Statistical Detection for Network Flooding Attacks

Size: px
Start display at page:

Download "Statistical Detection for Network Flooding Attacks"

Transcription

1 Statistical Detection for Network Flooding Attacks C. S. Chao, Y. S. Chen, and A.C. Liu Det. of Information Engineering, Feng Chia Univ., Taiwan 407, OC. Abstract In order to meet the high demands of network availability and reliability, today s IDS (Intrusion Detecting System) is often constructed in major ortal to rotect the managed network from attacks. Generally, current IDS use the attern matching method as the rimary scheme to detect attacks. However, after integrating IDS into router, the attern matching method may cause extreme comuting load to router which deviates working correctly, even crashing, when under attacking. In this research, the analysis of network traffic variation is combined with the attern matching method for decreasing the load arose from the attached IDS of the router. In addition, an overall monitoring system is designed to cooerate with the backbone routers which equied our attack mechanism. Network managers can not only realize an occurrence of an attack but also where the attack asses through the network by using this system. Besides, the firewall would be also built into the router which can be started by managers to rovide first line rotection after an attack is detected. Keywords: abrut abnormal detection, statistical reference window, network flooding attacks, event correlation, network management. Introduction Due to the exlosive growth of network-related technology and generalization of the Internet, the demand of the Internet service quality becomes higher and higher day by day. However, the occurrences of network attacks and virus become the most serious roblems at resent. Disaster events such as attacks or virus not only cause servers crash but also bring serious degradation of erformance and quality of service in correlated network segments. Therefore, an effective monitor system for adative scale of over all networks is essential. For security, element venders like CISCO and NetScreen incororate intrusion detection system (IDS) with their roducts to rovide first line rotection. By alying such integrated elements, a regional detection and monitoring system can be easily constructed. Current IDS technique can de divided into following tyes: Pattern matching Pattern matching method often alies many rules generated by analyzing each attack. IDS would check every acket with these re-defined rules to determine whether an attack occurs or not. Most IDSs use attern matching as main detection method. The most serious roblems of attern matching are its low rocessing seed and unable to detect novel attack. In order to imrove rocessing erformance, Fisk and Coit have individually roosed several new methods in order to seed u attern comaring. Also, Snort.0 3 also uses rule otimizer and rule classifier for the urose of faster. Abnormal behavior detection Abnormal behavior detection is an

2 unoular method that detects the abnormal behavior with statistic. This method usually is used in network management for fault detection or rediction. In 990, Maxion et al. 4 monitored the network traffic in Carnegie Mellon University for about 7 months and used those data to construct a traffic model to redict the traffic amount in next time slot. Then they set an aroriate threshold for the next time slot to check if traffic change abnormally. Hood et al. 5 collected all the logs for fault verifying and used Bayesian network to calculate the robability of fault occurrence in each time slot. Thotton et al. 6 used first order auto-regressive model to calculate white noise series. Generalized likelihood ratio was used to determine the degree of a arameter change. At the end, Thotton et al. 6 used satial correlation to combine all arameter they chose to check if a fault haened. Unfortunately abnormal behavior detection is hard to verify whether the detected abnormal behavior is really abnormal or not. Therefore, managers need to check log or some other record to verify the abnormal behavior. But abnormal behavior detection is very suitable for doubting an error occurs. Abnormal rotocol detection Abnormal rotocol detection method focuses on observing the structure and content of connection, most abnormal rotocol attacks are aimed at connection rotocol such as Telnet, HTTP, PC, SMTP, and login. If we define the rules for connection rotocol in detector, it is very easy to determine the invalid connection traffic such as unexected data, unnecessary character and invalid character. That s why abnormal rotocol attacks can be determined, for instance, Codeed worm, which tries to use GET command to ask the infected server to execute malevolence rogram. IDS checks the content of HTTP connection rotocol, thus abnormal rotocol attacks can be easily determined. But sometimes this kind of attack may ass through attern matching IDS. Therefore, abnormal rotocol detection IDS can be used to comlement the insufficient ability of attern matching IDS to discover the attack behavior violating connection rotocol. Visualization Hiraishi et al. 7 used Hyerbolic Tree to visualized the log data after a user login. Managers can understand all the action and information of each user by observing Hyerbolic Tree and can easily discover invalid actions when the branches connect to Danger grou grow exlosively. Erbacher et al. 8 used two basic comonents to construct a connection grah for a managed host. The first art was an arrow that showed a connection before or after authentication, and the second art was a circle that every arrow directed to. They defined several kinds of arrows for Telnet, FTP, network file system (NFS), initial inetd connection and ort scan searately. All the connection in that host can be observed easily by observing the connection grah. If there is an attack to that host, then we can easily discover it by monitoring the change in the grah in visual IDS. In general, current IDSs use attern matching method as main detection method. Consequently, in this research, attern matching is chosen as a main detection method, and is built in router. After integrating IDS into router, attern matching method may cause router too heavy load to work. In order to decrease the load caused by IDS, we try to combine attern matching method and change method to detect flooding attack. If the ure attern matching method causes too heavy load in router,

3 the combination method of change and attern matching will be used.. Disaster Events Detecting As described in section, disaster events would roagate over several network segments and all the range they ass through would be affected. Therefore, constructing a management system to monitor the entire managed network for understanding the range that attacks affect is very imortant. For this kind of management system, the detection and reasoning can be from oint ersective to line ersective and from line ersective to surface ersective. Line ersective When an attack occurs, the flooding traffic would ass through many network elements and cause the value of secific acket statistic to grow exlosively. The traffic statistic of each interface of every network element will be monitored. SNMP rotocol can easily rovide us the information for determining whether the traffic rises abnormally or not. And the category of attack can be reasoned by verifying the acket tye of traffic with abrut change, then attern matching method would be triggered by system to do further detection. Line ersective After the anomaly in an interface, the direction of attack traffic needs to be ascertained. Each attack flow would be transmitted from one element to another element until the traffic reaches the target host. Therefore, the direction of attack traffic can be reasoned by monitoring the incoming and outgoing traffic of each interface in every network element. Surface ersective After having all attack traffic direction, we can go a ste further to infer the location that the attack traffic is going to affect. Thus, the managers of downstream can be notified to reare defense works. t t t May be affected in next time slot t3 Figure. Proagation of attack traffic As figure shows, the attack traffic asses through link (->3) and (->3) in time t, and gets across element 3 to element 4 in time t. Thus, we can infer that the downstream of element 4 link (4->5) will become the next ath that attack traffic might ass through. Managers must comlete defense works in time to revent the network segment after element 5 from being affected. In order to avoid the manager being unable to obtain information because of congestion caused by attack, out-of-bound management architecture reresented in figure is adoted. Every managed element should directly connect to manager to form an indeendent managed domain. No host can transfer data to managed domain besides manager and managed element, that is, only management traffic can exist in that domain. By adjusting the routing table in each router, we can easily create an indeendent domain for management. Manager Domain (LAN) Out-Of-Band eal-world Network Figure. Management architecture When an attack occurs, managers would receive large amount of alarms. Therefore, managers need some information to recognize these alarms and correlate. In order to differentiate which element and interface these

