Classifier Evasion: Models and Open Problems

Size: px
Start display at page:

Download "Classifier Evasion: Models and Open Problems"

Transcription

1 Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin I. P. Rubinstein 2, Ling Huang 3, Anthony D. Joseph 1,3, and J. D. Tygar 1 1 UC Berkeley 2 Microsot Research 3 Intel Labs Berkeley Abstract. As a growing number o sotware developers apply machine learning to make key decisions in their systems, adversaries are adapting and launching ever more sophisticated attacks against these systems. The near-optimal evasion problem considers an adversary that searches or a low-cost negative instance by submitting a minimal number o queries to a classiier, in order to eectively evade the classiier. In this position paper, we posit several open problems and variants o the near-optimal evasion problem. Solutions to these problems would signiicantly advance the state o the art in secure machine learning. Keywords: Query Algorithms, Evasion, Reverse Engineering, Adversarial Learning 1 Introduction A number o systems and security engineers have proposed the use o machine learning techniques or detecting or iltering miscreant activities in a variety o applications, e.g., spam, intrusion, virus, and raud detection. All known detection algorithms have blind spots: classes o miscreant activity that ail to be detected. While learning enables the detector to adapt, adversaries can still exploit blind spots to evade detection. A signiicant challenge is to quantiy how eectively an adversary can discover blind spots by querying the detector. Consider, or example, a spammer who wishes to minimally modiy a spam message so it is not classiied as spam by a public webmail system s spam classiier (here cost is change in the value o the message ater modiication). The spammer can observe the classiier s behavior by creating a dummy account on the webmail system. By observing the responses o the spam detector to queries, the spammer can search or a minimal modiication. Similarly or host-based intrusion detection, an intruder may be orced to obuscate an attack to avoid detection. The attacker can alter their exploit by inserting no-ops, using synonymous system calls, or even choosing between one o several possible exploits. While instances have associated costs to the adversary, a second type o cost suered by the attacker is the number o queries needed to search or evading instances. Larger numbers require additional resources and arouse increasing suspicion o malicious behavior. In practice, adversaries employ a number o techniques to mitigate this second cost, such as opening multiple webmail accounts or rate-limiting spam or worm probing attacks; these strategies require the attacker use additional sophistication and computational resources.

2 Here we revisit the near-optimal evasion problem a theoretical ormulation that quantiies how eectively a classiier can be evaded through querying. We outline open problems and introduce novel variants o the original ormulation. 1.1 The Near-Optimal Evasion Problem The Near-Optimal Evasion Problem is a ormulation o adversarial evasion that quantiies the hardness o search or low-cost negative instances in terms o the number o queries used. As irst posed by Lowd and Meek [6] under the name adversarial classiier reverse engineering, the near-optimal evasion problem is to quantiy the query complexity required by an adversary to ind a near-minimal cost negative instance in terms o the size o the eature space and the desired accuracy. By analyzing the query complexity or a amily o classiiers, nearoptimal evasion provides a notion o how hard that amily is to evade; e.g., i a spammer must send exponentially many queries per dimension o the eature space, it is diicult or the spammer to successully improve their spam. In this setting, we assume instances are represented in a D-dimensional eature space (e.g., X R D ) and the target classiier belongs to a amily F o binary classiiers where each classiier F is a mapping rom eature space X to a label in {' ', '+'}. A deterministic F partitions X into two sets the positive class X + = {x X (x) = '+'} and the analogous negative class X which we take to be the normal instances. We assume that the adversary is aware o at least one instance in each class, x X and x A X +, knows F and not, but can observe (x) or any x X by issuing a membership query. Adversarial Cost We assume the adversary has a cost unction A : X R 0+ ; e.g., or a spammer this could be edit distance on messages. The adversary wishes to optimize A over the negative class X ; e.g., the spammer wants to send spam that will be classiied as normal (' '). Typically the cost unction is a distance to a target instance x A X + that is most desirable to the adversary; e.g., an l p distance induces cost A p (x) = x x A p. Lowd and Meek [6] deine minimal adversarial cost (MAC ) o a classiier to be the best lower bound on the cost that any negative instance obtains MAC (, A) in x X [A (x)]. (1) They urther deine a data point to be an ɛ-approximate instance o minimal adversarial cost (ɛ-imac ) i it is a negative instance with cost no more than a actor o (1 + ɛ) times the MAC ; i.e., every ɛ-imac is a member o the set 1 { } ɛ-imac (, A) x X A (x) (1 + ɛ) MAC (, A). (2) The goal o the Near-Optimal Evasion Problem is to quantiy the worst-case query complexity required or an adversary to iner an ɛ-imac, depending on 1 We use ɛ-imac to reer both to this set and its members.

3 the richness o the amily o classiiers. Finding an ɛ-imac or a singleton amily can be achieved oline without any queries, whereas i the amily is large, many more queries will be necessary to ind an ɛ-imac. Formally, A amily o classiiers F is ɛ-imac searchable under a amily o cost unctions A i or all F and A A, there is an algorithm that inds x ɛ-imac (, A) using polynomially many membership queries in D and L ɛ = log 1 ɛ. We will reer to such an algorithm as eicient. 1.2 Security and the Near-Optimal Evasion Problem The near-optimal evasion problem sheds light on several real security issues. The problem abstracts the scenario o an adversary who wishes to launch a speciic attack that is blocked by a classiier-based deense. The attacker has a limited number o probing opportunities ater which she must send an attack as close as possible to his originally intended attack a near-optimal attack. In the case o spam, the spammer may originally have a message that will be detected as spam. She probes, inds a near-optimal message that evades the ilter, and sends this message instead. In the case o an intruder, she has a preerred sequence o system calls that will be detected as intrusions. She probes, inds and executes a near-optimal sequence that evades the detector. With this ramework in mind, we now clearly see the role o a deender: to provide a classiier that resists near-optimal evasion. Practical implementation requires careul selection o costs and realistic bounds on the number o probes an adversary can perorm. Resulting lower-bounds on the number o probes required or near-optimal evasion provide signiicant evidence o eective security. 1.3 Previous Work Lowd and Meek [6] irst introduced near-optimal evasion, and developed eicient methods that reverse-engineer linear classiiers in both real-valued and Boolean eature spaces or l 1 costs. Further, Nelson et al. [7] generalized their result rom linear classiiers to the amily o convex-inducing classiiers that partition the space o instances into two sets one o which is convex. In generalizing to this amily, they showed that near-optimal evasion does not require an estimate o the classiier s decision boundary or state. Nelson et al. [8] urther explored general l p costs and ound not all are ɛ-imac searchable or convex-inducing classiiers. Dalvi et al. use a cost-sensitive game theoretic approach to preemptively patch a classiier s blind spots [5]. They construct a modiied classiier designed to detect optimally modiied instances. Biggio et al. [3] extend this game theoretic approach and propose hiding inormation or randomization as additional deense mechanisms or this setting. However, they do not explore near-optimal evasion or randomized classiiers as we propose in Section 3.3.

