Protection of Communication Infrastructures

Size: px
Start display at page:

Download "Protection of Communication Infrastructures"

Transcription

1 Protectio of Commuicatio Ifrastructures Chapter Itroductio Threats, Security Goals & Requiremets Threat Aalysis System Security Egieerig Course Objectives & Overview A Short Advertisemet Before We Begi... :o) There is a additioal course etitled Simulative Evaluatio of Protocol Fuctios (project semiar, SWS) which is desiged to give you a hads-o experiece with etwork protocol fuctios ad simulatio studies: Itroduces a simulatio eviromet ad lets you add protocol fuctioality Studied protocol fuctios: forwardig, routig, (iterface queues), coectio setup, error-, flow- ad cogestio cotrol Requires good programmig skills Kowledge of C++ is a asset (but ot a pre-requisite) Allows you to obtai i-depth kowledge of topics covered i Telematics I ad the techiques ad art of simulatio studies because afterwards you did it! :o) Itroductio ad iscriptio: ,5:00 6:00, Room Z 0

2 Example: Evaluatio of TCP Cogestio Cotrol Motivatio: A Chagig World Mobile commuicatio etworks ad ubiquitous availability of the global Iteret have already chaged dramatically the way we commuicate, coduct busiess, ad orgaize our society With curret research ad developmets i sesor etworks ad pervasive computig, we are eve creatig a ew etworked world However, the beefits associated with iformatio ad commuicatio techology imply ew vulerabilities Icreasig depedece of moder iformatio society o availability ad secure operatio of commuicatio services

3 What is a Threat i a Commuicatio Network? Abstract Defiitio: A threat i a commuicatio etwork is ay possible evet or sequece of actios that might lead to a violatio of oe or more security goals The actual realizatio of a threat is called a attack Examples: A hacker breakig ito a corporate computer Disclosure of s i trasit Someoe chagig fiacial accoutig data A hacker temporarily shuttig dow a website Someoe usig services or orderig goods i the ame of others... What are security goals? Security goals ca be defied: depedig o the applicatio eviromet, or i a more geeral, techical way 5 Security Goals Depedig o the Applicatio Eviromet Public Telecommuicatio Providers: Protect subscribers privacy Restrict access to admiistrative fuctios to authorized persoel Protect agaist service iterruptios Corporate / Private Networks: Protect corporate / idividual privacy Esure message autheticity Protect agaist service iterruptios All Networks: Prevet outside peetratios (who wats hackers?) Sometimes security goals are also called security objectives 6

4 Security Goals Techically Defied Cofidetiality: Data trasmitted or stored should oly be revealed to a iteded audiece Cofidetiality of etities is also referred to as aoymity Data Itegrity: It should be possible to detect ay modificatio of data This requires to be able to idetify the creator of some data Accoutability: It should be possible to idetify the etity resposible for ay commuicatio evet Cotrolled Access: Oly authorized etities should be able to access certai services or iformatio Availability: Services should be available ad fuctio correctly 7 Threats Techically Defied Masquerade: A etity claims to be aother etity Eavesdroppig: A etity reads iformatio it is ot iteded to read Authorizatio Violatio: A etity uses a service or resources it is ot iteded to use Loss or Modificatio of (trasmitted) Iformatio: Data is beig altered or destroyed Deial of Commuicatio Acts (Repudiatio): A etity falsely deies its participatio i a commuicatio act Forgery of Iformatio: A etity creates ew iformatio i the ame of aother etity Sabotage (Deial of Service): Ay actio that aims to reduce the availability ad / or correct fuctioig of services or systems 8

5 Threats ad Techical Security Goals Techical Security Goals Masquerade Eavesdroppig Authorisatio Violatio Cofidetiality x x x Geeral Threats Loss or Modificatio of (trasmitted) iformatio Deial of Commuicatio acts Forgery of Iformatio Data Itegrity x x x x Accoutability x x x x Sabotage (e.g. by overload) Availability x x x x Cotrolled Access x x x Threats are ofte combied i order to perform a attack! 9 Architectural View of our Object to be Protected Network Edsystem Edsystem 5 5 Applicatio 55 Trasport Network Network Data Lik Data Lik Physical Physical Commuicatio i ed Protocol Architectures 0

6 Security Aalysis of ed Protocol Architectures Edsystem (Iitiator) Network Edsystem (Respoder)??? Dimesio : At which iterface could a attack take place? Security Aalysis of ed Protocol Architectures? 55 Applicatio 55? Trasport? Network Network? Data Lik Data Lik? Physical Physical Dimesio : I which layer could a attack take place?

