Sampling Strategies for Epidemic-Style Information Dissemination

Size: px
Start display at page:

Download "Sampling Strategies for Epidemic-Style Information Dissemination"

Transcription

1 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Sampling Strategies for Epiemic-Style Information Dissemination Milan Vojnović, Varun Gupta, Thomas Karagiannis, an Christos Gkantsiis Microsoft Research Carnegie Mellon University Abstract We consier epiemic-style information issemination strategies that leverage the nonuniformity of host istribution over subnets (e.g., IP subnets) to optimize the information sprea. Such epiemic-style strategies are base on ranom sampling of target hosts accoring to a sampling rule. In this paper, the objective is to optimize the information sprea with respect to minimizing the total number of samplings to reach a target fraction of the host population. This is of general interest for the esign of efficient information issemination systems an more specifically, to ientify requirements for the containment of worms that use subnet preference scanning strategies. We first ientify the optimum number of samplings to reach a target fraction of hosts, given global information about the host istribution over subnets. We show that the optimum can be achieve by either a ynamic strategy for which the per host sampling rate over subnets is allowe to vary over time or by a static strategy for which the sampling over subnets is fixe. These results appear to be novel an are informative about (a) what best possible performance is achievable an (b) what factors etermine the performance gain over oblivious strategies such as uniform ranom scanning. We then consier several simple, online sampling strategies that require only local knowlege, where each host biases sampling base on its observe sampling outcomes an keeps only O(1) state at any point in time. Using real atasets from several large-scale Internet measurements, we evaluate the significance of the factors reveale by our analytical results on the sampling efficiency. I. INTRODUCTION We consier the problem of reaching a target fraction of an initially unknown population of hosts by using epiemicstyle information issemination. We make the assumption that the noes of the population take ientities from a large space (such as the space of IPv4 aresses), an that two noes communicate only when one of them iscovers the other by ranom probing. Initially, the information to be isseminate exists in few noes which use ranom probing to iscover more noes. Discovere noes also initiate a ranom probing process to further propagate the information. In this work, we escribe optimum static an ynamic strategies, as well as local sub-optimal strategies to efficiently isseminate the information to a given fraction of the population. If this information correspons to worm-like malicious software, the problem transforms to characterizing the performance of worm propagation. In this case, we are intereste in characterizing the minimum number of scans that a worm nees to infect a target fraction of susceptible machines; such knowlege is of value to esigners of worm countermeasures. In general, however, epiemic-style information issemination is of interest in a plethora of areas, incluing web-service Fig. 1. The setting uner consieration: strategies for efficient sampling of hosts that are istribute over ifferent groups. membership management [1], atabase maintenance [2], an streaming broacasting [3]. In such systems, information issemination is assiste by the unerlying structure of the network (e.g., p2p overlays). However, it is of theoretical interest an practical value to unerstan whether the information in such systems can be efficiently isseminate without the support of an unerlying network, when the population of the system an its istribution across the issemination network are a-priori unknown. This is consistent for example with trying to reach hosts, a large fraction of which connect to the Internet through ynamic IPs [4], ergo resulting in high population variability over time an IP space. Specifically, to esign efficient information issemination strategies we take into avantage the non-uniformity of host istribution over subnets. In particular, we assume that hosts are partitione into groups or subnets such as IP aress blocks or subnets efine by Autonomous Systems (ASes) (see for example Fig. 1). Our goal is then to minimize the samplings require to reach a preetermine fraction of hosts without any prior knowlege of their group partitioning, an only requiring the minimum amount of state possible. We first examine the case where perfect global knowlege of the host istribution over subnets exists. We fin that the optimum in this context may be achieve by either a static or a ynamic strategy, where surprisingly both strategies can be escribe by the same formula. Our analysis provies insights about the best possible performance that can be achieve. We show that while the selection of the right target set of subnets is crucial to achieve the optimum, further sampling optimization within this target set only bears minimal benefits. While it may be argue that the knowlege require by the optimum strategy (i.e., the istribution of hosts over subnets) can be estimate through various sources such as, for example, intrusion etection systems, BGP tables or even reports of infecte hosts from earlier worm attacks, we present evience that such an inference might not be as straightforwar. Using a set of iverse real Internet measurements, we highlight that ifferent atasets provie istinct viewpoints of the Internet /08/$ IEEE 2351