4 alarms belong to, we define the alarm format as the figure 3 shows. Master initials the installation of slave Master commands slaves initials attack Traffic reach the target Time Stam Tye Category Element & Interface Figure 3. Alarm format Connect Element & Interface Each field is described as follows: Timestam: ecording the time that the alarm is generated; Tye: ecording the tye of alarm, Send or eceive; Category: ecording the category of attack; Element & Interface: the element and interface that the alarm belongs to; Connect Element & Interface: ecording the element and interface at the other end of link, this information can hel us quickly find out the corresonding alarm if it is generated. The entire stes of location correlation are listed as follow:. Collecting all alarms in time t;. Paring these alarms according the connection correlation; 3. Finding out all anomaly links; 4. Classifying anomaly link according to attack tye; 5. Maing anomaly link and direction into toology. In time consideration, in 00, Chao et al. 9 have roosed that some faults can be modeled by two or three states finite state machine. A fault can be divided into Start, Last, and Sto states. In the same year, Cabrera et al. 0 have reorted the time line of a DDoS attack as shown in figure 4. As figure 4 shows, an attack start at t3 until the target is shutdown at t5. Thus it can be seen, DDoS attack also can be modeled by three state finite state machine with STAT, LAST, and STOP states. Master comletes the installation of slave Slaves start sending traffic to target The target is shut down Figure 4. DDoS attack timing outline Choose Pattern corresonding matching rule Pattern Pattern matching matching Pattern matching Generating Generating Generating Generating Pattern L matching Last alarm Last alarm Last alarm End alarm L L L E Generating B E Begin alarm B Clear rules Figure 5. Examle of timing outline Figure 5 is a simle examle of disaster events. After an abrut change, corresonding rules will be chosen to check corresonding ackets. For instance, when an abrut change of TCP traffic is detected, only TCP-related rules will be chosen and only TCP ackets will be determined. If an attack is detected, a Begin alarms will be generated. In the following time slot, although no change is detected, attern matching method will still be triggered to check if attack last. If the attack still last, a Last alarm will be generated. After another abrut change is detected and no attack acket is determined, an End alarm will be generated and corresonding rule will be cleared. 3. Detection In order to detect the abrut change accurately, the time series data of each kind of ackets would be rocessed by several change methods. The accuracies of these methods were comared in section Series Segmentation These time series data would be divided into reference window and test window

5 resectively before rocessed by change method. In this research, two different methods were used to decide the reference window size. The first one is Fixed and the second one is Variance. Fixed window size: The size of reference window is fixed in each comarison. Also, the size of reference window is the same as the size of test window. The window size is decided by user. In our exeriment, we comare the accuracies of different window size to decide how many samles er window. Variance window size: The size of reference window is variable; the time series data of test window is not only comared with the same length data, but also data with double size, trile size and even multile size of test window. The method we use to decide reference is described as following three stes: a. Initially, the size of reference window and test window is the same. Suose the starting oint of reference window is time T, the ending oint of reference window and starting oint of test window are time T + t, and the stoing oint of test window is time T + t. Time T + t can be looked on as a artition oint between reference window and test window. b. While comaring reference window with test window, if the variation degree is not over the threshold, the artition oint will shift to the end of test window. The system would get the next test window. This ste reeats until the variation degree is over threshold. c. When variation degree exceeds threshold, the change oint will be set in the artition oint. That means an abrut In Time T In Time T + t In Time T + 3t In Time T + 4t change is detected in that time. The detection rocedure will be restarted at the change oint. Initially, choose two window with the same size Partition oint No change occur, reference window extend Partition oint No change occur, reference window extend continually Partition oint A change occur, choose a new reference window oint Partition oint Figure 6. Various Window Sizes 3. Detecting Methods Log likelihood ratio test with first order Auto-egressive model In our exeriment, the segmentation method roosed by Hood et al. was used to be a change detector. After modeling two adjacent window with A(), two white noise series will be generated. The joint robability of that a change is detected l and the joint robability of that no change is detected l 0 can be calculate. The joint robability l is dislayed as follows: ( N NT Nσ NTσ T l = ) ( ) ex( )ex( ) πσ σ πσ T σ T Eq. (3.), where N and N T are the numbers of random variable of white noise series of reference window and test window individually. The robability of that no change is observed between two windows is: l 0 = ) πσ ( N + NT) σ + NT Eq. (3.), ex( ) σ N ( where σ is the ooled variance. The log likelihood ratio is used to calculate the change degree as follows: η = ( N + NT)logσ N logσ N T logσ T Eq. (3.3).

6 Another two trivial methods, standard derivation comarison and average comarison, are also used in our exeriment. The change degree of standard derivation comarison ( σ ) η = ( σ ) higher lower Eq. (3.4), log( ) t = Eq. (4.), λ where λ is average arrival rate to send acket. Background Traffic : simulate normal traffic Attack Traffic and the change degree of average comarison Average η = Average higher lower Eq. (3.5). 4. Performance Evaluation In order to monitor the behavior of attack, we constructed a small network with 3 PC routers, 4 PCs, switches and hub shown in figure 7. The hardware, software and setting we used are listed in table : Table. Exerimental Environment Descrition Hardware P MB Memory OS edhat linux 7.3 outing daemon Gated outing Protocol Flow calculator Background Traffic Attack Window size IP NeTraMet (Flow Meter MIB) Poisson WWW Threshold,3,5,0 000,000 kts/s 00,400,600,800,000 kts/s 5,0,5,0,30 samles 40,80,0,60,00 users Figure 7 dislays our exerimental environment. There is bi-direction background traffic in backbone to simulate common traffic. In this exeriment, the attack was generated by two attackers. Three change methods described in section 3 were used to detect abrut change caused by attack. In order to simulate multi-node environment, a multi-rocess acket generator and DDoS tools were constructed. We use two kinds of background traffic. The first one is Poisson, the inter-arrival rate follows Poisson distributed. The inter-arrival time will be Figure 7. Exerimental Environment Figure 8 is an examle of Poisson traffic. As we can see, the traffic seems too stable and unlike real world traffic. Therefore, the second kind background traffic WWW roosed by S. Deng was used and is shown in figure 9. Figure 8. Poisson Traffic Figure 9. WWW Traffic WWW traffic is generated by n sources with On and Off state. Weibull distribution was used to calculate the On eriod time shown in equation 4.. k t = θ [ ln( )] Eq. (4.), where θ = e 4.5, k = and the value of is random. In On eriod, S. Deng also used Weibull distribution with different arameters to calculate the acket inter-arrival time. The arameters are listed as follows:

7 θ =.5 k = 0.5. : random The Off eriod time is calculated by using Pareto distribution, the equation and arameters are listed as follows: α t = ( ), where α = In our exeriments, the comarisons between the accuracies of every method with different arameter were roceeded. The best result of each method is showed figure 0 and figure. For examle, in figure 0, m-30-5 means using method with 30 samles er window in threshold 5. That is, the window size 30 and threshold 3 are best settings of method. Method ~ 6 are described as follows: m: Log likelihood ratio test with A() with fixed reference window size m: Log likelihood ratio test with A() with variance reference window size m3: average comaring with fixed reference window size m4: average comaring with variance reference window size m5: standard derivation comaring with fixed reference window size m6: standard derivation comaring with variance reference window size Figure 0 reresents the best result of each method. In this exeriment, the attack traffic is 000 kts/s, but we find most methods have good accuracies because the difference between attack and background traffic is very large. Therefore, we decrease the attack traffic to 000 kts/s and use 000 kts/s background traffic. The result is showed in In figure 0, we can see the method and method 5 with window size 30 and threshold 5 are better than others in change caused by attack. The exeriment result can only rely to a stable network environment. If the background traffic is non-stable, the result may be different. Figure 0. The best result of each method in Poisson background traffic Figure. The best result of each method in WWW background traffic Figure deicts the best result of each method in WWW background traffic. From this exeriment, we found the log likelihood ratio test can t rovide a good detection of abrut change with WWW background traffic. As we can see, the accuracies of method 3 and method 4 with 30 samles er test window and method 5 with 5 samles er test window in threshold 3 are higher than 80%. The best one of each method is method Comarison of Detecting Methods In this section, we showed the comarison between attern matching method and combination method of change and attern matching. We would discuss two conditions normality and under attack. In traditional attern matching method, the content of each acket would comare with every rule in

8 IDS after decoding shown as figure. TCP UDP ICMP ackets TCP TCP UDP UDP ICMP ICMP rules Figure. Traditional attern matching method Since decoding is an essential ste for every method, therefore, we only choose the matching times in the comarison. The total number of matching times of traditional attern matching method can be written as: T = N a i i= Eq. (5.), where N is total number of ackets, is total number of rules and a i is the number of item of rule i. In order to decrease the frequency of matching, a new attern matching method classifies all ackets before matching. The content of each acket only comares with corresonding rules as figure 3 shows. For instance, TCP acket only comares with TCP-related rules. TCP UDP ICMP ackets TCP TCP UDP UDP ICMP ICMP rules Figure 3. Imroved attern matching method The number of matching times can be written as: x ni i a k i= j= k = T = N * s + Eq. (5.), where N is total number of ackets, s is matching times of acket classification, a k is the number of item of rule k, i is the number of rules of category i, ni is the number of ackets of category i, and x is the number of classification. In equation 5., N*s means the total number of matching times in acket classification. i a k k = indicates the number of matching times of category i for one acket in category i, ni i a k j= k= is the number of matching times of category i for all ackets in category I and x ni i a k i= j= k= is the number of matching times of category i for every acket. In attern matching methods, the equation of matching times in normal condition is the same as the number of matching times when the network is under attack, because whether an attack occurs or not, these two methods always check every acket. The combination method of change and attern matching only calculates the amount of each category of acket and detect if an abrut change occurs or not, therefore, matching only is used for acket classification. The number of action after decoding is: T = N( s +) Eq. (5.3), where N is total number of ackets, s is matching times of acket classification. In equation 5.3, the additional is the action of acket counted after classification. And after a change is detected, the attern matching method is triggered for 5 seconds every.5 minutes to check if really an attack has taken lace until no attack acket is detected. And only attack-related rules would be chosen as figure 4 shows. For instance, if a change was detected in TCP acket, only TCP-related rules were chosen. Thus, if a UDP or ICMP acket comes, it would be ignored. TCP TCP UDP ICMP TCP ackets rules Figure 4. Pattern matching method combined with change method The number of action can be exressed as: x mi i T = N( s + ) + ( a ) Eq. (5.4), i i j= l= r l

9 where x i= mi = λt, N is total number of ackets, s is matching times of acket classification, a l is the number of item of rule l, i is robability of that a change is detected for acket category i, ri is the number of rules of category i, x is the number of classification, mi is the number of ackets of category i, λ is average acket arrival rate, t is time of using attern matching method. r i a l l= ( i ) is the exected value of the number of matching times for one acket in category i. In this method, the content of each acket only comares with rules corresonding to the tye of burst traffic. For examle, the content of TCP acket is only comared with TCP-related rules, if category of the current burst traffic is TCP, the TCP-related rules are chosen and the number of matching times is rt a l l= (a t is the number of item of TCP-related rule and r t is the number of TCP-related rule). But if the category of current burst traffic is UDP or ICMP, and the number of matching times is 0. Hence the excetion of number of matching times for a TCP acket is r t t l= a + l u r t * 0 + *0 = a. The number i t l= of acket that needs to be comared with rules is λt. In our exeriment, t is 5, that s because we only comare with rules for 5 seconds every.5monites. So the time the combination method needs to collect ackets for comaring with rules is much smaller than the time attern matching method needs. For each acket, the number of matching times of combination method are less than the number of matching times of new attern matching method, because i must <=, r t t l= < i t ak k = a l. The amount of ackets that should be comared is also less than attern matching method because the ackets collecting time is only /30. Thus, total matching times as well as its load will be reduced very much. 6. System Imlementation Figure 5. Toology view In our imlementation, the management system can be divided into two arts. One is Monitor constructed in Manager and the other is Detector constructed in PC routers. The toology view of Monitor is showed in figure 5, before Monitor started, a toology descrition must be constructed first. When monitor is started, toology descrition would be used to construct a toology list that contains each element and interface showed as tree structure in toology view. The toology list can be clicked to get more detail information about each interface. Monitor is resonsible for collecting alarms generated by each element and maing these alarms into toology after classifying. The symbol means that abnormal inut traffic is detected in this interface and the symbol S, the abnormal outut traffic. By observing the toology view in Monitor, we can understand all the condition of managed network. After clicking interface in toology list, detail information could be grabbed as figure 6 shows. When the amount of acket of flow is over threshold, for examle /5 of TCP traffic, the flow will be showed in interface view. In this view, the flows of all detected attacks will be