4 2 Open Problems in the Theory o Near-Optimal Evasion A number o unanswered questions remain about the near-optimal evasion problem. Here we motivate these problems and suggest potential directions. Question 1: Can we ind matching upper and lower bounds or evasion algorithms? Is there a deterministic strategy with polynomial query complexity or all convex-inducing classiiers? In previous work, linear and convex-inducing classiiers were shown to be ɛ-imac searchable or l 1 costs by demonstrating algorithms with polynomial query complexity. Currently, it is known that or convex positive class, O ( L ɛ + L ɛ D ) queries are suicient to ind a near-optimal instance, although the tightest known lower bound in this case is O (L ɛ + D). In the case o convex X, the best known algorithm is a randomized ellipsoid approach (c. [2]) that inds a near-optimal instance with high probability using O ( D 5) queries (ignoring logarithmic terms). Question 2: Is there some amily larger than the convex-inducing classiiers that is ɛ-imac searchable? Are there amilies outside o the convex-inducing classiiers or which near-optimal evasion is eicient? Existing approaches to near-optimality have built on the machinery o convex optimization. However, many interesting classiiers are not convex-inducing classiiers. Currently, the only known result due to Lowd and Meek is that linear classiiers on Boolean instance space are 2-IMAC searchable. Question 3: Is some amily o SVMs ( e.g., with a known kernel) ɛ-imac searchable or some ɛ? Can an adversary incorporate the structure o a nonconvex classiier into the ɛ-imac search? Consider SVMs with non-linear kernels. The classiier is non-convex in the original eature space, while in the Reproducing Kernel Hilbert Space the classiier is linear but the cost unction may no longer be easy to minimize. However SVMs have other properties that may acilitate near-optimal evasion. For instance, in cases where there are ew support vectors, one only needs to ind these instances to reconstruct the classiier. Question 4: Are there characteristics o non-convex, contiguous bodies that are indicative o the hardness o the body or near-optimal evasion? What about non-contiguous bodies? It appears that the amily o contiguous bodies (i.e., the set o all classiiers or which either X + or X is a contiguous set) cannot be generally ɛ-imac searchable since this amily includes members with many locally minimal cost regions which are hard or local search or binary search procedures to avoid, but perhaps some subsets o this amily are ɛ-imac searchable. For amilies o non-contiguous bodies, ɛ-imac searchability seems impossible to achieve (disconnected components could be arbitrarily close to x A ) unless the classiiers structure can be exploited; e.g., as we discuss or SVMs above. Question 5: For what classes o classiiers is reverse-engineering as easy as evasion? Reverse-engineering is the process o querying to learn the decision boundary, and is suicient or solving the evasion problem. It is now known that the query complexity o reverse-engineering linear classiiers is identical to that o evasion, while reverse-engineering is strictly more diicult or general convexinducing classiiers [8]. It is unknown whether there exists a class in between linear and convex-inducing classiiers on which the two tasks are equivalent.

5 3 Alternative Models or Evasion Here we suggest a number o variants o near-optimal evasion that generalize or reormulate the original problem to capture new aspects o the overall challenge. 3.1 Additional Inormation about Training Data Distribution Consider an adversary that knows the training algorithm and obtains samples drawn rom a natural distribution. A ew interesting settings include: 1. The adversary s samples are a subset o the training data. 2. The adversary s samples are rom the same distribution as the training data. 3. The adversary s samples are rom a perturbation o the training distribution. With this additional inormation, the adversary may estimate their own classiier and analyze it oline. Some open questions include: Question 6: What can be learned rom about? How can best be used to guide search? Can the sample data be directly incorporated into ɛ-imac - search? Relationships between between and can build on existing results in learning theory. A possibility is to bound the dierence between MAC (, A) and MAC (, A) in one o the above settings. I the dierence is suiciently small with high probability, then a search or an ɛ-imac could use MAC (, A) to initially lower bound MAC (, A). This should reduce search complexity since lower bounds on the MAC are typically harder to obtain than upper bounds. 3.2 Beyond the Membership Oracle Question 7: What types o additional eedback may be available to the adversary and how do they impact the query complexity o ɛ-imac -search? In this scenario, the adversary receives more rom the classiier than just a '+'/' ' label. For instance, suppose the classiier is deined as (x) = I {g (x) > 0} or some realvalued unction g (as is the case or SVMs) and the adversary receives g (x) or every query instead o (x). I g is linear, the adversary can use D + 1 queries and solve a linear regression problem to reverse engineer g. This additional inormation may also be useul or approximating the support o an SVM. 3.3 Evading Randomized Classiiers In this variant o near-optimal evasion, we consider randomized classiiers that generate random responses rom a distribution conditioned on the query x. To analyze the query complexity o such a classiier, we must irst generalize our concept o the MAC. We propose the ollowing candidate generalization: RMAC (, A) = in x X {A (x) + λp ( (x) = ' ')}. I is deterministic, we need λ MAC (, A) or this deinition to be equivalent to Eq. (1) (e.g., λ = A ( x A) + 1 is suicient); otherwise, a trivial minimizer is x A. For a randomized classiier, λ balances cost with probability o success.