2 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. topology, stressing the nee for sampling strategies that require no prior knowlege of subnet partitioning, but instea they are able to euce this information online. Motivate by this fining, we propose simple strategies that bias their sampling base on previous sampling attempts using just O(1) state. Our contributions can be summarize as follows: We escribe the optimum static an ynamic strategies to minimize the number of samplings require to reach a target fraction of the host population (Sec. III-A an IV-A). Note that these appear to be novel results. We propose an evaluate simple local strategies (Sec. V) that require no prior knowlege of the host istribution over subnets, an yet significantly outperform uniform ranom scanning as well as local-subnet preference strategy. Using Internet measurement atasets, we evaluate an provie insights regaring the factors that etermine the performance of the optimal an the sub-optimal strategies. We further highlight that ifferent atasets provie istinct perspectives of the Internet topology both across the measurement traces, but also across time within the same trace (Sec. VI). To the best of our knowlege, our work is the first to fully escribe the optimum with respect to minimizing the number of samplings require to reach a fraction of hosts. While subnet preference sampling has been analyze earlier [5] an the objective of minimizing samplings has been ientifie as important also in previous work [6], the authors there restricte themselves to stuying sub-optimal strategies. II. ASSUMPTIONS AND NOTATION We first introuce the notation that we use in the remainer of the paper. We enote the size of the total aress space with Ω (e.g., for IPv4, Ω =2 32 ). The aress space is ivie into J subnets with subnet j having an aress space of size Ω j. We will refer to the hosts that receive the information item of our issemination system as infecte hosts an those that are intereste in receiving the information items but have not yet receive it as susceptible hosts. This nomenclature is commonplace in the literature. The number of hosts in a subnet j that are intereste in the information item is enote with N j with N efine as the total number of hosts (i.e., N = P J j=1 N j). We enote with I j (t) the number of infecte hosts in subnet j at time t. Similarly, we let S j (t) =N j I j (t) be the number of susceptible hosts in subnet j at time t. The quantities n j, i j (t) an s j (t) are the normalize versions efine as follows: n j = N j /N, i j (t) =I j (t)/n,ans j (t) =S j (t)/n.weenotewithi(t) an s(t) the total fraction of infecte an susceptible hosts, respectively, i.e. i(t) = P J j=1 i j(t) an s(t) = P J j=1 s j(t). Also, let = Ω j /Ω be the fraction of the total aress space occupie by the jth subnet. Without of loss of generality, we assume that subnets are enumerate such that S 1(0) Ω 1 S2(0) SJ (0) 0 (1) Ω 2 Ω J an S 1 (0)/Ω 1 > 0. We let η be the rate at which an infecte host samples the aress space for a susceptible host. Without loss of generality, we assume that η =1. In the most general setting, at time t,an infecte host in a subnet i ecies to sample a noe in a subnet j with probability p ij (t). Once it chooses subnet j, it samples an aress lying in subnet j s aress space uniformly at ranom an then initiates a contact to this aress. Let β be the ensity of hosts, i.e., β = N Ω.Define β ij(t) =β 1 p ij (t). We consier the many host limit where the total number of hosts N tens to be large while the following parameters are hel fixe N/Ω, Ω j /Ω, ani j (0), j =1,...,J. Uner assumption that each host initiates samplings at instances of a Poisson process with rate 1, the infecte host population is escribe by a Markov process inexe with N. The host population frequencies converge with N uniformly on any compact time interval to the solution of the following system of orinary ifferential equations (e.g., see Kurtz [7]) t ij(t) = β ij(t)i i(t) s j(t) (2) i=1 with s j (t) =n j i j (t), forj =1,...,J. Given the ensity of hosts over subnets n j an initial placement of infecte hosts i j (0), seeking for an optimal sampling strategy is equivalent to fining the functions β ij (t), t 0. The optimal strategy β woul epen on the impose constraints, such as, for example, for static subnet preference that β is time invariant. β ij will epen only on j if one oes not allow the noes to scan their subnet faster or have privilege information about their subnet. In that case, all the subnets have the same subnet sampling bias. In the sequel, we will enote with u(t) the total number of samplings per host by time t, i.e. u(t) = Z t i(x)x. (3) 0 III. STATIC SUBNET PREFERENTIAL SAMPLING We consier a class of sampling strategies for which the subnet preference probability istribution p is fixeintime. For this subset of sampling strategies, Eq. (2) boils own to: t i j(t) =β j i(t)s j (t) (4) where β j := βp j /, j =1,...,J. From Eq. (4), it follows i j (u) =n j s j (0)e βju, j =1,...,J (5) where u(t), t 0, isgivenbyu(0) = 0 an t u(t) =1 s j (0)e βju(t), t 0. (6) j=1 Note that for any static sampling strategy, the time ynamics of infecte host population over subnets is entirely escribe by Eq. (5) an (6). We briefly revisit the uniform ranom sampling, the well known S-I epiemics, which we will use recurrently as a reference as it is a commonplace sampling rule in practice. Note that with uniform ranom sampling p j =, i.e. a subnet j is sample proportional to the aress space size of the subnet j. Uniform ranom sampling is easy to analyze, for example, note that s(u) =s(0)e βu, u 0. (7) 2352