10 shown first, then followed the flow exceed threshold. Every flow showed in this view will be check with normal rules to determine whether the flow is allowed in the network segment or not. If not, the state column will show Abnormal. For every flow, the Dro bottom can be click to trigger firewall to dro the acket of that flow. When an attack is detected, the interface that is closest to source can be found from monitor. That flow can be dro from that interface to rotect the managed network. Figure 6. Interface information 7. Conclusion In this aer, we integrate the IDS into router, and roose management architecture to detect attack in large scale network. In order to avoid effect from the heavy load caused by attern matching method, we combine change method with attern matching to release the heavy load of IDS. The most serious disadvantage of our combination method is change detection. Because the attern matching method is only triggered after abrut change, most ackets would be ignored. Thus, the method is only useful for flooding attack. In high utilization links, the method won t detect any abrut change even an attack occurs because the change degree is not large enough. Therefore, the management system we roosed should be looked on as first line rotection. For secific service, host IDS should be adoted to rovide advanced rotection. eferences. M. Fisk, and G. Varghese, Fast Content-Based Packet Handling for Intrusion Detection. UCSD Technical eort CS , May 00.. C.J. Coit, S. Staniford, and J. McAlerney, Towards Faster String Matching for Intrusion Detection or Exceeding the Seed of Snort. DAPA Information Survivability Conference and Exosition (DISCEX II'0), Volume I-Volume, June - 4, Snort.0, Oen Source Network Intrusion Detection System, htt:// 4..A. Maxion, and F.E. Feather, A case study of Ethernet Anomalies in a Distributed Comuting Environment. IEEE Transactions on eliability, Vol 39, No. 4 October, C.S. Hood, and C. Ji, Proactive Network Fault Detection, INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Comuter and Communications Societies, Volume: 3, 7- Ar 997, M. Thottan, and C. Ji, Adative Thresholding for Proactive Network Problem Detection. IEEE International Worksho on Systems Management, -4 Aril 998, Page(s): H. Hiraishi, and F. Mizoguchi, Design of a visual browser for network intrusion detection. Infrastructure for Collaborative Enterrises, 00. WET ICE 00, Page(s): F. Erbacher, K.L. Walker, and D.A. Frincke, Intrusion and misuse detection in large-scale systems. Comuter Grahics and Alications, IEEE, Volume: Issue:, Jan/Feb 00, Page(s): C.S. Chao, D.L. Yang, and A.C. Liu, A time-aware fault diagnosis system in LAN. Integrated Network Management Proceedings, 00, Page(s): J.B.D. Cabrera, L. Lewis, X. Qin, W. Lee,.K. Prasanth, B. avichandran, and.k. Mehra, Proactive detection of distributed denial of service attacks using MIB traffic variables - a feasibility study. Integrated Network Management Proceedings, Page(s): C.S. Hood, and C. Ji, Beyond thresholds: an alternative method for extracting information from network measurements. Global Telecommunications Conference, 997, Volume:, 3-8 Nov 997, Page(s): S. Deng, Emirical Model of WWW Document Arrival at Access Link. ICC 96, Conference ecord, Converging Technologies for Tomorrow's Alications. 996, Volume: 3, 3-7 June 996.

A Study of Protocols for Low-Latency Video Transport over the Internet

A Study of Protocols for Low-Latency Video Transport over the Internet A Study of Protocols for Low-Latency Video Transort over the Internet Ciro A. Noronha, Ph.D. Cobalt Digital Santa Clara, CA ciro.noronha@cobaltdigital.com Juliana W. Noronha University of California, Davis

More information

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2

An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 An Efficient Coding Method for Coding Region-of-Interest Locations in AVS2 Mingliang Chen 1, Weiyao Lin 1*, Xiaozhen Zheng 2 1 Deartment of Electronic Engineering, Shanghai Jiao Tong University, China

More information

Face Recognition Using Legendre Moments

Face Recognition Using Legendre Moments Face Recognition Using Legendre Moments Dr.S.Annadurai 1 A.Saradha Professor & Head of CSE & IT Research scholar in CSE Government College of Technology, Government College of Technology, Coimbatore, Tamilnadu,

More information

EE678 Application Presentation Content Based Image Retrieval Using Wavelets

EE678 Application Presentation Content Based Image Retrieval Using Wavelets EE678 Alication Presentation Content Based Image Retrieval Using Wavelets Grou Members: Megha Pandey megha@ee. iitb.ac.in 02d07006 Gaurav Boob gb@ee.iitb.ac.in 02d07008 Abstract: We focus here on an effective

More information

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs

An empirical analysis of loopy belief propagation in three topologies: grids, small-world networks and random graphs An emirical analysis of looy belief roagation in three toologies: grids, small-world networks and random grahs R. Santana, A. Mendiburu and J. A. Lozano Intelligent Systems Grou Deartment of Comuter Science

More information

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model

IMS Network Deployment Cost Optimization Based on Flow-Based Traffic Model IMS Network Deloyment Cost Otimization Based on Flow-Based Traffic Model Jie Xiao, Changcheng Huang and James Yan Deartment of Systems and Comuter Engineering, Carleton University, Ottawa, Canada {jiexiao,

More information

Space-efficient Region Filling in Raster Graphics

Space-efficient Region Filling in Raster Graphics "The Visual Comuter: An International Journal of Comuter Grahics" (submitted July 13, 1992; revised December 7, 1992; acceted in Aril 16, 1993) Sace-efficient Region Filling in Raster Grahics Dominik Henrich

More information

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY

AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY AN ANALYTICAL MODEL DESCRIBING THE RELATIONSHIPS BETWEEN LOGIC ARCHITECTURE AND FPGA DENSITY Andrew Lam 1, Steven J.E. Wilton 1, Phili Leong 2, Wayne Luk 3 1 Elec. and Com. Engineering 2 Comuter Science

More information

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island

A GPU Heterogeneous Cluster Scheduling Model for Preventing Temperature Heat Island A GPU Heterogeneous Cluster Scheduling Model for Preventing Temerature Heat Island Yun-Peng CAO 1,2,a and Hai-Feng WANG 1,2 1 School of Information Science and Engineering, Linyi University, Linyi Shandong,

More information

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS

PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS PREDICTING LINKS IN LARGE COAUTHORSHIP NETWORKS Kevin Miller, Vivian Lin, and Rui Zhang Grou ID: 5 1. INTRODUCTION The roblem we are trying to solve is redicting future links or recovering missing links

More information

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K.

AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS. Ren Chen and Viktor K. inuts er clock cycle Streaming ermutation oututs er clock cycle AUTOMATIC GENERATION OF HIGH THROUGHPUT ENERGY EFFICIENT STREAMING ARCHITECTURES FOR ARBITRARY FIXED PERMUTATIONS Ren Chen and Viktor K.

