control ther nformaton flows. In the recent survey of [9], the authors especally emphasze the mportance of data prvacy n a cloud computng envronment. They beleved that nformaton flow control s a good soluton for the problem. However, the artcle dd not propose a concrete nformaton flow control model. Accordng to our survey, no research apples IFC n the entre software development process and almost no one dscusses runtme overhead. Fgure 1. Desgn Phlosophy Of Prcfc 3

4 3. PRCIFC Fgure 1 depcts the desgn phlosophy of PrcIFC. Before descrbng Fgure 1, we assume that software development tools, such as the UML development platform, are trusted. Therefore, PrcIFC needs not handle possble problems nduced by software development tools. Fgure 1 shows that we embed PrcIFC n specfcatons then execute them. To execute a specfcaton, we use our rapd prototypng language [29] to wrte the specfcaton. That s, we embed PrcIFC n our prototypng language. If a specfcaton passes the test of both functonal and IFC requrements, the specfcaton can be desgned. Otherwse, the requrement should be re-analyzed. Durng the desgn, we use the target language (such as C) to wrte the desgn documents and embed PrcIFC n the documents. The documents are then executed and tested. If the desgn documents pass the test of both functonal and IFC requrements, the desgn document can be mplemented. Otherwse, the desgn actvty should be repeated. Durng mplementaton, PrcIFC s embedded n the programs. The programs are then executed. If the programs pass the test of both functonal and IFC requrements, the programs are released to the customers as a software system. Before the software system s onlne, PrcIFC s dsabled to completely remove the runtme overhead. When the software s onlne, the OS ntercepts the output of the software to check possble nformaton leakage. However, the ntercepton s out of the scope of ths paper. Accordng to the descrpton n secton 1, nformaton should be assocated wth a mechansm to represent ts senstvty. The senstvty should nclude a securty level number and group. Moreover, we need a jon operaton to adjust the senstvty of varables n non-output statements. In ths regard, we let a varable s senstvty be (Sln, Gv), n whch Sln s the securty level number whereas Gv s the group. We call the senstvty a securty level. Therefore, every pece of nformaton that should be protected s assocated wth a securty level. The defnton of securty levels results n a lattce. Accordng to the lattce, only output statements are controlled strctly and other statements apples the jon operaton to adjust the securty level of varables. Suppose a pece of nformaton derved from the varable set {b b s a varable assocated wth the securty level (Slv b, Gv ) b } s outputtng to the port a (here a port s a devce or a fle), whch s assocated wth a securty level (S lv, Gv a a). Then, PrcIFC wll check the securty of the output statement usng the followng rule Rule 1. Gp Gp φ ) ( MAX ( Slv ) Slv ) (1) ( b a b a The former part of the rule requres that the output port a and the varables b n the varable set should be compatble. Otherwse, the outputtng s llegal. The latter part requres that the securty level number of the output port should be at least the same as the varables n the varable set. Ths prevents leakng nformaton carred by b to an output port. As to non-output statement, suppose a pece of nformaton a, whch s assocated wth a securty level (S lv, Gv a a ), s derved from the varable set {b b s a varable assocated wth the securty level (Slv b, Gv ) b }. Then, PrcIFC requres that the condton ( Gpb Gpa φ) to be true, whch means that the nformaton a and varables b n the varable sets are compatble. If the condton s true, the followng rule s used to adjust the securty of the nformaton a. Rule 2. Slv a = MAX Slv b ) (2) ( 4