3 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. We will see later that for real-life istributions of hosts over subnets, the uniform ranom sampling is grossly less efficient than an optimal strategy that minimises the samplings for a given target fraction of infecte hosts. The following preliminary result provies a comparison of static sampling strategies an uniform ranom sampling; proof in Appenix [8]. Proposition 1 The set of static sampling strategies is characterise as follows: (a) For any static sampling strategy specifie by the subnet preference istribution p such that P J j=1 p Sj (0) j Ω j < 1 S(0) Ω the total fraction of infecte hosts is smaller than uner uniform ranom sampling, for any given fraction of samplings u 0, i.e.i p (u) <i ω (u), for all u>0, wherei p (u) an i ω (u) are the total fractions of infecte hosts uner static sampling p an uniform ranom sampling ω, respectively. (b) For any subnet preference istribution p such that p j < for some subnet j with s j (0) > 0, i p (u) < i ω (u), for some u>0. Item (a) ientifies a sufficient conition uner which a static sampling strategy p is less efficient than uniform ranom sampling. These are sampling strategies that in average sense bias to sampling of rare subnets. Item (b) entails that any static sampling strategy other than uniform ranom sampling over a set of subnets with each containing susceptible hosts is worse than uniform ranom sampling over this set of subnets, for some total fraction of samplings u. In the next section, we ientify optimal static sampling strategy that in the case of nonuniformly ense subnets requires smaller number of samplings than uniform ranom sampling, for a given target fraction of infecte hosts. A. Optimal Static Strategy In this section, we ientify the optimal static sampling strategy that minimises the total number of samplings to reach a given fraction of infecte hosts i 0. We show that the static strategy OPT-STATIC, specifie by the following subnet preference probabilities is optimal: OPT-STATIC Each infecte host scans a subnet j with probability: s A j (0) ω αω p j = j log j A j A 1 P i0 i(0) (8) k A s k (0) 0 j/ A where α is the normalization constant an A is the set of subnets {1, 2,...,J 0 } with ( J 0 =max j : sj(0) P j > s ) k(0) (i 0 i(0)) P. j ωk Here we use the following notation: s A s j(0) j (0) := Pk A sk(0) an ωa j =, j A. Pk A ωk The strategy specifies to sample a set A of initially ensest subnets. The necessary conition for a set A to be optimal is that the initial ensity of susceptibles in every subnet in A must be larger than the final ensity of susceptibles in A. Inee, if we target the set A then after target infection is reache, the final ensity of susceptibles in A is given by 1 P j A S j(t 0 ) Pj A Ωj = P j A S j(0) (I 0 I(0)) P j A Ωj where t 0 is the time when the fraction of infecte hosts i 0 is reache. Furthermore, note that if a subnet j is in the target set A, all subnets whose initial ensity of susceptibles is larger than the initial ensity of susceptibles in j are also in A. Lastly, note that the strategy oes not necessarily target the smallest ensest set of subnets. One may nee to target a larger set because even though that it may slow the initial phase, the ensity of susceptibles will still be sufficient as infection reaches target infection. Finally, note that in Eq. (8) the subnet preference probability for a subnet that is in the target set A is an expression containing a term logarithmic in the initial ensity of this subnet. The next result establishes that OPT-STATIC is optimal over all static sampling strategies. Theorem 2 For any given target fraction of infecte hosts, the strategy OPT-STATIC is optimal in minimising the total number of samplings over all static sampling strategies. The total number of require samplings for a target fraction of infecte hosts i 0 is given by ³ P " u STA (i 0,A)= 1 β j A ω 1 j log 1 P i0 i(0) k A s k (0) D(ω A s A (0)) where D( ) enotes Kullback-Liebler (KL) ivergence. 2 Proof: See Appenix [8]. What oes this tell us? We compare the require total number of samplings of the optimal static strategy to uniform ranom sampling. We first note the following easy result: Proposition 3 Uner uniform ranom sampling of a subset of subnets A, we have that the per host total number of require samplings for a target fraction of infecte hosts i 0 is given by u UNI (i 0,A)= 1 X log 1. β j A 1 P i0 i(0) j A sj (0) We note that the require total number of samplings for OPT- STATIC iffers from that of the uniform ranom sampling only in the KL term D( ), presuming that both strategies target the set A specifie by OPT-STATIC. The KL term measures the eviation between the initial susceptible host population sizes s j (0) an the subnet aress space sizes over subnets in the target set. In particular, if the aress sizes of subnets 1 In aition, at the en of the infection, all subnets in the target set will have equal ensity of susceptible noes. 2 Kullback-Liebler ivergence between two probability measures p an q is efine by D(p q) := P i p(i)log(p(i)/q(i)). 2353