More information

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field

Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Learning Motion Patterns in Crowded Scenes Using Motion Flow Field Min Hu, Saad Ali and Mubarak Shah Comuter Vision Lab, University of Central Florida {mhu,sali,shah}@eecs.ucf.edu Abstract Learning tyical

More information

TOPP Probing of Network Links with Large Independent Latencies

TOPP Probing of Network Links with Large Independent Latencies TOPP Probing of Network Links with Large Indeendent Latencies M. Hosseinour, M. J. Tunnicliffe Faculty of Comuting, Information ystems and Mathematics, Kingston University, Kingston-on-Thames, urrey, KT1

More information

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation

SPITFIRE: Scalable Parallel Algorithms for Test Set Partitioned Fault Simulation To aear in IEEE VLSI Test Symosium, 1997 SITFIRE: Scalable arallel Algorithms for Test Set artitioned Fault Simulation Dili Krishnaswamy y Elizabeth M. Rudnick y Janak H. atel y rithviraj Banerjee z y

More information

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE

has been retired This version of the software Sage Timberline Office Get Started Document Management 9.8 NOTICE This version of the software has been retired Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with

More information

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism

A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism A New and Efficient Algorithm-Based Fault Tolerance Scheme for A Million Way Parallelism Erlin Yao, Mingyu Chen, Rui Wang, Wenli Zhang, Guangming Tan Key Laboratory of Comuter System and Architecture Institute

More information

This version of the software

This version of the software Sage Estimating (SQL) (formerly Sage Timberline Estimating) SQL Server Guide Version 16.11 This is a ublication of Sage Software, Inc. 2015 The Sage Grou lc or its licensors. All rights reserved. Sage,

More information

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1

Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Spanning Trees 1 Multicast in Wormhole-Switched Torus Networks using Edge-Disjoint Sanning Trees 1 Honge Wang y and Douglas M. Blough z y Myricom Inc., 325 N. Santa Anita Ave., Arcadia, CA 916, z School of Electrical and

More information

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties

Improved heuristics for the single machine scheduling problem with linear early and quadratic tardy penalties Imroved heuristics for the single machine scheduling roblem with linear early and quadratic tardy enalties Jorge M. S. Valente* LIAAD INESC Porto LA, Faculdade de Economia, Universidade do Porto Postal

More information

Interactive Image Segmentation

Interactive Image Segmentation Interactive Image Segmentation Fahim Mannan (260 266 294) Abstract This reort resents the roject work done based on Boykov and Jolly s interactive grah cuts based N-D image segmentation algorithm([1]).

More information

Record Route IP Traceback: Combating DoS Attacks and the Variants

Record Route IP Traceback: Combating DoS Attacks and the Variants Record Route IP Traceback: Combating DoS Attacks and the Variants Abdullah Yasin Nur, Mehmet Engin Tozal University of Louisiana at Lafayette, Lafayette, LA, US ayasinnur@louisiana.edu, metozal@louisiana.edu

More information

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY

AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY AUTOMATIC EXTRACTION OF BUILDING OUTLINE FROM HIGH RESOLUTION AERIAL IMAGERY Yandong Wang EagleView Technology Cor. 5 Methodist Hill Dr., Rochester, NY 1463, the United States yandong.wang@ictometry.com

More information

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications

OMNI: An Efficient Overlay Multicast. Infrastructure for Real-time Applications OMNI: An Efficient Overlay Multicast Infrastructure for Real-time Alications Suman Banerjee, Christoher Kommareddy, Koushik Kar, Bobby Bhattacharjee, Samir Khuller Abstract We consider an overlay architecture

More information

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH

A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH A CLASS OF STRUCTURED LDPC CODES WITH LARGE GIRTH Jin Lu, José M. F. Moura, and Urs Niesen Deartment of Electrical and Comuter Engineering Carnegie Mellon University, Pittsburgh, PA 15213 jinlu, moura@ece.cmu.edu

More information

Cooperative Diversity Combined with Beamforming

Cooperative Diversity Combined with Beamforming Cooerative Diversity Combined with Beamforming Hyunwoo Choi and Jae Hong Lee School of Electrical Engineering and INMC Seoul National University Seoul, Korea Email: {novo28, jhlee}@snu.ac.kr Abstract In

More information

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control

EP2200 Performance analysis of Communication networks. Topic 3 Congestion and rate control EP00 Performance analysis of Communication networks Toic 3 Congestion and rate control Congestion, rate and error control Lecture material: Bertsekas, Gallager, Data networks, 6.- I. Kay, Stochastic modeling,

More information

Sage Estimating (SQL) (formerly Sage Timberline Estimating) Installation and Administration Guide. Version 16.11

Sage Estimating (SQL) (formerly Sage Timberline Estimating) Installation and Administration Guide. Version 16.11 Sage Estimating (SQL) (formerly Sage Timberline Estimating) Installation and Administration Guide Version 16.11 This is a ublication of Sage Software, Inc. 2016 The Sage Grou lc or its licensors. All rights

More information

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks

TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks TCP VON: Joint Congestion Control and Online Network Coding for Wireless Networks Wei Bao, Vahid Shah-Mansouri, Vincent W.S. Wong, and Victor C.M. Leung Deartment of Electrical and Comuter Engineering

More information

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method

Leak Detection Modeling and Simulation for Oil Pipeline with Artificial Intelligence Method ITB J. Eng. Sci. Vol. 39 B, No. 1, 007, 1-19 1 Leak Detection Modeling and Simulation for Oil Pieline with Artificial Intelligence Method Pudjo Sukarno 1, Kuntjoro Adji Sidarto, Amoranto Trisnobudi 3,

More information

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time

Control plane and data plane. Computing systems now. Glacial process of innovation made worse by standards process. Computing systems once upon a time Classical work Architecture A A A Intro to SDN A A Oerating A Secialized Packet A A Oerating Secialized Packet A A A Oerating A Secialized Packet A A Oerating A Secialized Packet Oerating Secialized Packet

More information

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network

Sensitivity Analysis for an Optimal Routing Policy in an Ad Hoc Wireless Network 1 Sensitivity Analysis for an Otimal Routing Policy in an Ad Hoc Wireless Network Tara Javidi and Demosthenis Teneketzis Deartment of Electrical Engineering and Comuter Science University of Michigan Ann

More information

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University

Shuigeng Zhou. May 18, 2016 School of Computer Science Fudan University Query Processing Shuigeng Zhou May 18, 2016 School of Comuter Science Fudan University Overview Outline Measures of Query Cost Selection Oeration Sorting Join Oeration Other Oerations Evaluation of Exressions

More information

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect

A simulated Linear Mixture Model to Improve Classification Accuracy of Satellite. Data Utilizing Degradation of Atmospheric Effect A simulated Linear Mixture Model to Imrove Classification Accuracy of Satellite Data Utilizing Degradation of Atmosheric Effect W.M Elmahboub Mathematics Deartment, School of Science, Hamton University

More information

Semi-Markov Process based Model for Performance Analysis of Wireless LANs

Semi-Markov Process based Model for Performance Analysis of Wireless LANs Semi-Markov Process based Model for Performance Analysis of Wireless LANs Murali Krishna Kadiyala, Diti Shikha, Ravi Pendse, and Neeraj Jaggi Deartment of Electrical Engineering and Comuter Science Wichita

More information

Using Standard AADL for COMPASS

Using Standard AADL for COMPASS Using Standard AADL for COMPASS (noll@cs.rwth-aachen.de) AADL Standards Meeting Aachen, Germany; July 5 8, 06 Overview Introduction SLIM Language Udates COMPASS Develoment Roadma Fault Injections Parametric

More information

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005*

The Anubis Service. Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL June 8, 2005* The Anubis Service Paul Murray Internet Systems and Storage Laboratory HP Laboratories Bristol HPL-2005-72 June 8, 2005* timed model, state monitoring, failure detection, network artition Anubis is a fully