7 Systematic Threat Aalysis o the Message Level A systematic security aalysis of a layered protocol architecture has to cosider the followig attackig techiques: Passive attacks: Eavesdroppig Active attacks: Delay of PDUs (Protocol Data Uits) Replay of PDUs Deletio of PDUs Modificatio of PDUs Isertio of PDUs Successful lauch of oe of the above attacks requires: There are o detectable side effects to other commuicatios (coectios / coectioless trasmissios) There are o side effects to other PDUs of the same coectio / coectioless data trasmissio betwee the same etities Security Aalysis of Commuicatio Ifrastructures O the precedig slides, the aalysis was basically cocetrated o potetial attacks o the trasmissio of iformatio Of equal importace, however, are attacks agaist the systems, that are part of or makig use of a commuicatio etwork: Ed systems Routers Importat ifrastructure servers: DNS, , WWW, file servers, etc. We, therefore, have to exted our aalysis framework: Dimesio S.: Which system could be attacked? Dimesio S.: Which compoet of the system is attacked (OS, protocol stack, applicatio process, etc.)? However, this itroduces a ew difficulty: A active etity (system) offers much more differet attackig opportuities tha a passive data object (like a PDU) It is, therefore, much harder to coduct a systematical aalysis

8 Towards Systematic Threat Aalysis Oe ot very systematic approach is producig of arbitrary threat lists by ay ad-hoc braistormig method Example: Hospital Iformatio System Corruptio of patiet medical iformatio Corruptio of billig iformatio Disclosure of cofidetial patiet iformatio Compromise of iteral schedules Uavailability of cofidetial patiet iformatio... Drawbacks of this approach: Questioable completeess of idetified threats Lack of ratioale for idetified threats other tha experiece Potetial icosistecies (e.g. disclosure vs. uavailability of cofidetial patiet iformatio i the example above) 5 Threat Trees: Oe Systematic Threat Aalysis Approach Defiitio: threat tree A threat tree is a tree with: odes describig threats at differet levels of abstractios, ad subtrees refiig the threat of the ode they are rooted at, where the child odes of oe ode give a complete refiemet of the threat represeted by the paret ode Techique for establishig threat trees: Start with a geeral abstract descriptio of the complete set of threats that exist for a give system (e.g. security of system X compromised ) Iteratively itroduce detail by gradually refiig the descriptio with care Each itroduced ode may itself become the root of a subtree further describig the threat represeted by the ode Evetually, each leaf ode of the tree provides a descriptio of a threat that ca be used for a (less arbitrary) threat list The mai idea of this techique is to postpoe the creatio of (arbitrary) treat lists as much as possible 6

9 Example: A Hospital Iformatio System Threat Tree Hospital System Threats Patiet Medical Iformatio No Patiet Medical Iformatio Life Threateig No Life Threateig Billig No Billig Disclosure Itegrity Deial of Service... It is importat that at each level of refiemet the child odes of a ode maitai demostrable completeess so that oe ca be cofidet that othig has bee missed (source: [Amo9]) 7 Iferrig Composed Threat i Threat Trees The child odes of oe ode ca actually be i differet relatios to their paret ode with the two most commo relatios beig: Disjuctio Cojuctio Threat Threat OR AND Subthreat Subthreat Subthreat Subthreat These relatios ca be used to ifer composed threat: Augmet odes with effort estimatios (e.g. easy, moderate, high) Ifer effort of a OR-related composed threat as the lowest effort value of its child odes (the attacker will most likely take the easy way...) For AND-related composed threats, the highest effort is iferred 8

10 Supportig System Security Egieerig with Threat Trees Whe augmeted with appropriate attributes (e.g. estimated criticality ad attacker effort for idividual threats), threat trees ca help to gai isight where to sped resources to decrease the overall system s vulerability: Threat OR Threat OR Subthreat A Criticality = Effort = Subthreat B Criticality = 6 Effort = Subthreat A Criticality = Effort = Subthreat B Criticality = 6 Effort = Risk = Risk = 6 Risk = Risk = The secod threat tree re-evaluates risk after some protective measure has bee take to icrease the attacker s effort for subthreat B I the above example, risk is assessed with the followig formula: Risk = Criticality / Effort 9 A High Level System Security Egieerig Process Specify system architecture: Idetify compoets ad iterrelatios Idetify threats, vulerabilities ad attack techiques: The threat tree techique provides help for this step Estimate compoet risks by addig attributes to the threat tree: However, removig subjectivity from iitial assessmets is ofte impossible ad other attributes tha criticality ad effort (e.g. risk of detectio) might have to be cosidered as well Prioritize vulerabilities: Takig ito accout the compoets importace Idetify ad istall safeguards: Apply protectio techiques to couter high priority vulerabilities Perform potetial iteratios of this process Re-assess risks of the modified system ad decide, if more iteratios are required 0