4 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. are equal, then the KL measures the eviation of s j (0) from the uniform istribution on the target set A. Note that µ D(ω A s A Aω A(ρ(0)) (0)) = log G ω A(ρ(0)) where ρ j (0) := s j (0)/ is the ensity of a subnet j, A ω A(ρ(0)) an G ω A(ρ(0)) are the arithmetic an geometric means, respectively. A ω A(ρ(0)) = X ω P j j A k A ω ρ j(0) k G ω A(ρ(0)) = Y j A ρ j (0) ω P j k A ω k. Inee, we have that D(ω A s A (0)) > 0 unless all subnets are of same ensity, i.e., s i (0)/ω i = s j (0)/, for all i, j A (elementary property of means, Hary, Littlewoo, an Pólya [9, Section 2.5]). The question of interest is how significant is the KL term in Theorem 2 relative to the logarithmic term therein. If the KL term is insignificant relative to the logarithmic term, then this suggests that provie that one ientifies the target set A, then simple uniform ranom sampling over the set A woul yiel nearly-optimal performance. Furthermore, it is of interest to evaluate how critical is the selection of the target set on the resulting total number of samplings. We will aress these questions in Section VI. IV. DYNAMIC SAMPLING STRATEGIES In this section we consier strategies for which subnet preference probabilities are allowe to vary over time. A. Optimal ynamic strategy We now consier what optimal performance can be achieve over the entire set of feasible sampling strategies. A priori, it may not be clear whether enlarging the set of strategies from static to ynamic will yiel better performance. We show here that the answer is no. The following scheme is optimal over the entire set of ynamic sampling strategies: OPT At any point in time t with the subset of ensest subnets S(t), each infecte host samples uniformly at ranom an aress over the aress space of subnets S(t). The optimality of this strategy woul appear to be very intuitive. The strategy was claime to be optimal in [6], however, we are unaware of a proof in the literature that shows that this is inee an optimal strategy. We also characterize the host evolution for this strategy, which we later use to compare with sub-optimal strategies. Theorem 4 OPT has the following properties: 1) The strategy is optimal in that at any point of its execution the fraction of infecte hosts is maximise. 2) For any given target fraction of infecte hosts i 0,the total number of samplings is given by the relation in Theorem 2. 3) For the total number of samplings u 0, the fraction of susceptible hosts is given by, for u n 1 u<u n n X s(u) = s j(0) + G ne P β nj=1 u w j (9) where j=n+1 an u 0 =0with G n = u n = j=1 ny µ sj(0) j=1 P n j=1 ωj β log P n ω k Gn s j+1 (0) +1 for n =1, 2,...,J 1, an u J =+. (10) The result entails the following corollary: Corollary 5 For any given target fraction of infecte hosts i 0, there exists a static sampling strategy that achieves the smallest possible total number of samplings to infect the fraction of hosts i 0 over all ynamic sampling strategies. This static sampling strategy is OPT-STATIC. We en this sub-section with a comparison with uniform ranom sampling. Corollary 6 For uniform ranom sampling, we have 1) With the target fraction of infecte hosts going to 1, the total number of samplings is asymptotically optimal. 2) In the prevailing limit, the fraction of susceptible hosts uner uniform ranom sampling an optimal satisfy s UNI (u) lim u + s OPT (u) = ed(ω s(0)) (11) where D(ω s(0)) is the Kullback-Lieber ivergence between (ω 1,...,ω J ) an (s 1 (0),...,s J (0)). Item 1 is rather intuitive. Let i 0 =1 1/N be the fraction where all but one host are infecte. Then, from Theorem 4, we have that the log term is logarithmic in N while the KL term is a constant, thus asymptotically negligible. Item 2 follows irectly from Theorem 4, Proposition 3, an the fact Eq. (7). B. Proportional Sampling: A Sub-Optimal Dynamic Strategy The optimal strategies iscusse so far woul in many cases be ifficult to implement as they require global knowlege about ensities of susceptible hosts over subnets. In particular, the optimal static strategy requires knowing initial ensities of susceptible hosts over subnets while the ynamic optimum strategy requires knowing the subset of ensest subnets at any point in time uring its execution. In this section, we consier a sampling strategy that is base on sampling a subnet proportional to the number of susceptible hosts in this subnet. It follows from the analysis below that, in general, proportional sampling is a sub-optimal strategy. It is not clear, though, how far is the proportional sampling from optimal for istributions of hosts over subnets in practice; we investigate this in Section VI. We next characterise a generalize version 2354

5 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. of the proportional sampling (we call PROP) that is a mix of uniform ranom sampling an sampling proportional to the ensity of susceptibles per subnet. The strategy is specifie by the parameter 0 q 1 enoting the probability that a host samples a subnet proportional to the number of susceptibles in this subnet. (q =1correspons to pure proportional sampling.) PROP An infecte host with probability q samples a subnet proportional to the current number of susceptible hosts in this subnet, or else samples a subnet by uniform ranom sampling of the entire aress space. It turns out that uner strategy PROP the fraction of susceptible hosts for any given total number of samplings u 0 is given in a simple analytical form: Theorem 7 The fraction of susceptible hosts in a subnet j is given by s j (u) =s j (0) 1+ e β(1 q)u sj (0) ψ(u) (12) where ψ is the implicit function µ ω k log 1+ s k(0) ψ(u) = βqu. (13) ω k Proof (Appenix [8]) shows that in fact the ynamics uner PROP is entirely escribe by a scalar ifferential equation for ψ an that the evolution of the susceptible hosts in a subnet j is given by the function of ψ given in the theorem. V. SAMPLING STRATEGIES THAT USE ONLY LOCAL KNOWLEDGE We consier sampling strategies that are local in that each host biases its sampling over subnets base solely on the observe successes an failures of its own samplings. Moreover, we confine our attention to strategies that at any time keep state of only a fixe number of subnets with respect to the total number of subnets in the system. We consier several sampling strategies an escribe their ynamics by ifferential systems. This enables our numerical evaluations in Section VI. A. Local Subnet Preference We first consier the well-known local subnet preference strategy (e.g., use by CoeRe-II worm), efine as follows: LOC-PREF A infecte host in a subnet j, with probability q j, samples an aress uniformly over the aress space of the subnet j, or else it samples an aress uniformly over the entire aress space. This strategy can be seen as a ynamic sampling strategy specifie by the following subnet preference probabilities p j (t) = 1 q k v k (t) + q j v j (t) (14) where v j (t) :=i j (t)/ P J i k(t). B. K-FAIL Strategy We next consier another strategy that biases to subnets from which a host observes successful samplings. The strategy is escribe as follows (K 1 is a configuration parameter): K-FAIL 1) Initially, infecte hosts use uniform ranom sampling. 2) When a host that performs uniform ranom sampling successfully samples a host in a subnet j, it continues to sample uniformly at ranom on the subnet j until K consecutive scan failures. 3) Upon K consecutive failures, the host switches to uniform ranom sampling, until it successfully samples a susceptible host when it goes to item 2. We are unaware of a issemination system in practice that uses this strategy. The strategy is perhaps closest relate to the Zotob family of worms that use similar but ifferent strategy. With some Zotob worms, an infecte host starts with scanning its local subnet until K consecutive failures, an then switches to an remains inefinitely a uniform ranom scanner. Instea, K-FAIL strategy sticks to a subnet from which it successfully samples a susceptible host an may switch over between uniform ranom sampling moe an sticking to a subnet moe. We next escribe ynamics of K-FAIL strategy. Each infecte host is in one of K states: 0 enoting the state in which host performs uniform ranom sampling, or state k where K k enotes the number of successive failures that the host alreay incurre, k =1,...,K.Weenotewithr 0 the fraction of infecte hosts that are in state 0 an with r j,k the fraction of infecte hosts in a subnet j that are in state k. The ynamics of the system is entirely escribe by the following ifferential equations: sj t = β r 0 + µ t r0 = r i,1 i=1 KX r j,k 1 β si t r j,k = r k,j + r k+1,j rj,k = rj,k +2 t ω i s j r 0β µ 1 β sj r 0βs j + β sj s i i=1, 1 k<k KX r j,k. The equations capture the transitions of host states. We use this system in our numerical evaluations in Section VI. C. Subnet Preference Strategy We consier a subnet preference sampling strategy where each host maintains a caniate set of a fixe number K 1 of subnets. Each host splits its effort to sampling subnets from its caniate set an uniform ranom sampling. Again, we are unaware of a system that uses this strategy. It appears natural to consier strategies for which each host keeps a (small) list of subnets an uses sorting strategies of 2355