More information

A Model-Adaptable MOSFET Parameter Extraction System

A Model-Adaptable MOSFET Parameter Extraction System A Model-Adatable MOSFET Parameter Extraction System Masaki Kondo Hidetoshi Onodera Keikichi Tamaru Deartment of Electronics Faculty of Engineering, Kyoto University Kyoto 66-1, JAPAN Tel: +81-7-73-313

More information

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces

Wavelet Based Statistical Adapted Local Binary Patterns for Recognizing Avatar Faces Wavelet Based Statistical Adated Local Binary atterns for Recognizing Avatar Faces Abdallah A. Mohamed 1, 2 and Roman V. Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville,

More information

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans

A DEA-bases Approach for Multi-objective Design of Attribute Acceptance Sampling Plans Available online at htt://ijdea.srbiau.ac.ir Int. J. Data Enveloment Analysis (ISSN 2345-458X) Vol.5, No.2, Year 2017 Article ID IJDEA-00422, 12 ages Research Article International Journal of Data Enveloment

More information

Equality-Based Translation Validator for LLVM

Equality-Based Translation Validator for LLVM Equality-Based Translation Validator for LLVM Michael Ste, Ross Tate, and Sorin Lerner University of California, San Diego {mste,rtate,lerner@cs.ucsd.edu Abstract. We udated our Peggy tool, reviously resented

More information

Single character type identification

Single character type identification Single character tye identification Yefeng Zheng*, Changsong Liu, Xiaoqing Ding Deartment of Electronic Engineering, Tsinghua University Beijing 100084, P.R. China ABSTRACT Different character recognition

More information

A Measurement Study of Internet Bottlenecks

A Measurement Study of Internet Bottlenecks A Measurement Study of Internet Bottlenecks Ningning Hu, Li (Erran) Li y, Zhuoqing Morley Mao z, Peter Steenkiste and Jia Wang x Carnegie Mellon University, Email: fhnn, rsg@cs.cmu.edu y Bell Laboratories,

More information

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes

Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Fuzzy Logic and ANFIS based Image Centroid Tracking and Filtering Schemes Parimala, A., Asstt. Prof., Det. of Telecommunication, MSRIT; Jain University Research Scholar, Bangalore. Raol, J. R., Prof. Emeritus,

More information

Submission. Verifying Properties Using Sequential ATPG

Submission. Verifying Properties Using Sequential ATPG Verifying Proerties Using Sequential ATPG Jacob A. Abraham and Vivekananda M. Vedula Comuter Engineering Research Center The University of Texas at Austin Austin, TX 78712 jaa, vivek @cerc.utexas.edu Daniel

More information

10. Parallel Methods for Data Sorting

10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting 10. Parallel Methods for Data Sorting... 1 10.1. Parallelizing Princiles... 10.. Scaling Parallel Comutations... 10.3. Bubble Sort...3 10.3.1. Sequential Algorithm...3

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Distrib. Comut. 71 (2011) 288 301 Contents lists available at ScienceDirect J. Parallel Distrib. Comut. journal homeage: www.elsevier.com/locate/jdc Quality of security adatation in arallel

More information

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU

A Morphological LiDAR Points Cloud Filtering Method based on GPGPU A Morhological LiDAR Points Cloud Filtering Method based on GPGPU Shuo Li 1, Hui Wang 1, Qiuhe Ma 1 and Xuan Zha 2 1 Zhengzhou Institute of Surveying & Maing, No.66, Longhai Middle Road, Zhengzhou, China

More information

Chapter 8: Adaptive Networks

Chapter 8: Adaptive Networks Chater : Adative Networks Introduction (.1) Architecture (.2) Backroagation for Feedforward Networks (.3) Jyh-Shing Roger Jang et al., Neuro-Fuzzy and Soft Comuting: A Comutational Aroach to Learning and

More information

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model

Ad Hoc Networks. Latency-minimizing data aggregation in wireless sensor networks under physical interference model Ad Hoc Networks (4) 5 68 Contents lists available at SciVerse ScienceDirect Ad Hoc Networks journal homeage: www.elsevier.com/locate/adhoc Latency-minimizing data aggregation in wireless sensor networks

More information

Efficient Parallel Hierarchical Clustering

Efficient Parallel Hierarchical Clustering Efficient Parallel Hierarchical Clustering Manoranjan Dash 1,SimonaPetrutiu, and Peter Scheuermann 1 Deartment of Information Systems, School of Comuter Engineering, Nanyang Technological University, Singaore

More information

Argo Programming Guide

Argo Programming Guide Argo Programming Guide Evangelia Kasaaki, asmus Bo Sørensen February 9, 2015 Coyright 2014 Technical University of Denmark This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International

More information

Privacy Preserving Moving KNN Queries

Privacy Preserving Moving KNN Queries Privacy Preserving Moving KNN Queries arxiv:4.76v [cs.db] 4 Ar Tanzima Hashem Lars Kulik Rui Zhang National ICT Australia, Deartment of Comuter Science and Software Engineering University of Melbourne,

More information

A joint multi-layer planning algorithm for IP over flexible optical networks

A joint multi-layer planning algorithm for IP over flexible optical networks A joint multi-layer lanning algorithm for IP over flexible otical networks Vasileios Gkamas, Konstantinos Christodoulooulos, Emmanouel Varvarigos Comuter Engineering and Informatics Deartment, University

More information

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data

Efficient Processing of Top-k Dominating Queries on Multi-Dimensional Data Efficient Processing of To-k Dominating Queries on Multi-Dimensional Data Man Lung Yiu Deartment of Comuter Science Aalborg University DK-922 Aalborg, Denmark mly@cs.aau.dk Nikos Mamoulis Deartment of

More information

Patterned Wafer Segmentation

Patterned Wafer Segmentation atterned Wafer Segmentation ierrick Bourgeat ab, Fabrice Meriaudeau b, Kenneth W. Tobin a, atrick Gorria b a Oak Ridge National Laboratory,.O.Box 2008, Oak Ridge, TN 37831-6011, USA b Le2i Laboratory Univ.of

More information

Grouping of Patches in Progressive Radiosity

Grouping of Patches in Progressive Radiosity Grouing of Patches in Progressive Radiosity Arjan J.F. Kok * Abstract The radiosity method can be imroved by (adatively) grouing small neighboring atches into grous. Comutations normally done for searate

More information

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems

A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems A Parallel Algorithm for Constructing Obstacle-Avoiding Rectilinear Steiner Minimal Trees on Multi-Core Systems Cheng-Yuan Chang and I-Lun Tseng Deartment of Comuter Science and Engineering Yuan Ze University,

More information

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways

QSRED, An Algorithm To Solve The Mismatch Between The Microscopic and Macroscopic Behavior of RED Gateways IJCSNS International Journal of Comuter Science Network Security, VOL.10 No.11, November 2010 63 QSRED, An Algorim To Solve The Mismatch Between The Microscoic Macroscoic Behavior of RED Gateways Nabhan