5 4. PROVE OF CORRECTNESS Informaton leakage may occur durng output, ncludng outputtng to fles and devces. Case 1. Outputtng nformaton to a devce wll not leak nformaton under the control of PrcIFC. Proof. Informaton output to a devce Dv may only leak to persons. Suppose person P possesses a securty level number SLV p and SLV p < Slv Dv. If Dv and all nformaton sources are n the same group, Rule 1 allows the output only when MAX ( Slv b ) Slv Dv. If the output s allowed, P cannot access nformaton output to Dv because SLV p < Slv Dv. Snce b derves the nformaton output to Dv, no b wll be leaked to P. Case 2. Outputtng nformaton to fle wll not leak nformaton under the control of PrcIFC. Proof. Informaton output to a fle F may be leaked to persons or software. If F and all sources are n the same group, Rule 1 allows the output only when MAX ( Slv b ) Slv F. Case 1 above states that no b wll be leaked to a person P wth a securty level number SLV p and SLV p < Slv F. On the other hand, f the software Sf ntends to read the nformaton of V from F to the varable V 1, Rule 2 causes Slv to be the same as Slv. If Sf outputs V 1 to a v devce, Case 1 states that V 1 wll not be leaked to a person. If V 1 s output to another fle, the proof goes back to the begnnng of ths proof. However, we know that the nformaton of a senstve varable may be: (a) operatng by a software system, (b) output to a devce, or (c) output to a fle. Informaton operatng by a software system wll not be leaked wthout output. Informaton output to a devce wll not be leaked (see Case 1). As to the nformaton output to a fle, t wll not be leaked to persons. # 5. EXPERIMENT RESULTS We requred students to develop a smple lbrary system usng UML as the development model. The target language s C. We organzed two groups of students for the experment, n whch every group was conssted of ten students. For the frst group, we requred students to develop the system wthout PrcIFC. PrcIFC was embedded n ther systems durng mplementaton. That s, the students needed not use the prototypng language to wrte specfcatons and needed not use the target language to wrte desgn documents. On the other hand, we requred students n the other group to follow the process n Fgure 1 to develop ther software. Durng software development, we requred the students to collect the tme they develop documents. Durng testng, we requred students to collect the number of statements that volate PrcIFC. The collected data were then averaged. Table 1 depcts the averaged data, n whch the development tme of the frst group s normalzed to one. Table 1. Experment result v 1 Group Requrement analyss tme System desgn tme Implementaton tme Statements volatng PrcIFC

6 Table 1 shows that the requrement analyss and desgn tme of the second group was more than that of the frst group. Ths s reasonable because students n the group should wrte ther specfcatons and desgn documents usng the prototypng language and the target language, respectvely. Moreover, PrcIFC should be embedded n the languages. On the other hand, the mplementaton tme of the second group was much less because the desgn documents had been wrtten n the target language. Moreover, students n the frst group should embed PrcIFC n ther systems. What we especally concerned s the statements that volate PrcIFC. The experment result exercses us and we beleve that PrcIFC s ndeed valuable, because many statements that may leak nformaton have been removed durng software development phases before mplementaton. 6. CONCLUSION Informaton flow control (IFC) s useful n preventng nformaton leakage durng software executon. Accordng to our survey, we cannot dentfy an IFC model that s appled on the entre software development process. Applyng IFC model on the entre software development process wll not exclude the vewponts of any stakeholders. Moreover, statements that may leak nformaton can be dentfed durng every phase of software development. The other problem of tradtonal IFC models s large runtme overhead. We cannot dentfy a model that can remove ths overhead. Accordng to the descrpton above, we desgn a new IFC model named PrcIFC (process IFC). It offers the followng major features: 1. PrcIFC s appled on the entre software development process. Therefore, t wll not exclude the vewponts of any stakeholders and helps correctng statements that may leak nformaton durng every phase of the development. 2. PrcIFC s dsabled when software s onlne, whch remove runtme overhead. In the future, we wll requre students to apply PrcIFC on ther exercses for checkng the advantages and dsadvantages of the model n depth. We hope to mprove PrcIFC from the responses of students. REFERENCES [1] M. Krohn, A. Yp, M. Brodsky, and N. Clffer, M. F. Kaashoek, E. Kohler, and R. Morrs, Informaton Flow Control for Standard OS Abstractons, SOSP 07, [2] I. Roy, D. E. Porter, M. D. Bond, K. S. McKnley, and E. Wtchel, Lamnar: Practcal Fne-Graned Decentralzed Informaton Flow Control, PLDI 09, [3] N. Zeldovch, S. Boyd-Wckzer, and D. Mazères, Securng Dstrbuted Systems wth Informaton Flow Control, NSDI '08, pp , 2008 [4] S. C. Chou and C. H. Huang, An Extended XACML Model to Ensure Secure Informaton Access for Web Servces, Journal of Systems and Software, vol. 83, no. 1, pp , [5] S. C. Chou, Dynamcally Preventng Informaton Leakage for Web Servces usng Lattce, to appear n 5 th Internatonal Conference on Computer Scences and Convergence Informaton Technology (ICCIT), [6] W. She, I. L. Yen, B. Thurasngham, and E. Bertno, The SCIFC Model for Informaton Flow Control n Web Servce Composton, 2009 IEEE Internatonal Conference on Web Servces, [7] W. She, I. L. Yen, B. Thurasngham, and E. Bertno, Effectve and Effcent Implementaton of an Informaton Flow Control Protocol for Servce Composton, IEEE Internatonal Conference on Servce- Orented Computng and Applcatons,