6 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. the caniate subnets in the list, such as for example, move-tofront sort heuristic, in orer to bias its sampling to subnets at the hea of the list. We instea consier the below introuce K-CANDSET strategy that keeps no orer of the items in the list for ease of analysis. Inee, for the caniate set of size at most 1, i.e.k =1, the two schemes are equivalent. In this case, it can be consiere as a generalization of local subnet preference sampling by letting the preference subnet not to be fixe to local subnet but to change to subnets from which the host observes successful samplings. The strategy is introuce in the following, where 0 q<1 is a configuration parameter. K-CANDSET 1) Init: infecte hosts set their caniate sets accoring to a policy (efault: empty set). 2) With probability q, a host samples a subnet by picking uniformly at ranom from its caniate set. 3) Otherwise, the host samples by uniform ranom sampling of the entire aress space. If the sampling to a subnet k is successful an subnet k is not in the caniate set of this host, the following happens: a) If the caniate set of this host is smaller than K, then subnet k is ae to the caniate set, b) else, the subnet k replaces a subnet from the caniate set, evicte uniformly at ranom. 4) A host infecte by an instigator host, inherits the caniate set of the instigator host (the caniate set of the instigator upate after successful sampling of this host). The ynamics of the above escribe sampling strategy is entirely specifie by the following system of orinary ifferential equations. In orer to keep the notation simple, we isplay equations only for the special case K =1,but note that similar equations are easily erive for the general case. Let r k enote the fraction of infecte hosts of type k, i.e., those with the caniate set {k} an let r 0 enote the fraction of hosts of type 0, i.e., with empty caniate set. t s s j j = β (1 q) r k + q ( r 0 + r j ) k=0 r0 = r0 βs k t rj = 2(1 q) r k βs j + t k=0 +r j qβ sj (1 q) βs k. Again, we will use these equations to erive our numerical results in Section VI. VI. EXPERIMENTAL RESULTS In this section we perform an extensive evaluation of the strategies escribe throughout sections III- V. We first outline Fig. 2. Subnet ensity for all atasets. the set of analyse atasets which cover iverse Internet measurements reflecting the istributions of IP aresses over the IP space (Section VI-A). We then examine the factors that etermine the ynamics of the optimum strategy (Section VI-B ) an finally we evaluate the performance of the propose strategies that require no sie knowlege about the istribution of hosts over subnets (Section VI-C). A. Datasets Our atasets consist of measurement traces of IP aresses. We aggregate IPs into groups or subnets of various sizes such as for example /8 an /16 subnets, or into groups base on Autonomous Systems (AS). Without loss of generality we will use /16 subnet groups for the remainer of the paper unless otherwise specifie. Throughout our evaluation, we make use of the following atasets: 3 WU : The ataset refers to IIS logs collecte at the Winows Upate system [10]. In our experiments we will use the 117 million IP aresses observe uring the first ay of the measurement. (Populate /16s: ) Hotmail : The ataset consists of approximately 103 million IP aresses which were observe over a perio of three months from logs of user-logins at the Hotmail service [4]. (Populate /16s: ) DShiel : The ataset consists of roughly 7.6 million IP aresses that were collecte by a set of firewall an intrusion etection systems provie by DShiel [11] an were use in [12] an [13]. This ataset may contain spoofe source IP aresses. (Populate /16s: ) Witty : A list of IPs (roughly 55 thousans) corresponing to hosts spreaing the Witty worm provie by CAIDA [14]. (Populate /16s: 5271.) Fig. 2 presents the ensity of hosts in /16 subnets as seen in each of our atasets. Density here refers to the fraction N j /N, while the x-axis presents to the rank of each subnet with respect to its ensity (i.e., x =1refers to a ensest subnet). Note that while overall the shapes of the curves appear similar, ensities of istinct subnets appear quite ifferent across the atasets. We will extensively examine these ifferences in the following section, as they significantly impact the performance of the sampling strategies, e.g. the selection of the target set A escribe in Section III-A. 3 Due to space limitations results will be presente for only some atasets interchangeably. Our finings however apply to all atasets. 2356