More information

A Petri net-based Approach to QoS-aware Configuration for Web Services

A Petri net-based Approach to QoS-aware Configuration for Web Services A Petri net-based Aroach to QoS-aware Configuration for Web s PengCheng Xiong, YuShun Fan and MengChu Zhou, Fellow, IEEE Abstract With the develoment of enterrise-wide and cross-enterrise alication integration

More information

Sage Document Management Version 17.1

Sage Document Management Version 17.1 Sage Document Management Version 17.1 User's Guide This is a ublication of Sage Software, Inc. 2017 The Sage Grou lc or its licensors. All rights reserved. Sage, Sage logos, and Sage roduct and service

More information

Selecting Discriminative Binary Patterns for a Local Feature

Selecting Discriminative Binary Patterns for a Local Feature BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 3 Sofia 015 rint ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-015-0044 Selecting Discriminative Binary atterns

More information

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1

Bayesian Oil Spill Segmentation of SAR Images via Graph Cuts 1 Bayesian Oil Sill Segmentation of SAR Images via Grah Cuts 1 Sónia Pelizzari and José M. Bioucas-Dias Instituto de Telecomunicações, I.S.T., TULisbon,Lisboa, Portugal sonia@lx.it.t, bioucas@lx.it.t Abstract.

More information

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks

The Scalability and Performance of Common Vector Solution to Generalized Label Continuity Constraint in Hybrid Optical/Packet Networks The Scalability and Performance of Common Vector Solution to Generalized abel Continuity Constraint in Hybrid Otical/Pacet etwors Shujia Gong and Ban Jabbari {sgong, bjabbari}@gmuedu George Mason University

More information

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip

A Metaheuristic Scheduler for Time Division Multiplexed Network-on-Chip Downloaded from orbit.dtu.dk on: Jan 25, 2019 A Metaheuristic Scheduler for Time Division Multilexed Network-on-Chi Sørensen, Rasmus Bo; Sarsø, Jens; Pedersen, Mark Ruvald; Højgaard, Jasur Publication

More information

CS 470 Spring Mike Lam, Professor. Performance Analysis

CS 470 Spring Mike Lam, Professor. Performance Analysis CS 470 Sring 2018 Mike Lam, Professor Performance Analysis Performance analysis Why do we arallelize our rograms? Performance analysis Why do we arallelize our rograms? So that they run faster! Performance

More information

Directed File Transfer Scheduling

Directed File Transfer Scheduling Directed File Transfer Scheduling Weizhen Mao Deartment of Comuter Science The College of William and Mary Williamsburg, Virginia 387-8795 wm@cs.wm.edu Abstract The file transfer scheduling roblem was

More information

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS

EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS EDGE: A ROUTING ALGORITHM FOR MAXIMIZING THROUGHPUT AND MINIMIZING DELAY IN WIRELESS SENSOR NETWORKS Shuang Li, Alvin Lim, Santosh Kulkarni and Cong Liu Auburn University, Comuter Science and Software

More information

Improved Image Super-Resolution by Support Vector Regression

Improved Image Super-Resolution by Support Vector Regression Proceedings of International Joint Conference on Neural Networks, San Jose, California, USA, July 3 August 5, 0 Imroved Image Suer-Resolution by Suort Vector Regression Le An and Bir Bhanu Abstract Suort

More information

Fuzzy Logic Controller of Random Early Detection based on Average Queue Length and Packet Loss Rate

Fuzzy Logic Controller of Random Early Detection based on Average Queue Length and Packet Loss Rate Fuzzy Logic Controller of Random Early etection based on Average Queue Length and acket Loss Rate Hussein Abdel-jaber, 2 Mohamed Mahafzah, 2 Fadi Thabtah, Mike Woodward eartment of Comuting, University

More information

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern

Face Recognition Based on Wavelet Transform and Adaptive Local Binary Pattern Face Recognition Based on Wavelet Transform and Adative Local Binary Pattern Abdallah Mohamed 1,2, and Roman Yamolskiy 1 1 Comuter Engineering and Comuter Science, University of Louisville, Louisville,

More information

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density

Tracking Multiple Targets Using a Particle Filter Representation of the Joint Multitarget Probability Density Tracing Multile Targets Using a Particle Filter Reresentation of the Joint Multitarget Probability Density Chris Kreucher, Keith Kastella, Alfred Hero This wor was suorted by United States Air Force contract

More information

Hardening IPv6 Network Devices

Hardening IPv6 Network Devices Hardening IPv6 Network Devices ISP Workshos These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (htt://creativecommons.org/licenses/by-nc/4.0/) Last

More information

Improving Trust Estimates in Planning Domains with Rare Failure Events

Improving Trust Estimates in Planning Domains with Rare Failure Events Imroving Trust Estimates in Planning Domains with Rare Failure Events Colin M. Potts and Kurt D. Krebsbach Det. of Mathematics and Comuter Science Lawrence University Aleton, Wisconsin 54911 USA {colin.m.otts,

More information

Modeling Reliable Broadcast of Data Buffer over Wireless Networks

Modeling Reliable Broadcast of Data Buffer over Wireless Networks JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 3, 799-810 (016) Short Paer Modeling Reliable Broadcast of Data Buffer over Wireless Networs Deartment of Comuter Engineering Yeditee University Kayışdağı,

More information

Model-Based Annotation of Online Handwritten Datasets

Model-Based Annotation of Online Handwritten Datasets Model-Based Annotation of Online Handwritten Datasets Anand Kumar, A. Balasubramanian, Anoo Namboodiri and C.V. Jawahar Center for Visual Information Technology, International Institute of Information

More information

Support Vector Machines for Face Authentication

Support Vector Machines for Face Authentication Suort Vector Machines for Face Authentication K Jonsson 1 2, J Kittler 1,YPLi 1 and J Matas 1 2 1 CVSSP, University of Surrey Guildford, Surrey GU2 5XH, United Kingdom 2 CMP, Czech Technical University

More information

Skip List Based Authenticated Data Structure in DAS Paradigm

Skip List Based Authenticated Data Structure in DAS Paradigm 009 Eighth International Conference on Grid and Cooerative Comuting Ski List Based Authenticated Data Structure in DAS Paradigm Jieing Wang,, Xiaoyong Du,. Key Laboratory of Data Engineering and Knowledge

More information

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching

Implementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Imlementation of Evolvable Fuzzy Hardware for Packet Scheduling Through Online Context Switching Ju Hui Li, eng Hiot Lim and Qi Cao School of EEE, Block S Nanyang Technological University Singaore 639798

More information

Comparative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture

Comparative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture Journal of Communication and Comuter 9 (2012) 1383-1394 D DAVID PUBLISHING Comarative Evaluation QoS of FTP over LEO and GEO Satellite Networks with Diffserv Architecture Lukman Audah 1, Zhili Sun 2 and