6 Question 8: Given access to the membership oracle only, how diicult is near-optimal evasion o randomized classiiers? Are there amilies o randomized classiiers that are ɛ-imac searchable? Potential randomized amilies include: 1. Classiiers with uzzy boundary o width δ around a deterministic boundary 2. Classiiers based on the class-conditional densities or a pair o Gaussians, a logistic regression model, or other members o the exponential amily. Evasion o randomized classiiers seems to be more diicult than or deterministic classiiers as each query provides limited inormation about the query probabilities. Based on this argument, Biggio et al. promote randomized classiiers as a deense against evasion [3]. However, it is not known i randomized classiiers have provable worse query complexities. 3.4 Querying with Real-World Objects Question 9: How can the eature mapping be inverted to design real-world instances to map to desired queries? How can query algorithms be adapted or approximate querying? In the original model o evasion, it was assumed that the attacker could observe (x) or any x X. Implicit in this capability is the assumption that the attacker has knowledge o the eature mapping rom realworld objects such as raw s or network packets, into the eature space in which the deender learns. Even when this is true, the mapping may not be oneto-one or onto: multiple s may map to the same bag-o-words vector, and some instances in eature space may not correspond to any real-world object. 3.5 Evading an Adaptive Classiier Finally we consider a classiier that periodically retrains on queries. This variant is a multi-old game between the attacker and learner, with the adversary now able to issue queries that degrade the learner s perormance. Techniques rom game-theoretic online learning should be well-suited to this setting [4]. Question 10: Given a set o adversarial queries (and possibly additional innocuous data) will the learning algorithm converge to the true boundary or can the adversary deceive the learner and evade it simultaneously? I the algorithm does converge, at what rate? To properly analyze retraining, it is important to have an oracle that labels the points sent by the adversary. I all points sent by the adversary are labeled '+', the classiier may prevent eective evasion, but with a large numbers o alse positives due to the adversary queries in X ; this itsel constitutes an attack against the learner [1]. 4 Conclusion The intersection o security, systems, and machine learning research has yielded signiicant advances in decision-making or complex systems, but has also introduced new challenges in protecting against malicious users. While earlier research

7 laid the groundwork or understanding the near-optimal evasion problem, undamental problems remain unaddressed. In this paper, we discussed several o these problems and variants, and proposed potential avenues or uture research. Reerences 1. M. Barreno, B. Nelson, A. D. Joseph, and J. D. Tygar. The security o machine learning. Machine Learning, To appear. 2. D. Bertsimas and S. Vempala. Solving convex programs by random walks. J. ACM, 51(4): , B. Biggio, G. Fumera, and F. Roli. Multiple classiier systems under attack. In MCS, pages 74 83, N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University Press, N. Dalvi, P. Domingos, Mausam, S. Sanghai, and D. Verma. Adversarial classiication. In Proc. KDD 04, pages , D. Lowd and C. Meek. Adversarial learning. In Pro. KDD 05, pages , B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, S. Lau, S. Lee, S. Rao, A. Tran, and J. D. Tygar. Near-optimal evasion o convex-inducing classiiers. In Proc. AISTATS 2010, pages , B. Nelson, B. I. P. Rubinstein, L. Huang, A. D. Joseph, S. J. Lee, S. Rao, and J. D. Tygar. Query strategies or evading convex-inducing classiiers, Report arxiv: v1 available at

Classifier Evasion: Models and Open Problems

Classifier Evasion: Models and Open Problems . In Privacy and Security Issues in Data Mining and Machine Learning, eds. C. Dimitrakakis, et al. Springer, July 2011, pp. 92-98. Classiier Evasion: Models and Open Problems Blaine Nelson 1, Benjamin

More information

arxiv: v1 [cs.lg] 3 Jul 2010

arxiv: v1 [cs.lg] 3 Jul 2010 Journal o Machine Learning Research 11 (2010) 1-48 Submitted 6/10; Published - Query Strategies or Evading Convex-Inducing Classiiers arxiv:1007.0484v1 [cs.lg] 3 Jul 2010 Blaine Nelson Computer Science

More information

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm

A Proposed Approach for Solving Rough Bi-Level. Programming Problems by Genetic Algorithm Int J Contemp Math Sciences, Vol 6, 0, no 0, 45 465 A Proposed Approach or Solving Rough Bi-Level Programming Problems by Genetic Algorithm M S Osman Department o Basic Science, Higher Technological Institute

More information

Semi-Supervised SVMs for Classification with Unknown Class Proportions and a Small Labeled Dataset

Semi-Supervised SVMs for Classification with Unknown Class Proportions and a Small Labeled Dataset Semi-Supervised SVMs or Classiication with Unknown Class Proportions and a Small Labeled Dataset S Sathiya Keerthi Yahoo! Labs Santa Clara, Caliornia, U.S.A selvarak@yahoo-inc.com Bigyan Bhar Indian Institute

More information

Genetic Algorithms Coding Primer

Genetic Algorithms Coding Primer Genetic Algorithms Coding Primer A.I. Khan Lecturer in Computing and Inormation Technology Heriot-Watt University, Riccarton, Edinburgh, EH14 4AS, United Kingdom Introduction In this article the concept

More information

ANOMALOUS PAYLOAD-BASED WORM DETECTION AND GENERATION USING KIDS P.GIRIJA 1, A.MOHANRAJ 2, T.MAHESHWARAN 1,2,3 ASSISTANT PROFESSOR

ANOMALOUS PAYLOAD-BASED WORM DETECTION AND GENERATION USING KIDS P.GIRIJA 1, A.MOHANRAJ 2, T.MAHESHWARAN 1,2,3 ASSISTANT PROFESSOR ANOMALOUS PAYLOAD-BASED WORM DETECTION AND SIGNATURE GENERATION USING KIDS P.GIRIJA 1, A.MOHANRAJ 2, T.MAHESHWARAN 1,2,3 ASSISTANT PROFESSOR A.S.L PAULS COLLEGE OF ENGINEERING AND TECHNOLOGY ABSTRACT Most

More information

ANOMALY DETECTION SYSTEM USING KEY RECOVERY

ANOMALY DETECTION SYSTEM USING KEY RECOVERY ANOMALY DETECTION SYSTEM USING KEY RECOVERY Ms.M.Rahini 1, Ms.S.Selvakumari 2, Ms.B.Ramya 3 1,3 PG Scholar, 2 Assistant Professor, Department of Computer Science, Dhanalakshmi Srinivasan College of Arts

More information

Using a Projected Subgradient Method to Solve a Constrained Optimization Problem for Separating an Arbitrary Set of Points into Uniform Segments

Using a Projected Subgradient Method to Solve a Constrained Optimization Problem for Separating an Arbitrary Set of Points into Uniform Segments Using a Projected Subgradient Method to Solve a Constrained Optimization Problem or Separating an Arbitrary Set o Points into Uniorm Segments Michael Johnson May 31, 2011 1 Background Inormation The Airborne