7 [8] R. Wu, G. J., Ahn, H. Hu, and M. Snghal, Informaton Flow Control n Cloud Computng, Proceedngs of the 6th Internatonal Conference on Collaboratve Computng: Networkng, Applcatons and Worksharng, 2010 [9] J. Bacon, D. Eyers, T. F. J. M. Pasquer, J. Sngh, and P. Pezuch, Informaton Flow Control for Secure Cloud Computng, IEEE Trans. Network and Servce Management, 11(1), pp , [10] S. -C. Chou, Controllng Informaton Flows n Net Servces wth Low Runtme Overhead, Internatonal Journal of Computer Network and Informaton Securty, vol. 7, no. 3, pp. 1-9, [11] Myers A., and Lskov, B., Complete, Safe Informaton Flow wth Decentralzed Labels. Proc. 14 th IEEE Symp. Securty and Prvacy, [12] D. E., Dennng, A Lattce Model of Secure Informaton Flow, Comm. ACM, vol. 19, no. 5, , [13] D. E., Dennng, P. J., and Dennng, Certfcaton of Program for Secure Informaton Flow, Comm. ACM, vol. 20, no. 7, , [14] Myers A., and Lskov, B., Protectng Prvacy usng the Decentralzed Label Model. ACM Trans. Software Eng. Methodology, vol. 9, no. 4, [15] Samarat, P., Bertno, E., Campchett, A., and Jajoda, S., Informaton Flow Control n Object- Orented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, [16] Samarat, P., Bertno, E., Campchett, A., and Jajoda, S., Informaton Flow Control n Object- Orented Systems. IEEE Trans. Knowledge Data Eng., vol. 9, no. 4, [17] Yu, T., Wnslett, M., Seamons, K., Supportng Structured Credentals and Senstve Polces through Interoperable Strateges for Automated Trust Negotaton. ACM Transactons on Informaton and System Securty, vol. 6, no. 1, [18] Koshutansk, H., Massacc, F., Interactve Credental Negotaton for Stateful Busness Processes, Lecture notes n computer scence, [19] Bhatt, R., Bertno, E., Ghafoor, A., A Trust-based Context-aware Access Control Model for Web Servces. IEEE ICW 04, [20] Bhatt, R., Ghafoor, A., Bertno, E., Josh, J. B. D., X-GTRBAC: An XML-Based Polcy Specfcaton Framework and Archtecture for Enterprse-Wde Access Control. ACM Transactons on Informaton and System Securty (TISSEC), Vol. 8, No. 2, [21] Bertno, E., Bonatt P. A., Ferrar, E., TRBAC: A Temporal Role-Based Access Control Model. ACM Transactons on Informaton and System Securty, Vol. 4, No. 3, [22] Wonohoesodo R., Tar, Z., A Role Based Access Control for Web Servces. Proceedngs of the 2004 IEEE Internatonal Conference on Servce Computng, [23] Sandhu, R. S., Coyne, E. J., Fensten, H. L., Youman, C. E., Role-Based Access Control Models. IEEE Computer, vol. 29, no. 2, [24] R. Sandhu, D. F., Ferraolo, and D. R., Kuhn, D. "The NIST Model for Role Based Access Control: Toward a Unfed Standard", 5th ACM Workshop Role-Based Access Control. pp , 2000 [25] W. She, I. -L. Yen, B. ThuraSngham, and S. Y. Huang, Rule-Based Run-Tme Informaton Flow Control n Servce Cloud, 2011 IEEE Internatonal Conferences on Web Servces, pp , [26] L. Sfax, T. Abdellatf, R. Robbana, and Y. Lakhnech, Informaton Flow Control of Component-Based Dstrbuted Systems, Concurrency and Computaton: Practce and Experence, avalable on [27] JIF webste, Jf: Java + nformaton flow, avalable on [28] Brewer, D.F.C., Nash, M.J., The Chnese Wall Securty Polcy. In: Proceedngs of the 5 th IEEE Symposum on Securty and Prvacy, [29] S. -C. Chou, A Prototypng Technque to Verfy Requrements, ICS 2002, Hualen, Tawan. AUTHORS Shh-Chen Chou s currently a professor n the Department of Computer Scence and Informaton Engneerng, Natonal Dong Hwa Unversty, Hualen, Tawan. Hs research nterests nclude software engneerng, process envronment, software reuse, and nformaton flow control. 7