More information

Performance Analysis of IEEE

Performance Analysis of IEEE Performance Analysis of IEEE 8. Deartment of Electrical and Comuter Engineering Rutgers University, Piscataway, NJ 8854 Abstract. Introduction Existing work includes [Bianchi ], and some roblems that we

More information

Source Coding and express these numbers in a binary system using M log

Source Coding and express these numbers in a binary system using M log Source Coding 30.1 Source Coding Introduction We have studied how to transmit digital bits over a radio channel. We also saw ways that we could code those bits to achieve error correction. Bandwidth is

More information

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks

PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks PacketScore: A Statistical Packet Filtering Scheme against Distributed Denial-of-Service Attacks Yoohwan Kim Wing Cheong Lau Mooi Choo Chuah H. Jonathan Chao School of Comuter Science Det. of Information

More information

Figure 8.1: Home age taken from the examle health education site (htt:// Setember 14, 2001). 201

Figure 8.1: Home age taken from the examle health education site (htt://  Setember 14, 2001). 201 200 Chater 8 Alying the Web Interface Profiles: Examle Web Site Assessment 8.1 Introduction This chater describes the use of the rofiles develoed in Chater 6 to assess and imrove the quality of an examle

More information

An Indexing Framework for Structured P2P Systems

An Indexing Framework for Structured P2P Systems An Indexing Framework for Structured P2P Systems Adina Crainiceanu Prakash Linga Ashwin Machanavajjhala Johannes Gehrke Carl Lagoze Jayavel Shanmugasundaram Deartment of Comuter Science, Cornell University

More information

A Novel Iris Segmentation Method for Hand-Held Capture Device

A Novel Iris Segmentation Method for Hand-Held Capture Device A Novel Iris Segmentation Method for Hand-Held Cature Device XiaoFu He and PengFei Shi Institute of Image Processing and Pattern Recognition, Shanghai Jiao Tong University, Shanghai 200030, China {xfhe,

More information

Efficient stereo vision for obstacle detection and AGV Navigation

Efficient stereo vision for obstacle detection and AGV Navigation Efficient stereo vision for obstacle detection and AGV Navigation Rita Cucchiara, Emanuele Perini, Giuliano Pistoni Diartimento di Ingegneria dell informazione, University of Modena and Reggio Emilia,

More information

Introduction to Parallel Algorithms

Introduction to Parallel Algorithms CS 1762 Fall, 2011 1 Introduction to Parallel Algorithms Introduction to Parallel Algorithms ECE 1762 Algorithms and Data Structures Fall Semester, 2011 1 Preliminaries Since the early 1990s, there has

More information

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks

A Novel Implementation of TCP Vegas for Optical Burst Switched Networks A Novel Imlementation of TCP Vegas for Otical Burst Switched Networks Basem Shihada 1, Qiong Zhang, Pin-Han Ho 1, and Jason P. Jue 3 1 Deartment of Electrical and Comuter Engineering, University of Waterloo,

More information

Layered Switching for Networks on Chip

Layered Switching for Networks on Chip Layered Switching for Networks on Chi Zhonghai Lu zhonghai@kth.se Ming Liu mingliu@kth.se Royal Institute of Technology, Sweden Axel Jantsch axel@kth.se ABSTRACT We resent and evaluate a novel switching

More information

Application of Fuzzy X S Charts for Solder Paste Thickness

Application of Fuzzy X S Charts for Solder Paste Thickness Global Journal of Pure and Alied Mathematics ISSN 0973-1768 Volume 12 Number 5 (2016) 4299-4315 Research India Publications htt://wwwriublicationcom/gjamhtm Alication of Fuzzy X S Charts for Solder Paste

More information

Phase Transitions in Interconnection Networks with Finite Buffers

Phase Transitions in Interconnection Networks with Finite Buffers Abstract Phase Transitions in Interconnection Networks with Finite Buffers Yelena Rykalova Boston University rykalova@bu.edu Lev Levitin Boston University levitin@bu.edu This aer resents theoretical models

More information

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique

Parametric Optimization in WEDM of WC-Co Composite by Neuro-Genetic Technique Parametric Otimization in WEDM of WC-Co Comosite by Neuro-Genetic Technique P. Saha*, P. Saha, and S. K. Pal Abstract The resent work does a multi-objective otimization in wire electro-discharge machining

More information

Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack

Optimal Personalized Defense Strategy Against Man-In-The-Middle Attack Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence (AAAI-17) Otimal Personalized Defense Strategy Against Man-In-The-Middle Attack Xiaohong Li and Shuxin Li Jianye Hao and Zhiyong

More information

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol

Analytical Modelling and Message Delay Performance Evaluation of the IEEE MAC Protocol Analytical Modelling and Message Delay Performance Evaluation of the IEEE 8.6 MAC Protocol Luís F. M. de Moraes and Danielle Loes F. G. Vieira Laboratório de Redes de Alta Velocidade - Universidade Federal

More information

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN

PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN htt://dx.doi.org/10.5755/j01.eee.20.3.3951 ELEKRONIKA IR ELEKROENIKA, ISSN 1392-1215, VOL. 20, NO. 3, 2014 PA-NEMO: Proxy Mobile IPv6-aided Network Mobility Management Scheme for 6LoWPAN Ke Xiong 1, Yu

More information

Randomized algorithms: Two examples and Yao s Minimax Principle

Randomized algorithms: Two examples and Yao s Minimax Principle Randomized algorithms: Two examles and Yao s Minimax Princile Maximum Satisfiability Consider the roblem Maximum Satisfiability (MAX-SAT). Bring your knowledge u-to-date on the Satisfiability roblem. Maximum

More information

Multipoint Filtering with Local Polynomial Approximation and Range Guidance

Multipoint Filtering with Local Polynomial Approximation and Range Guidance Multioint Filtering with Local Polynomial Aroximation and Range Guidance Xiao Tan, Changming Sun, and Tuan D. Pham The University of New South Wales, Canberra, ACT 2600, Australia CSIRO Comutational Informatics,

More information

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION

A BICRITERION STEINER TREE PROBLEM ON GRAPH. Mirko VUJO[EVI], Milan STANOJEVI] 1. INTRODUCTION Yugoslav Journal of Oerations Research (00), umber, 5- A BICRITERIO STEIER TREE PROBLEM O GRAPH Mirko VUJO[EVI], Milan STAOJEVI] Laboratory for Oerational Research, Faculty of Organizational Sciences University

More information

Distributed Estimation from Relative Measurements in Sensor Networks

Distributed Estimation from Relative Measurements in Sensor Networks Distributed Estimation from Relative Measurements in Sensor Networks #Prabir Barooah and João P. Hesanha Abstract We consider the roblem of estimating vectorvalued variables from noisy relative measurements.

More information

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1

On Growth of Parallelism within Routers and Its Impact on Packet Reordering 1 On Growth of Parallelism within Routers and Its Imact on Reordering 1 A. A. Bare 1, A. P. Jayasumana, and N. M. Piratla 2 Deartment of Electrical & Comuter Engineering, Colorado State University, Fort

More information