More information

Intelligent Optimization Methods for High-Dimensional Data Classification for Support Vector Machines

Intelligent Optimization Methods for High-Dimensional Data Classification for Support Vector Machines Intelligent Inormation Management, 200, 2, ***-*** doi:0.4236/iim.200.26043 Published Online June 200 (http://www.scirp.org/journal/iim) Intelligent Optimization Methods or High-Dimensional Data Classiication

More information

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION

ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION ROBUST FACE DETECTION UNDER CHALLENGES OF ROTATION, POSE AND OCCLUSION Phuong-Trinh Pham-Ngoc, Quang-Linh Huynh Department o Biomedical Engineering, Faculty o Applied Science, Hochiminh University o Technology,

More information

Piecewise polynomial interpolation

Piecewise polynomial interpolation Chapter 2 Piecewise polynomial interpolation In ection.6., and in Lab, we learned that it is not a good idea to interpolate unctions by a highorder polynomials at equally spaced points. However, it transpires

More information

Adversarial Pattern Classification Using Multiple Classifiers and Randomisation

Adversarial Pattern Classification Using Multiple Classifiers and Randomisation Adversarial Pattern Classification Using Multiple Classifiers and Randomisation Battista Biggio, Giorgio Fumera, and Fabio Roli Dept. of Electrical and Electronic Eng., University of Cagliari, Piazza d

More information

Automated Modelization of Dynamic Systems

Automated Modelization of Dynamic Systems Automated Modelization o Dynamic Systems Ivan Perl, Aleksandr Penskoi ITMO University Saint-Petersburg, Russia ivan.perl, aleksandr.penskoi@corp.imo.ru Abstract Nowadays, dierent kinds o modelling settled

More information

A fast and area-efficient FPGA-based architecture for high accuracy logarithm approximation

A fast and area-efficient FPGA-based architecture for high accuracy logarithm approximation A ast and area-eicient FPGA-based architecture or high accuracy logarithm approximation Dimitris Bariamis, Dimitris Maroulis, Dimitris K. Iakovidis Department o Inormatics and Telecommunications University

More information

Neighbourhood Operations

Neighbourhood Operations Neighbourhood Operations Neighbourhood operations simply operate on a larger neighbourhood o piels than point operations Origin Neighbourhoods are mostly a rectangle around a central piel Any size rectangle

More information

MAPI Computer Vision. Multiple View Geometry

MAPI Computer Vision. Multiple View Geometry MAPI Computer Vision Multiple View Geometry Geometry o Multiple Views 2- and 3- view geometry p p Kpˆ [ K R t]p Geometry o Multiple Views 2- and 3- view geometry Epipolar Geometry The epipolar geometry

More information

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements

Automated Planning for Feature Model Configuration based on Functional and Non-Functional Requirements Automated Planning or Feature Model Coniguration based on Functional and Non-Functional Requirements Samaneh Soltani 1, Mohsen Asadi 1, Dragan Gašević 2, Marek Hatala 1, Ebrahim Bagheri 2 1 Simon Fraser

More information

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources

An Efficient Configuration Methodology for Time-Division Multiplexed Single Resources An Eicient Coniguration Methodology or Time-Division Multiplexed Single Resources Benny Akesson 1, Anna Minaeva 1, Přemysl Šůcha 1, Andrew Nelson 2 and Zdeněk Hanzálek 1 1 Czech Technical University in

More information

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering

Decision Support Systems for E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering Decision Support Systems or E-Purchasing using Case-Based Reasoning and Rating Based Collaborative Filtering ABSTRACT The amount o trade conducted electronically has grown dramatically since the wide introduction

More information

Jaroslav Moravec. Object recognition using 3D convolutional neural networks

Jaroslav Moravec. Object recognition using 3D convolutional neural networks BACHELOR THESIS Jaroslav Moravec Object recognition using 3D convolutional neural networks Department o Sotware Engineering Supervisor o the bachelor thesis: Study programme: Study branch: RNDr. Jakub

More information

9.8 Graphing Rational Functions

9.8 Graphing Rational Functions 9. Graphing Rational Functions Lets begin with a deinition. Deinition: Rational Function A rational unction is a unction o the orm P where P and Q are polynomials. Q An eample o a simple rational unction

More information

Lagrangian relaxations for multiple network alignment

Lagrangian relaxations for multiple network alignment Noname manuscript No. (will be inserted by the editor) Lagrangian relaxations or multiple network alignment Eric Malmi Sanjay Chawla Aristides Gionis Received: date / Accepted: date Abstract We propose

More information

Some Inequalities Involving Fuzzy Complex Numbers

Some Inequalities Involving Fuzzy Complex Numbers Theory Applications o Mathematics & Computer Science 4 1 014 106 113 Some Inequalities Involving Fuzzy Complex Numbers Sanjib Kumar Datta a,, Tanmay Biswas b, Samten Tamang a a Department o Mathematics,

More information

Characterizing the network behavior of P2P traffic

Characterizing the network behavior of P2P traffic Characterizing the network behavior o PP traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera

More information

Rough Connected Topologized. Approximation Spaces

Rough Connected Topologized. Approximation Spaces International Journal o Mathematical Analysis Vol. 8 04 no. 53 69-68 HIARI Ltd www.m-hikari.com http://dx.doi.org/0.988/ijma.04.4038 Rough Connected Topologized Approximation Spaces M. J. Iqelan Department

More information

Using VCS with the Quartus II Software

Using VCS with the Quartus II Software Using VCS with the Quartus II Sotware December 2002, ver. 1.0 Application Note 239 Introduction As the design complexity o FPGAs continues to rise, veriication engineers are inding it increasingly diicult

More information

SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN

SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN SUPER RESOLUTION IMAGE BY EDGE-CONSTRAINED CURVE FITTING IN THE THRESHOLD DECOMPOSITION DOMAIN Tsz Chun Ho and Bing Zeng Department o Electronic and Computer Engineering The Hong Kong University o Science

More information

A Series Lighting Controller Modbus Register Map

A Series Lighting Controller Modbus Register Map DEH41097 Rev. 3 g A Series Lighting Control Panelboards A Series Lighting Controller Modbus Register Map Table o Contents Introduction...1 RTU Transmission Mode...1 Message rame...1 RTU Mode Message Frames...1