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Security Enforced Mediation Systems for Data Integration

Security Enforced Mediation Systems for Data Integration Securty Enforced Medaton Systems for Data Integraton L Yang 1, Ramund K. Ege 2 1 Department of Computer Scence and Electrcal Engneerng Unversty of Tennessee at Chattanooga, Chattanooga, TN 37403 L-Yang@utc.edu

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han

an assocated logc allows the proof of safety and lveness propertes. The Unty model nvolves on the one hand a programmng language and, on the other han UNITY as a Tool for Desgn and Valdaton of a Data Replcaton System Phlppe Quennec Gerard Padou CENA IRIT-ENSEEIHT y Nnth Internatonal Conference on Systems Engneerng Unversty of Nevada, Las Vegas { 14-16

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing

A Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing Int. J. of Computers, Communcatons & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. VI (2011), No. 2 (June), pp. 227-235 A Tme-Bound Tcket-Based Mutual Authentcaton Scheme for Cloud Computng Z. Hao, S.

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop

Association Rule Mining with Parallel Frequent Pattern Growth Algorithm on Hadoop Assocaton Rule Mnng wth Parallel Frequent Pattern Growth Algorthm on Hadoop Zhgang Wang 1,2, Guqong Luo 3,*,Yong Hu 1,2, ZhenZhen Wang 1 1 School of Software Engneerng Jnlng Insttute of Technology Nanng,

More information

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture

A Secure Dynamic Identity Based Authentication Protocol with Smart Cards for Multi-Server Architecture JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 31, 1975-1992 (2015) A Secure Dynamc Identty Based Authentcaton Protocol wth Smart Cards for Mult-Server Archtecture CHUN-TA LI 1, CHENG-CHI LEE 2;3,*, CHI-YAO

More information

Information Sciences

Information Sciences Informaton Scences 79 (9) 369 367 ontents lsts avalable at ScenceDrect Informaton Scences ournal homepage: www.elsever.com/locate/ns Necessary and suffcent condtons for transacton-consstent global checkponts

More information

Performance Study of Parallel Programming on Cloud Computing Environments Using MapReduce

Performance Study of Parallel Programming on Cloud Computing Environments Using MapReduce Performance Study of Parallel Programmng on Cloud Computng Envronments Usng MapReduce Wen-Chung Shh, Shan-Shyong Tseng Department of Informaton Scence and Applcatons Asa Unversty Tachung, 41354, Tawan