7 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Fig. 3. Logterm vs. KL term in the four atasets. The KL term oes not appear to be significant. Fig. 5. LEFT: Augmenting the target set size an its effect on the number of samplings. RIGHT: The optimal target set size an the minimum number of sets to cover a fraction of the population. Fig. 4. Optimal strategy (opt) vs. uniform ranom scanning of the target set (rn) an the optimal set of ensest subnets (rnopt). All curves fall on top of one another. B. Optimal strategy evaluation We first examine the factors that affect the total number of samplings for the optimal sampling strategy. Note that in Theorem 2 we foun that the total number of samplings per susceptible host epens on the logarithmic an the KL term therein. We now examine the significance of these two iniviual factors. This is of interest as if it turns out that the KL term can be neglecte relative to the logarithmic term, then the implication is that simple uniform ranom sampling of the target set A woul alreay be near-optimal an fine-tuning of the subnet preference probabilities may not be neee. Fig. 3 specifically examines these two factors in the four atasets as the fraction of infecte hosts i 0 grows. Inee, in all cases we observe that the KL term is several orers of magnitue smaller than the logarithmic term, especially in the larger atasets for smaller i 0. Furthermore, while for the DShiel an Witty atasets the KL term appears larger for a range of values for small i 0, this is only a sie-effect of the smaller number of IP aresses in these atasets an oes not reflect true operational regions (e.g., for i 0 =10 6 in the witty ataset there are no hosts to be infecte since the total number of IP aresses is roughly 55 thousan). The above observation suggests that optimization of scanning rates over subnets of the optimal target set yiels insignificant or moerate gain compare to simply using uniform ranom scanning over the optimal target set. Thisisfurther Fig. 6. Examples of employing a non-optimal target set with a prior istribution. TOP: Prior istribution: DShiel. True: Hotmail. BOTTOM: Prior istribution: WU. True: Hotmail. valiate by Fig. 4 which compares the optimal strategy vs. uniform ranom sampling within the target set an uniform ranom sampling on the smallest set of ensest subnets that covers the target fraction of infecte hosts (rn an rnopt curves in the figure). In Fig. 4, all curves fall on top of one another, showing that these strategies perform similarly if the optimal target set has been well ientifie. However, the choice of the target set is critical with respect to the total number of samplings, since a poor choice of the target set A may have a ramatic impact on the require number of samplings to reach a target fraction of the host population. To evaluate the iscrepancy from the optimal strategy with a poor choice of A, we perform the following experiment. For a given target fraction of infecte hosts i 0, we augment the optimal target set A by aing subnets in ecreasing orer of their ensities, an we then examine the incurre penalty. For example, if the optimum target set is A = {1, 2,...,j}, weefine sets A as A {j +1}, A {j +1,j +2}, etc. In our evaluations, we enlarge the target set by a factor k, i.e.k = A A. This effect is shown 2357

8 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Fig. 7. in Fig. 5(left) where for various i 0 of the WU ataset, we show the ratio of the number of samplings by uniform ranom sampling of the set A to that of uniform ranom sampling of the optimum target set A vs. the target fraction of infecte hosts. For reference, Fig. 5(right) presents the size of the optimal target set A an the minimum possible set of subnets to cover a given fraction of the target host population i 0.We observe that as i 0 increases, the penalty factor becomes quite significant especially when i is larger than 1% (e.g., to reach roughly 14% of the population, a tenfol increase of the target set, will prouce 5 times more samplings). When i 0 is small augmenting the target set size oes not incur a high penalty, since i 0 is alreay reachable by the ensest sets alreay in A. Fig. 5 also shows that the penalty increases roughly linearly with k for a given i 0. (In Fig. 5-left, i i 0.) The criticality of the target set is also highlighte when the optimal static sampling strategy is configure using a prior istribution of hosts over subnets, an then applie over a host population following a ifferent istribution. We compare the final fraction of sample hosts when the above strategy is applie to a) the population istribute accoring to the prior istribution, an b) a population istribute accoring to another true reference istribution. This coul be seen as having imperfect knowlege about the true istribution, which can result in using a non-optimal target set A. Fig.6 presents the results of two such experiments: when using DShiel as a prior an Hotmail as the true istribution, an using WU as a prior an Hotmail as the true istribution For reference, we also plot the cumulative fraction of hosts for the true istribution resiing in the subnets corresponing to the ensest subnets in the prior istribution with a given total fraction of population. Fig. 6 highlights that the iscrepancy with respect to the optimal is significant. How sub-optimal might the target set A be having partial knowlege? There are two important factors which etermine how useful a prior istribution might be: 1. The fraction of the population in the true istribution for which the corresponing subnets in the prior are empty. The importance of this fact is highlighte when comparing Hotmail vs. Dshiel. Approximately 30% of Hotmail hosts resie in subnets which are empty in the DShiel ata set (x =1, y =0.7 top right plot in Fig. 6). This implies that when using DShiel as a prior for Hotmail, we can never reach more than 70% of WU s population. 2. The ifference in istribution of hosts among the Comparing the ensest subnets across the atasets an across time. Fig. 8. The impact of the group size on the KL term an the samplings uner the optimal strategy. populate subnets. The importance of this fact is highlighte when using WU vs. Hotmail. In both cases, approximately 10% of hosts in one ata set resie in subnets which are empty in the other ata set. However, the curves comparing the istributions look rastically ifferent. The plot of Hotmail s istribution in the ensest WU subnets as a function of cumulative fraction of hosts in WU is almost a straight line an very close to y = x (Fig. 6, bottom, right). Thus, using WU as a prior for Hotmail performs better than using DShiel; yet, the other way roun (i.e., Hotmail as a prior for WU) oes not (plot omitte ue to lack of space; similar to Fig. 6, top). To further examine the ifference between the istributions accoring the various atasets, we compare the analyse traces by examining the fraction of common ensest subnets within the set of top-k ensest subnets for each istribution. Fig. 7 presents the extent to which the ensest subnets vary from one istribution to another by pairwise comparing the atasets. Similarly, Fig. 7(right) presents the same result but for ifferent time viewpoints for the WU ataset where timing information is available. Surprisingly, the iscrepancy appears to be substantial. For example, for k =10the sets of the 10 ensest subnets of the WU an the Hotmail istributions have only one subnet in common, while no common subnets exists when consiering the DShiel istribution While the ensest subnets across time for the same istribution appear to be more stable the iscrepancy may still be nontrivial. These observations clearly raise the problem of accurately estimating the true subnet istribution in the Internet. Finally we consier the impact of host partitioning in subnets on performance of the optimal strategy. To this extent, Fig. 8 presents the KL term an the number of samplings uner the optimal strategy for various subnet efinitions of the WU trace. Specifically, IP aresses are groupe to /n subnets, with n ranging from 8 to 20. We fin that while grouping 2358