More information

2. Design Planning with the Quartus II Software

2. Design Planning with the Quartus II Software November 2013 QII51016-13.1.0 2. Design Planning with the Quartus II Sotware QII51016-13.1.0 This chapter discusses key FPGA design planning considerations, provides recommendations, and describes various

More information

Binary Morphological Model in Refining Local Fitting Active Contour in Segmenting Weak/Missing Edges

Binary Morphological Model in Refining Local Fitting Active Contour in Segmenting Weak/Missing Edges 0 International Conerence on Advanced Computer Science Applications and Technologies Binary Morphological Model in Reining Local Fitting Active Contour in Segmenting Weak/Missing Edges Norshaliza Kamaruddin,

More information

3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY

3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY 3-D TERRAIN RECONSTRUCTION WITH AERIAL PHOTOGRAPHY Bin-Yih Juang ( 莊斌鎰 ) 1, and Chiou-Shann Fuh ( 傅楸善 ) 3 1 Ph. D candidate o Dept. o Mechanical Engineering National Taiwan University, Taipei, Taiwan Instructor

More information

Improving Alignment of Faces for Recognition

Improving Alignment of Faces for Recognition Improving Alignment o Faces or Recognition Md. Kamrul Hasan Département de génie inormatique et génie logiciel École Polytechnique de Montréal, Québec, Canada md-kamrul.hasan@polymtl.ca Christopher J.

More information

A Cartesian Grid Method with Transient Anisotropic Adaptation

A Cartesian Grid Method with Transient Anisotropic Adaptation Journal o Computational Physics 179, 469 494 (2002) doi:10.1006/jcph.2002.7067 A Cartesian Grid Method with Transient Anisotropic Adaptation F. E. Ham, F. S. Lien, and A. B. Strong Department o Mechanical

More information

On Modeling Query Refinement by Capturing User Intent through Feedback

On Modeling Query Refinement by Capturing User Intent through Feedback Proceedings o the Twenty-Third Australasian Database Conerence (ADC 2012), Melbourne, Australia On Modeling Query Reinement by Capturing User Intent through Feedback Md. Saiul Islam, Chengei Liu and Rui

More information

On the Double-Faced Nature of P2P Traffic

On the Double-Faced Nature of P2P Traffic On the Double-Faced Nature o P2P Traic Raaele Bolla, Marco Canini, Riccardo Rapuzzi, Michele Sciuto DIST - Department o Communication, Computer and System Sciences, University o Genoa Via Opera Pia 13,

More information

Overview. Introduction. Internet Worm. Defenses. Recent Trends. Detection and Propagation Modeling of Internet Worms

Overview. Introduction. Internet Worm. Defenses. Recent Trends. Detection and Propagation Modeling of Internet Worms Overview Detection and Propagation Modeling o Internet Worms Ph.D. research proposal by: Parbati Kumar Manna Co-advised by: Dr. Sanjay Ranka and Dr. Shigang Chen Research opportunities in Internet worm

More information

Performance Assessment of the Hybrid Archive-based Micro Genetic Algorithm (AMGA) on the CEC09 Test Problems

Performance Assessment of the Hybrid Archive-based Micro Genetic Algorithm (AMGA) on the CEC09 Test Problems Perormance Assessment o the Hybrid Archive-based Micro Genetic Algorithm (AMGA) on the CEC9 Test Problems Santosh Tiwari, Georges Fadel, Patrick Koch, and Kalyanmoy Deb 3 Department o Mechanical Engineering,

More information

2. Getting Started with the Graphical User Interface

2. Getting Started with the Graphical User Interface February 2011 NII52017-10.1.0 2. Getting Started with the Graphical User Interace NII52017-10.1.0 The Nios II Sotware Build Tools (SBT) or Eclipse is a set o plugins based on the popular Eclipse ramework

More information

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances:

THIN LENSES: BASICS. There are at least three commonly used symbols for object and image distances: THN LENSES: BASCS BJECTVE: To study and veriy some o the laws o optics applicable to thin lenses by determining the ocal lengths o three such lenses ( two convex, one concave) by several methods. THERY:

More information

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images

Study and Analysis of Edge Detection and Implementation of Fuzzy Set. Theory Based Edge Detection Technique in Digital Images Study and Analysis o Edge Detection and Implementation o Fuzzy Set Theory Based Edge Detection Technique in Digital Images Anju K S Assistant Proessor, Department o Computer Science Baselios Mathews II

More information

Structured Parallel Programming with Deterministic Patterns

Structured Parallel Programming with Deterministic Patterns Structured Parallel Programming with Deterministic Patterns May 14, 2010 USENIX HotPar 2010, Berkeley, Caliornia Michael McCool, Sotware Architect, Ct Technology Sotware and Services Group, Intel Corporation

More information

A new approach for ranking trapezoidal vague numbers by using SAW method

A new approach for ranking trapezoidal vague numbers by using SAW method Science Road Publishing Corporation Trends in Advanced Science and Engineering ISSN: 225-6557 TASE 2() 57-64, 20 Journal homepage: http://www.sciroad.com/ntase.html A new approach or ranking trapezoidal

More information

Formalizing Cardinality-based Feature Models and their Staged Configuration

Formalizing Cardinality-based Feature Models and their Staged Configuration Formalizing Cardinality-based Feature Models and their Staged Coniguration Krzyszto Czarnecki, Simon Helsen, and Ulrich Eisenecker 2 University o Waterloo, Canada 2 University o Applied Sciences Kaiserslautern,

More information

Balanced Multiresolution for Symmetric/Antisymmetric Filters

Balanced Multiresolution for Symmetric/Antisymmetric Filters Balanced Multiresolution or Symmetric/Antisymmetric Filters Mahmudul Hasan Faramarz F. Samavati Mario C. Sousa Department o Computer Science University o Calgary Alberta Canada {mhasan samavati smcosta}@ucalgary.ca

More information

Querying Complex Spatio-Temporal Sequences in Human Motion Databases

Querying Complex Spatio-Temporal Sequences in Human Motion Databases Querying Complex Spatio-Temporal Sequences in Human Motion Databases Yueguo Chen #, Shouxu Jiang, Beng Chin Ooi #, Anthony KH Tung # # School o Computing, National University o Singapore Computing, Law

More information

Section II. Nios II Software Development

Section II. Nios II Software Development Section II. Nios II Sotware Development This section o the Embedded Design Handbook describes how to most eectively use the Altera tools or embedded system sotware development, and recommends design styles