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information

Remote Sensing Image Retrieval Algorithm based on MapReduce and Characteristic Information Remote Sensng Image Retreval Algorthm based on MapReduce and Characterstc Informaton Zhang Meng 1, 1 Computer School, Wuhan Unversty Hube, Wuhan430097 Informaton Center, Wuhan Unversty Hube, Wuhan430097

More information

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1

A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources 1 A Resources Vrtualzaton Approach Supportng Unform Access to Heterogeneous Grd Resources 1 Cunhao Fang 1, Yaoxue Zhang 2, Song Cao 3 1 Tsnghua Natonal Labatory of Inforamaton Scence and Technology 2 Department

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Two-Factor User Authentication in Multi-Server Networks

Two-Factor User Authentication in Multi-Server Networks Internatonal Journal of ecurty and Its Applcatons Vol. 6, No., Aprl, 0 Two-Factor ser Authentcaton n Mult-erver Networks Chun-Ta L, Ch-Yao Weng,* and Chun-I Fan Department of Informaton Management, Tanan

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

A Facet Generation Procedure. for solving 0/1 integer programs

A Facet Generation Procedure. for solving 0/1 integer programs A Facet Generaton Procedure for solvng 0/ nteger programs by Gyana R. Parja IBM Corporaton, Poughkeepse, NY 260 Radu Gaddov Emery Worldwde Arlnes, Vandala, Oho 45377 and Wlbert E. Wlhelm Teas A&M Unversty,

More information

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme

Security Vulnerabilities of an Enhanced Remote User Authentication Scheme Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity

An Improved User Authentication and Key Agreement Scheme Providing User Anonymity 35 JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 9, NO. 4, DECEMBER 0 An Improved User Authentcaton and Key Agreement Scheme Provdng User Anonymty Ya-Fen Chang and Pe-Yu Chang Abstract When accessng

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems

Real-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance

Tsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

Rules for Using Multi-Attribute Utility Theory for Estimating a User s Interests

Rules for Using Multi-Attribute Utility Theory for Estimating a User s Interests Rules for Usng Mult-Attrbute Utlty Theory for Estmatng a User s Interests Ralph Schäfer 1 DFKI GmbH, Stuhlsatzenhausweg 3, 66123 Saarbrücken Ralph.Schaefer@dfk.de Abstract. In ths paper, we show that Mult-Attrbute

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing

Hybrid Job Scheduling Mechanism Using a Backfill-based Multi-queue Strategy in Distributed Grid Computing IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.12 No.9, September 2012 39 Hybrd Job Schedulng Mechansm Usng a Backfll-based Mult-queue Strategy n Dstrbuted Grd Computng Ken Park

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Application of VCG in Replica Placement Strategy of Cloud Storage

Application of VCG in Replica Placement Strategy of Cloud Storage Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood

A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING. James Moscola, Young H. Cho, John W. Lockwood A RECONFIGURABLE ARCHITECTURE FOR MULTI-GIGABIT SPEED CONTENT-BASED ROUTING James Moscola, Young H. Cho, John W. Lockwood Dept. of Computer Scence and Engneerng Washngton Unversty, St. Lous, MO {jmm5,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques

Enhancement of Infrequent Purchased Product Recommendation Using Data Mining Techniques Enhancement of Infrequent Purchased Product Recommendaton Usng Data Mnng Technques Noraswalza Abdullah, Yue Xu, Shlomo Geva, and Mark Loo Dscplne of Computer Scence Faculty of Scence and Technology Queensland

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Towards Autonomous Service Composition in A Grid Environment

Towards Autonomous Service Composition in A Grid Environment Towards Autonomous Servce Composton n A Grd Envronment Wllam K. Cheung +, Jmng Lu +, Kevn H. Tsang +, Raymond K. Wong ++ Department of Computer Scence + Hong Kong Baptst Unversty Hong Kong {wllam,jmng,hhtsang}@comp.hkbu.edu.hk