9 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Fig. 9. The fraction of sample hosts i(u) vs. the number of samplings u for sub-optimal strategies. LEFT: Proportional sampling. MIDDLE: Local-knowlege strategies. RIGHT: Zooming in mile figure for small i(u). oes not appear to have a significant effect on the KL term, the number of sampling increase as the groups become larger (i.e., n smaller). (This is expecte from our analytical results as splitting subnets into sub-subnets inee enlarges the set over which the optimisation is one.) This effect highlights that smaller groupings appear more attractive since effort will be concentrate in small populate subnets, in contrast to performing reunant samplings in large subnets which woul be a lot sparser in general, but this may a to the complexity of ientifying the optimum target set of subnets. C. Sub-optimal strategies Here, we examine the performance of our propose strategies with respect to the optimal an the uniform ranom sampling strategies. We start by stuying proportional sampling (PROP Section IV-B) in Fig 9(left), where we plot PROP vs. the optimal (OPT) an uniform ranom sampling (RND) for all atasets. In all cases, PROP follows closely the optimal. This is an interesting property as it suggest that alreay proportional sampling brings us very close to the optimal an may inform esign of online sampling strategies. Similarly, Fig 9(mile) an Fig 9(right) show the performance of sampling strategies that only take avantage of local knowlege (Section V) for the WU ataset. For reference, we also present the optimal, uniform ranom an PROP strategies. Fig 9(right) zooms in a particular range of Fig 9(mile) for small i. Fromthesefigures we can make the following observations for this specific ataset: Local subnet preference strategies perform close to (RND) for small q (local sampling probability). For larger q this strategy appears to suffer from persistently sampling exhauste subnets especially for larger i, thus performing close to (RND) or worse, while showing better performance for small i(u). K-FAIL appears to consistently outperform all other local strategies an asymptotically follows the optimal strategy. CANDSET appears to suffer from similar issues with the local preference strategy, by persisting to scan subnets that have been exhauste. For smaller i (Fig 9, right), we see that both CANDSET an K-FAIL perform very close to the optimal (up to roughly i = 0.1). Note however, that i = 0.1 for the WU ataset correspons to a substantial number of hosts (over 10 million). Overall, all our propose strategies perform significantly better than uniform ranom sampling an local subnet preference strategy in the majority of the cases. VII. CONCLUDING REMARKS This paper stuies the problem of epiemic-style information issemination using ranom sampling. We ientify optimal static an ynamic strategies to reach a target fraction of the host population in minimum number of samplings. We also propose an evaluate simple strategies that use no prior information an constant state, an provie significant gain. Future work may further investigate the space of simple strategies that perform near optimal. REFERENCES [1] W. Vogels an C. Re, WS-Membership Failure Management in a Web- Services Worl, in Proc of the Twelfth International Worl Wie Web Conference, [2] A. Demers, D. Greene, C. Hauser, W. Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, an D. Terry, Epiemic algorithms for replicate atabase maintenance, in Proceeings of the sixth annual ACM Symposium on Principles of istribute computing, [3] L.Massoulie,A.Twigg,C.Gkantsiis,anP.Roriguez, Decentralize broacasting algorithms, in Proc. of the IEEE INFOCOM, [4] Y. Xie, F. Yu, K. Achan, E. Gillum, M. Golszmit, an T. Wobber, How Dynamic are IP Aresses? in Proc. of the ACM SIGCOMM, [5] C. C. Zou, D. Towsley, an W. Gong, On the performance of internet worm scanning strategies, Performance Evaluation, vol. 63, [6] Z. Chen an C. Ji, A Self-Learning Worm Using Importance Scanning, in ACM WORM 05, Fairfax, Virginia, USA, [7] T. Kurtz, Approximation of Population Processes. CBMS-NSF Regional Conference Series in Applie Mathematics, 1981, vol. 36. [8] M. Vojnovic, V. Gupta, T. Karagiannis, an C. Gkantsiis, Sampling Strategies for Epiemic-Style Information Dissemination, Microsoft Research, MSR-TR , Tech. Rep., [9] G. Hary an J. E. Littlewoo an G. Pólya, Inequalities, 2n e. Cambrige Mathematical Library, [10] C. Gkantsiis, T. Karagiannis, P. Roriguez, an M. Vojnovic, Planet Scale Software Upates, in Proc. of the ACM SIGCOMM, [11] DShiel: Cooperative Network Security Community, [12] P.Barfor,R.Nowak,R.Willett,anV.Yegneswaran, TowaraMoel for Source Aresses of Internet Backgroun Raiation, in Proc. of the Passive an Active Measurement Conference, [13] Z. Chen an C. Ji, Measuring network-aware worm spreaing ability, in Proc. of the IEEE INFOCOM, [14] Cooperative Association for Internet Data Analysis,