More information

Abalone Age Prediction using Artificial Neural Network

Abalone Age Prediction using Artificial Neural Network IOSR Journal o Computer Engineering (IOSR-JCE) e-issn: 2278-066,p-ISSN: 2278-8727, Volume 8, Issue 5, Ver. II (Sept - Oct. 206), PP 34-38 www.iosrjournals.org Abalone Age Prediction using Artiicial Neural

More information

A Robust Elastic and Partial Matching Metric for Face Recognition

A Robust Elastic and Partial Matching Metric for Face Recognition A Robust Elastic and Partial Matching Metric or Face Recognition Gang Hua Amir Akbarzadeh Microsot Corporate One Microsot Way, Redmond, WA 9852 {ganghua, amir}@microsot.com Abstract We present a robust

More information

Regenerating Codes for Errors and Erasures in Distributed Storage

Regenerating Codes for Errors and Erasures in Distributed Storage Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating

More information

10. SOPC Builder Component Development Walkthrough

10. SOPC Builder Component Development Walkthrough 10. SOPC Builder Component Development Walkthrough QII54007-9.0.0 Introduction This chapter describes the parts o a custom SOPC Builder component and guides you through the process o creating an example

More information

SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING FUNCTIONS

SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING FUNCTIONS SIMULATION OPTIMIZER AND OPTIMIZATION METHODS TESTING ON DISCRETE EVENT SIMULATIONS MODELS AND TESTING UNCTIONS Pavel Raska (a), Zdenek Ulrych (b), Petr Horesi (c) (a) Department o Industrial Engineering

More information

2. Recommended Design Flow

2. Recommended Design Flow 2. Recommended Design Flow This chapter describes the Altera-recommended design low or successully implementing external memory interaces in Altera devices. Altera recommends that you create an example

More information

arxiv: v2 [cs.gt] 26 Nov 2016

arxiv: v2 [cs.gt] 26 Nov 2016 A General Retraining Framework for Scalable Adversarial Classification arxiv:1604.02606v2 [cs.gt] 26 Nov 2016 Bo Li bo.li.2@vanderbilt.edu Vanderbilt University Yevgeniy Vorobeychik yevgeniy.vorobeychik@vanderbilt.edu

More information

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy

A Multi-Stage Network Anomaly Detection Method for Improving Efficiency and Accuracy Journal o Inormation Security, 2012, 3, 18-24 http://dx.doi.org/10.4236/jis.2012.31003 Published Online January 2012 (http://www.scirp.org/journal/jis) A Multi-Stage Network Anomaly Detection Method or

More information

Scalable Test Problems for Evolutionary Multi-Objective Optimization

Scalable Test Problems for Evolutionary Multi-Objective Optimization Scalable Test Problems or Evolutionary Multi-Objective Optimization Kalyanmoy Deb Kanpur Genetic Algorithms Laboratory Indian Institute o Technology Kanpur PIN 8 6, India deb@iitk.ac.in Lothar Thiele,

More information

A Classification System and Analysis for Aspect-Oriented Programs

A Classification System and Analysis for Aspect-Oriented Programs A Classiication System and Analysis or Aspect-Oriented Programs Martin Rinard, Alexandru Sălcianu, and Suhabe Bugrara Massachusetts Institute o Technology Cambridge, MA 02139 ABSTRACT We present a new

More information

Math 1314 Lesson 24 Maxima and Minima of Functions of Several Variables

Math 1314 Lesson 24 Maxima and Minima of Functions of Several Variables Math 1314 Lesson 4 Maxima and Minima o Functions o Several Variables We learned to ind the maxima and minima o a unction o a single variable earlier in the course. We had a second derivative test to determine

More information

Learning Implied Global Constraints

Learning Implied Global Constraints Learning Implied Global Constraints Christian Bessiere LIRMM-CNRS U. Montpellier, France bessiere@lirmm.r Remi Coletta LRD Montpellier, France coletta@l-rd.r Thierry Petit LINA-CNRS École des Mines de

More information

Reflection and Refraction

Reflection and Refraction Relection and Reraction Object To determine ocal lengths o lenses and mirrors and to determine the index o reraction o glass. Apparatus Lenses, optical bench, mirrors, light source, screen, plastic or

More information

A SAR IMAGE REGISTRATION METHOD BASED ON SIFT ALGORITHM

A SAR IMAGE REGISTRATION METHOD BASED ON SIFT ALGORITHM A SAR IMAGE REGISTRATION METHOD BASED ON SIFT ALGORITHM W. Lu a,b, X. Yue b,c, Y. Zhao b,c, C. Han b,c, * a College o Resources and Environment, University o Chinese Academy o Sciences, Beijing, 100149,

More information

Image Pre-processing and Feature Extraction Techniques for Magnetic Resonance Brain Image Analysis

Image Pre-processing and Feature Extraction Techniques for Magnetic Resonance Brain Image Analysis Image Pre-processing and Feature Extraction Techniques or Magnetic Resonance Brain Image Analysis D. Jude Hemanth and J. Anitha Department o ECE, Karunya University, Coimbatore, India {jude_hemanth,rajivee1}@redimail.com

More information

A Fault Model Centered Modeling Framework for Self-healing Computing Systems

A Fault Model Centered Modeling Framework for Self-healing Computing Systems A Fault Model Centered Modeling Framework or Sel-healing Computing Systems Wei Lu 1, Yian Zhu 1, Chunyan Ma 1, and Longmei Zhang 2 1 Department o Sotware and Microelectronics, Northwestern Polytechnical

More information

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems

A Requirement Specification Language for Configuration Dynamics of Multiagent Systems A Requirement Speciication Language or Coniguration Dynamics o Multiagent Systems Mehdi Dastani, Catholijn M. Jonker, Jan Treur* Vrije Universiteit Amsterdam, Department o Artiicial Intelligence, De Boelelaan

More information

Object Tracking with Dynamic Feature Graph

Object Tracking with Dynamic Feature Graph Object Tracking with Dynamic Feature Graph Feng Tang and Hai Tao Department o Computer Engineering, University o Caliornia, Santa Cruz {tang,tao}@soe.ucsc.edu Abstract Two major problems or model-based