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing

Requirement-Oriented Privacy Protection Analysis Architecture in Cloud Computing Requrement-Orented Prvacy Protecton Analyss Archtecture n Cloud Changbo Ke 1, 2 *, Ruchuan Wang 1, 2, Fu Xao 1, 2, 4, and Zhqu Huang 3 1 School of Computer Sc. & Tech./School of Software, Nanjng Unv. of

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy

Journal of Chemical and Pharmaceutical Research, 2014, 6(10): Research Article. Study on the original page oriented load balancing strategy Avalable onlne www.jocpr.com Journal of hemcal and Pharmaceutcal Research, 2014, 6(10):274-280 Research Artcle IN : 0975-7384 ODEN(UA) : JPR5 tudy on the orgnal page orented load balancng strategy Kunpeng

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture

Two-Stage Data Distribution for Distributed Surveillance Video Processing with Hybrid Storage Architecture Two-Stage Data Dstrbuton for Dstrbuted Survellance Vdeo Processng wth Hybrd Storage Archtecture Yangyang Gao, Hatao Zhang, Bngchang Tang, Yanpe Zhu, Huadong Ma Bejng Key Lab of Intellgent Telecomm. Software

More information

Clock Skew Compensator for Wireless Wearable. Computer Systems

Clock Skew Compensator for Wireless Wearable. Computer Systems Contemporary Engneerng Scences, Vol. 7, 2014, no. 15, 767 772 HIKRI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.4688 Clock Skew Compensator for Wreless Wearable Computer Systems Kyeong Hur Dept.

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers

Game Based Virtual Bandwidth Allocation for Virtual Networks in Data Centers Avaable onlne at www.scencedrect.com Proceda Engneerng 23 (20) 780 785 Power Electroncs and Engneerng Applcaton, 20 Game Based Vrtual Bandwdth Allocaton for Vrtual Networks n Data Centers Cu-rong Wang,

More information

Petri Net Based Software Dependability Engineering

Petri Net Based Software Dependability Engineering Proc. RELECTRONIC 95, Budapest, pp. 181-186; October 1995 Petr Net Based Software Dependablty Engneerng Monka Hener Brandenburg Unversty of Technology Cottbus Computer Scence Insttute Postbox 101344 D-03013

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Design of the Application-Level Protocol for Synchronized Multimedia Sessions

Design of the Application-Level Protocol for Synchronized Multimedia Sessions Desgn of the Applcaton-Level Protocol for Synchronzed Multmeda Sessons Chun-Chuan Yang Multmeda and Communcatons Laboratory Department of Computer Scence and Informaton Engneerng Natonal Ch Nan Unversty,

More information

Hardware Support for QoS-based Function Allocation in Reconfigurable Systems

Hardware Support for QoS-based Function Allocation in Reconfigurable Systems Hardware Support for QoS-based Functon Allocaton n Reconfgurable Systems Mchael Ullmann, Wansheng Jn, Jürgen Becker Unverstät Karlsruhe (TH), Germany {ullmann, jn, becker}@tv.un-karlsruhe.de Abstract Ths

More information

Distributed Middlebox Placement Based on Potential Game

Distributed Middlebox Placement Based on Potential Game Int. J. Communcatons, Network and System Scences, 2017, 10, 264-273 http://www.scrp.org/ournal/cns ISSN Onlne: 1913-3723 ISSN Prnt: 1913-3715 Dstrbuted Mddlebox Placement Based on Potental Game Yongwen

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Adaptive Free Space Management of Online Placement for Reconfigurable Systems

Adaptive Free Space Management of Online Placement for Reconfigurable Systems Adaptve Free Space Management of Onlne Placement for Reconfgurable Systems Trong-Yen Lee, Che-Cheng Hu, and Cha-Chun Tsa Abstract The FPGA can be reconfgured both dynamcally and partally. Such reconfgurable