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body

Research Article Inviscid Uniform Shear Flow past a Smooth Concave Body International Engineering Mathematics Volume 04, Article ID 46593, 7 pages http://x.oi.org/0.55/04/46593 Research Article Invisci Uniform Shear Flow past a Smooth Concave Boy Abullah Mura Department of

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

A Closed-Form Expression for Static Worm-Scanning Strategies

A Closed-Form Expression for Static Worm-Scanning Strategies A Closed-Form Expression for Static Worm-Scanning Strategies Zesheng Chen Department of Electrical & Computer Engineering Florida International University Miami, FL 7 zchen@fiu.edu Chao Chen Department

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

NET Institute*

NET Institute* NET Institute* www.netinst.org Working Paper #08-24 October 2008 Computer Virus Propagation in a Network Organization: The Interplay between Social an Technological Networks Hsing Kenny Cheng an Hong Guo

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

NAND flash memory is widely used as a storage

NAND flash memory is widely used as a storage 1 : Buffer-Aware Garbage Collection for Flash-Base Storage Systems Sungjin Lee, Dongkun Shin Member, IEEE, an Jihong Kim Member, IEEE Abstract NAND flash-base storage evice is becoming a viable storage

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation

Interior Permanent Magnet Synchronous Motor (IPMSM) Adaptive Genetic Parameter Estimation Interior Permanent Magnet Synchronous Motor (IPMSM) Aaptive Genetic Parameter Estimation Java Rezaie, Mehi Gholami, Reza Firouzi, Tohi Alizaeh, Karim Salashoor Abstract - Interior permanent magnet synchronous

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

Detecting Overlapping Communities from Local Spectral Subspaces

Detecting Overlapping Communities from Local Spectral Subspaces Detecting Overlapping Communities from Local Spectral Subspaces Kun He, Yiwei Sun Huazhong University of Science an Technology Wuhan 430074, China Email: {brooklet60, yiweisun}@hust.eu.cn Davi Binel, John

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD

FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD Warsaw University of Technology Faculty of Physics Physics Laboratory I P Joanna Konwerska-Hrabowska 6 FINDING OPTICAL DISPERSION OF A PRISM WITH APPLICATION OF MINIMUM DEVIATION ANGLE MEASUREMENT METHOD.

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 03 series 0607 CAMBRIDGE INTERNATIONAL MATHEMATICS 0607/4 Paper 4 (Extene), maximum

More information

THE increasingly digitized power system offers more data,

THE increasingly digitized power system offers more data, 1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS

0607 CAMBRIDGE INTERNATIONAL MATHEMATICS PAPA CAMBRIDGE CAMBRIDGE INTERNATIONAL EXAMINATIONS International General Certificate of Seconary Eucation MARK SCHEME for the May/June 0 series CAMBRIDGE INTERNATIONAL MATHEMATICS /4 4 (Extene), maximum

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization

A Revised Simplex Search Procedure for Stochastic Simulation Response Surface Optimization 272 INFORMS Journal on Computing 0899-1499 100 1204-0272 $05.00 Vol. 12, No. 4, Fall 2000 2000 INFORMS A Revise Simplex Search Proceure for Stochastic Simulation Response Surface Optimization DAVID G.

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER

EFFICIENT ON-LINE TESTING METHOD FOR A FLOATING-POINT ADDER FFICINT ON-LIN TSTING MTHOD FOR A FLOATING-POINT ADDR A. Droz, M. Lobachev Department of Computer Systems, Oessa State Polytechnic University, Oessa, Ukraine Droz@ukr.net, Lobachev@ukr.net Abstract In

More information

A Self-Learning Worm Using Importance Scanning

A Self-Learning Worm Using Importance Scanning A Self-Learning Worm Using Importance Scanning Zesheng Chen and Chuanyi Ji Communication Networks and Machine Learning Group School of Electrical and Computer Engineering Georgia Institute of Technology,

More information

11. Differentiating inverse functions.

11. Differentiating inverse functions. . Differentiating inverse functions. The General Case: Fin y x when y f x. Since f y x an we regar y as being a function of x, we ifferentiate both sies of the equation f y x with respect to x using the

More information

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images

A Comparative Evaluation of Iris and Ocular Recognition Methods on Challenging Ocular Images A Comparative Evaluation of Iris an Ocular Recognition Methos on Challenging Ocular Images Vishnu Naresh Boeti Carnegie Mellon University Pittsburgh, PA 523 naresh@cmu.eu Jonathon M Smereka Carnegie Mellon

More information

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division

A Formal Model and Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Standard Floating Point Division A Formal Moel an Efficient Traversal Algorithm for Generating Testbenches for Verification of IEEE Stanar Floating Point Division Davi W. Matula, Lee D. McFearin Department of Computer Science an Engineering

More information

Improving Web Search Ranking by Incorporating User Behavior Information

Improving Web Search Ranking by Incorporating User Behavior Information Improving Web Search Ranking by Incorporating User Behavior Information Eugene Agichtein Microsoft Research eugeneag@microsoft.com Eric Brill Microsoft Research brill@microsoft.com Susan Dumais Microsoft

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information