More information

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR

SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR SPAM FILTERING SECURITY EVALUATION FRAMEWORK USING SVM, LR AND MILR Kunjali Pawar 1 and Madhuri Patil 2 1 M.E. Student, Dr. D.Y.Patil School of Engg. And Technology, Lohegaon, Pune, Savitribai Phule Pune

More information

KANGAL REPORT

KANGAL REPORT Individual Penalty Based Constraint handling Using a Hybrid Bi-Objective and Penalty Function Approach Rituparna Datta Kalyanmoy Deb Mechanical Engineering IIT Kanpur, India KANGAL REPORT 2013005 Abstract

More information

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices

AN 608: HST Jitter and BER Estimator Tool for Stratix IV GX and GT Devices AN 608: HST Jitter and BER Estimator Tool or Stratix IV GX and GT Devices July 2010 AN-608-1.0 The high-speed communication link design toolkit (HST) jitter and bit error rate (BER) estimator tool is a

More information

Automated Theorem Proving and Proof Checking. Proof Checking. Motivation. Cunning Plan. Standard Architecture. History

Automated Theorem Proving and Proof Checking. Proof Checking. Motivation. Cunning Plan. Standard Architecture. History Automated Theorem Proving and Proo Checking Engler: Automatically Generating Malicious Disks using Symex IEEE Security and Privacy 2006 Use CIL and Symbolic Execution on Linux FS code Special model o memory,

More information

3D Hand and Fingers Reconstruction from Monocular View

3D Hand and Fingers Reconstruction from Monocular View 3D Hand and Fingers Reconstruction rom Monocular View 1. Research Team Project Leader: Graduate Students: Pro. Isaac Cohen, Computer Science Sung Uk Lee 2. Statement o Project Goals The needs or an accurate

More information

Robotics and Autonomous Systems

Robotics and Autonomous Systems Robotics and Autonomous Systems 58 (2010) 140 148 Contents lists available at ScienceDirect Robotics and Autonomous Systems journal homepage: www.elsevier.com/locate/robot Bridging the gap between eature-

More information

Fig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997).

Fig. 3.1: Interpolation schemes for forward mapping (left) and inverse mapping (right, Jähne, 1997). Eicken, GEOS 69 - Geoscience Image Processing Applications, Lecture Notes - 17-3. Spatial transorms 3.1. Geometric operations (Reading: Castleman, 1996, pp. 115-138) - a geometric operation is deined as

More information

An Enhanced Approach for Secure Pattern. Classification in Adversarial Environment

An Enhanced Approach for Secure Pattern. Classification in Adversarial Environment Contemporary Engineering Sciences, Vol. 8, 2015, no. 12, 533-538 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2015.5269 An Enhanced Approach for Secure Pattern Classification in Adversarial

More information

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T. Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement

More information

Scheduling in Multihop Wireless Networks without Back-pressure

Scheduling in Multihop Wireless Networks without Back-pressure Forty-Eighth Annual Allerton Conerence Allerton House, UIUC, Illinois, USA September 29 - October 1, 2010 Scheduling in Multihop Wireless Networks without Back-pressure Shihuan Liu, Eylem Ekici, and Lei

More information

Trust Management Issues for Ad Hoc and Self-organized Networks

Trust Management Issues for Ad Hoc and Self-organized Networks Trust Management Issues or Ad Hoc and Sel-organized Networks Vassileios Tsetsos, Giannis F. Marias, and Sarantis Paskalis Pervasive Computing Research Group, Dept. o Inormatics and Telecommunications,

More information

Proposal of an ODX Data Exchange System Applied to Automotive Diagnosis

Proposal of an ODX Data Exchange System Applied to Automotive Diagnosis Proposal o an ODX Data Exchange System Applied to Automotive Diagnosis A. Cremmel *,**, A. Azarian *,**, A. Siadat ** (IEEE Member) * SIEMENS AG A&D AS AP SE 3 IC, Siemensallee 84, 76187Karlsruhe, GERMANY

More information

Comparison of Two Interactive Search Refinement Techniques

Comparison of Two Interactive Search Refinement Techniques Comparison o Two Interactive Search Reinement Techniques Olga Vechtomova Department o Management Sciences University o Waterloo 200 University Avenue West, Waterloo, Canada ovechtom@engmail.uwaterloo.ca

More information

A Novel Accurate Genetic Algorithm for Multivariable Systems

A Novel Accurate Genetic Algorithm for Multivariable Systems World Applied Sciences Journal 5 (): 137-14, 008 ISSN 1818-495 IDOSI Publications, 008 A Novel Accurate Genetic Algorithm or Multivariable Systems Abdorreza Alavi Gharahbagh and Vahid Abolghasemi Department

More information

A Review of Evaluation of Optimal Binarization Technique for Character Segmentation in Historical Manuscripts

A Review of Evaluation of Optimal Binarization Technique for Character Segmentation in Historical Manuscripts 010 Third International Conerence on Knowledge Discovery and Data Mining A Review o Evaluation o Optimal Binarization Technique or Character Segmentation in Historical Manuscripts Chun Che Fung and Rapeeporn

More information

Message authentication

Message authentication Message authentication -- Reminder on hash unctions -- MAC unctions hash based block cipher based -- Digital signatures (c) Levente Buttyán (buttyan@crysys.hu) Hash unctions a hash unction is a unction

More information

Keysight Technologies Specifying Calibration Standards and Kits for Keysight Vector Network Analyzers. Application Note

Keysight Technologies Specifying Calibration Standards and Kits for Keysight Vector Network Analyzers. Application Note Keysight Technologies Speciying Calibration Standards and Kits or Keysight Vector Network Analyzers Application Note Introduction Measurement errors in network analysis can be separated into two categories:

More information

What is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology

What is Clustering? Clustering. Characterizing Cluster Methods. Clusters. Cluster Validity. Basic Clustering Methodology Clustering Unsupervised learning Generating classes Distance/similarity measures Agglomerative methods Divisive methods Data Clustering 1 What is Clustering? Form o unsupervised learning - no inormation

More information

Himanshu Jain and Kalyanmoy Deb, Fellow, IEEE

Himanshu Jain and Kalyanmoy Deb, Fellow, IEEE An Evolutionary Many-Objective Optimization Algorithm Using Reerence-point Based Non-dominated Sorting Approach, Part II: Handling Constraints and Extending to an Adaptive Approach Himanshu Jain and Kalyanmoy