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS

AN ALGEBRAIC APPROACH TO CONSISTENCY CHECKING BETWEEN CLASS DIAGRAMS AN ALGEBRAIC AROACH TO CONSISTENC CHECKING BETWEEN CLASS DIAGRAMS HIDEKAZU ENJO, MOTONARI TANABU, JUNICHI IIJIMA NTT DATA Corporaton, okohama Natonal Unversty, Tokyo Insttute of Technology enouh@nttdata.co.p,

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

A Novel Fault Tolerant Scheduling Technique In Real-Time Heterogeneous Distributed Systems Using Distributed Recovery Block

A Novel Fault Tolerant Scheduling Technique In Real-Time Heterogeneous Distributed Systems Using Distributed Recovery Block Proceedngs of Natonal Conference VISION 07 on Hgh Performance Computng 2 nd Aprl 07 Government College of Engneerng, Department of CSE, Trunelvel, Taml Nadu, INDIA A Novel Fault Tolerant Schedulng Technque

More information

Design of Structure Optimization with APDL

Design of Structure Optimization with APDL Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Specifying Database Updates Using A Subschema

Specifying Database Updates Using A Subschema Specfyng Database Updates Usng A Subschema Sona Rstć, Pavle Mogn 2, Ivan Luovć 3 Busness College, V. Perća 4, 2000 Nov Sad, Yugoslava sdrstc@uns.ns.ac.yu 2 Vctora Unversty of Wellngton, School of Mathematcal

More information

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target

A QoS-aware Scheduling Scheme for Software-Defined Storage Oriented iscsi Target A QoS-aware Schedulng Scheme for Software-Defned Storage Orented SCSI Target Xanghu Meng 1,2, Xuewen Zeng 1, Xao Chen 1, Xaozhou Ye 1,* 1 Natonal Network New Meda Engneerng Research Center, Insttute of

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

Ontology Generator from Relational Database Based on Jena

Ontology Generator from Relational Database Based on Jena Computer and Informaton Scence Vol. 3, No. 2; May 2010 Ontology Generator from Relatonal Database Based on Jena Shufeng Zhou (Correspondng author) College of Mathematcs Scence, Laocheng Unversty No.34

More information

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide

Lobachevsky State University of Nizhni Novgorod. Polyhedron. Quick Start Guide Lobachevsky State Unversty of Nzhn Novgorod Polyhedron Quck Start Gude Nzhn Novgorod 2016 Contents Specfcaton of Polyhedron software... 3 Theoretcal background... 4 1. Interface of Polyhedron... 6 1.1.

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Alternating Direction Method of Multipliers Implementation Using Apache Spark

Alternating Direction Method of Multipliers Implementation Using Apache Spark Alternatng Drecton Method of Multplers Implementaton Usng Apache Spark Deterch Lawson June 4, 2014 1 Introducton Many applcaton areas n optmzaton have benefted from recent trends towards massve datasets.

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

A New Transaction Processing Model Based on Optimistic Concurrency Control

A New Transaction Processing Model Based on Optimistic Concurrency Control A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection

Conformation of EPC class 1 generation 2 standards RFID. system with mutual authentication and privacy protection Conformaton of EPC class 1 generaton 2 standards RFID system wth mutual authentcaton and prvacy protecton Chn-Lng Chen Department of Computer Scence and Informaton Engneerng, Chaoyang Unversty of Technology,

More information

Composition of UML Described Refactoring Rules *

Composition of UML Described Refactoring Rules * Composton of UML Descrbed Refactorng Rules * Slavsa Markovc Swss Federal Insttute of Technology Department of Computer Scence Software Engneerng Laboratory 05 Lausanne-EPFL Swtzerland e-mal: Slavsa.Markovc@epfl.ch

More information

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval

Description of NTU Approach to NTCIR3 Multilingual Information Retrieval Proceedngs of the Thrd NTCIR Workshop Descrpton of NTU Approach to NTCIR3 Multlngual Informaton Retreval Wen-Cheng Ln and Hsn-Hs Chen Department of Computer Scence and Informaton Engneerng Natonal Tawan

More information