More information

Distribution Fields with Adaptive Kernels for Large Displacement Image Alignment

Distribution Fields with Adaptive Kernels for Large Displacement Image Alignment MEARS et al.: DISTRIBUTION FIELDS WITH ADAPTIVE KERNELS 1 Distribution Fields with Adaptive Kernels or Large Displacement Image Alignment Benjamin Mears bmears@cs.umass.edu Laura Sevilla Lara bmears@cs.umass.edu

More information

A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOGY

A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOGY In: Stilla U et al (Eds) PIA7. International Archives o Photogrammetry, Remote Sensing and Spatial Inormation Sciences, 36 (3/W49B) A MULTI-LEVEL IMAGE DESCRIPTION MODEL SCHEME BASED ON DIGITAL TOPOLOG

More information

A Small-world Network Where All Nodes Have the Same Connectivity, with Application to the Dynamics of Boolean Interacting Automata

A Small-world Network Where All Nodes Have the Same Connectivity, with Application to the Dynamics of Boolean Interacting Automata A Small-world Network Where All Nodes Have the Same Connectivity, with Application to the Dynamics o Boolean Interacting Automata Roberto Serra Department o Statistics, Ca Foscari University, Fondamenta

More information

Unsupervised Learning of Probabilistic Models for Robot Navigation

Unsupervised Learning of Probabilistic Models for Robot Navigation Unsupervised Learning o Probabilistic Models or Robot Navigation Sven Koenig Reid G. Simmons School o Computer Science, Carnegie Mellon University Pittsburgh, PA 15213-3891 Abstract Navigation methods

More information

An Automatic Sequential Smoothing Method for Processing Biomechanical Kinematic Signals

An Automatic Sequential Smoothing Method for Processing Biomechanical Kinematic Signals An Automatic Sequential Smoothing Method or Processing Biomechanical Kinematic Signals F.J. ALONSO, F. ROMERO, D.R. SALGADO Department o Mechanical, Energetic and Material Engineering University o Extremadura

More information

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM

MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM UDC 681.3.06 MATRIX ALGORITHM OF SOLVING GRAPH CUTTING PROBLEM V.K. Pogrebnoy TPU Institute «Cybernetic centre» E-mail: vk@ad.cctpu.edu.ru Matrix algorithm o solving graph cutting problem has been suggested.

More information

13. Power Optimization

13. Power Optimization 13. Power Optimization May 2013 QII52016-13.0.0 QII52016-13.0.0 The Quartus II sotware oers power-driven compilation to ully optimize device power consumption. Power-driven compilation ocuses on reducing

More information

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang

Adversarial Machine Learning An Introduction. With slides from: Binghui Wang Adversarial Machine Learning An Introduction With slides from: Binghui Wang Outline Machine Learning (ML) Adversarial ML Attack Taxonomy Capability Adversarial Training Conclusion Outline Machine Learning

More information

The Graph of an Equation Graph the following by using a table of values and plotting points.

The Graph of an Equation Graph the following by using a table of values and plotting points. Calculus Preparation - Section 1 Graphs and Models Success in math as well as Calculus is to use a multiple perspective -- graphical, analytical, and numerical. Thanks to Rene Descartes we can represent

More information

Research on Image Splicing Based on Weighted POISSON Fusion

Research on Image Splicing Based on Weighted POISSON Fusion Research on Image Splicing Based on Weighted POISSO Fusion Dan Li, Ling Yuan*, Song Hu, Zeqi Wang School o Computer Science & Technology HuaZhong University o Science & Technology Wuhan, 430074, China

More information

AUTOMATING THE DESIGN OF SOUND SYNTHESIS TECHNIQUES USING EVOLUTIONARY METHODS. Ricardo A. Garcia *

AUTOMATING THE DESIGN OF SOUND SYNTHESIS TECHNIQUES USING EVOLUTIONARY METHODS. Ricardo A. Garcia * AUTOMATING THE DESIGN OF SOUND SYNTHESIS TECHNIQUES USING EVOLUTIONARY METHODS Ricardo A. Garcia * MIT Media Lab Machine Listening Group 20 Ames St., E5-49, Cambridge, MA 0239 rago@media.mit.edu ABSTRACT

More information

SECURITY OF PATTERN RECOGNITION SYSTEMS IN ADVERSARIAL ENVIRONMENTS

SECURITY OF PATTERN RECOGNITION SYSTEMS IN ADVERSARIAL ENVIRONMENTS SECURITY OF PATTERN RECOGNITION SYSTEMS IN ADVERSARIAL ENVIRONMENTS Battista Biggio, Giorgio Fumera, Gian Luca Marcialis, and Fabio Roli Pattern Recognition and Applications Group Department of Electrical

More information

An analysis of trust in anonymity networks in the presence of adaptive attackers

An analysis of trust in anonymity networks in the presence of adaptive attackers Author manuscript, published in "Mathematical Structures in Computer Science (2013 to appear" Under consideration or publication in Math. Struct. in Comp. Science An analysis o trust in anonymity networks

More information

Lab 9 - GEOMETRICAL OPTICS

Lab 9 - GEOMETRICAL OPTICS 161 Name Date Partners Lab 9 - GEOMETRICAL OPTICS OBJECTIVES Optics, developed in us through study, teaches us to see - Paul Cezanne Image rom www.weidemyr.com To examine Snell s Law To observe total internal

More information

Adversarial Learning

Adversarial Learning Adversarial Learning Daniel Lowd Department of Computer Science and Engineering University of Washington, Seattle Seattle, WA 98195-2350 lowd@cs.washington.edu Christopher Meek Microsoft Research Redmond,

More information

Symbolic System Synthesis in the Presence of Stringent Real-Time Constraints

Symbolic System Synthesis in the Presence of Stringent Real-Time Constraints Symbolic System Synthesis in the Presence o Stringent Real-Time Constraints Felix Reimann, Martin Lukasiewycz, Michael Glass, Christian Haubelt, Jürgen Teich University o Erlangen-Nuremberg, Germany {elix.reimann,glass,haubelt,teich}@cs.au.de

More information

Generalized Reliability-Oriented Energy Management for Real-time Embedded Applications

Generalized Reliability-Oriented Energy Management for Real-time Embedded Applications Generalized Reliability-Oriented Energy Management or Real-time Embedded Applications ABSTRACT Baoxian Zhao, Hakan Aydin epartment o Computer Science George Mason University Fairax, VA 22030 bzhao@gmu.edu,

More information