11 A High Level Model for Iteret-Based IT-Ifrastructure Private Networks Public Iteret Mobile Commuicatio Networks... Access Network Web-Server Network Maagemet DNS Server... ISP Networks Support Ifrastructure A High Level Threat Tree for Iteret-Based IT-Ifrastructure

12 Couterig Attacks: Three Priciple Classes of Actio Prevetio: All measures take i order to avert that a attacker succeeds i realizig a threat Examples: Cryptographic measures: ecryptio, computatio of modificatio detectio codes, ruig autheticatio protocols, etc. Firewall techiques: packet filterig, service proxyig, etc. Prevetive measures are by defiitio take before a attack takes place Detectio: All measures take to recogize a attack while or after it occurred Examples: Reactio: Recordig ad aalysis of audit trails O-the-fly traffic moitorig All measures take i order react to ogoig or past attacks Safeguards Agaist Iformatio Security Threats Physical Security: Locks or other physical access cotrol Tamper-proofig of sesitive equipmet Evirometal cotrols Persoel Security: Idetificatio of positio sesitivity Employee screeig processes Security traiig ad awareess Admiistrative Security: Cotrollig import of foreig software Procedures for ivestigatig security breaches Reviewig audit trails Reviewig accoutability cotrols Emaatios Security: Radio Frequecy ad other electromagetic emaatios cotrols Referred to as TEMPEST protectio

13 Safeguards Agaist Iformatio Security Threats Media Security: Safeguardig storage of iformatio Cotrollig markig, reproductio ad destructio of sesitive iformatio Esurig that media cotaiig sesitive iformatio are destroyed securely Scaig media for viruses Lifecycle Cotrols: Trusted system desig, implemetatio, evaluatio ad edorsemet Programmig stadards ad cotrols Documetatio cotrols Computer / System Security: Protectio of iformatio while stored / processed i a system Protectio of the computig devices / systems themselves Commuicatios Security: Protectio of iformatio durig trasport from oe system to aother Protectio of the commuicatio ifrastructure itself 5 Commuicatios Security: Some Termiology Security Service: A abstract service that seeks to esure a specific security property A security service ca be realised with the help of cryptographic algorithms ad protocols as well as with covetioal meas: Oe ca keep a electroic documet o a floppy disk cofidetial by storig it o the disk i a ecrypted format as well as lockig away the disk i a safe Usually a combiatio of cryptographic ad other meas is most effective Cryptographic Algorithm: A mathematical trasformatio of iput data (e.g. data, key) to output data Cryptographic algorithms are used i cryptographic protocols Cryptographic Protocol: A series of steps ad message exchages betwee multiple etities i order to achieve a specific security objective 6

14 Security Services Overview Autheticatio The most fudametal security service which esures, that a etity has i fact the idetity it claims to have Itegrity I some kid, the small brother of the autheticatio service, as it esures, that data created by specific etities may ot be modified without detectio Cofidetiality The most popular security service, esurig the secrecy of protected data Access Cotrol Cotrols that each idetity accesses oly those services ad iformatio it is etitled to No Repudiatio Protects agaist that etities participatig i a commuicatio exchage ca later falsely dey that the exchage occurred 7 Course Objectives The course Network Security (held every fall term) focuses o: Itroductio to iformatio security techology (icl. cryptology) Network security protocols to esure: Etity autheticatio Data cofidetiality & data itegrity Some established techiques to realize access cotrol i etworks This course takes a complemetary view o the followig aspects: Threats to ad measures for esurig availability Threats ad measures cocerig systems (beyod pure etwork security protocols which are more targetig trasmissio security) Measures for itrusio detectio ad respose Additioally, some case studies to be performed by studets (talks, potetially based o experimetatio) shall: provide backgroud ad guidelies o securig specific applicatios add a practical perspective to the gathered coceptual kowledge 8

15 Prelimiary Course Overview. Itroductio. Security Aware System Desig ad Implemetatio. Deial-of-Service Attacks ad Coutermeasures. Routig 5. DNS Security 6. Iteret Firewalls 7. Itrusio Detectio ad Respose 8. Security i Sesor Networks (Challeges i Costrait Eviromets) 9. Securig Group Commuicatios (if time permits) 0. Joit Discussio: Ope source vs. proprietary software: will ope source lead to more secure systems? 9 Geeral Course Bibliography [Amo9] E. Amoroso. Fudametals of Computer Security Techology. Pretice Hall. 99. [Amo99] E. Amoroso. Itrusio Detectio. Itrusio.Net Books, 999. [Cha95] Bret Chapma ad Elizabeth Zwicky. Buildig Iteret Firewalls. O'Reilly, 995. [For9b] Warwick Ford. Computer Commuicatios Security - Priciples, Stadard Protocols ad Techiques. Pretice Hall. 99. [Gar96] Simso Garfikel ad Gee Spafford. Practical Iteret & Uix Security. O'Reilly, 996. [GW0] M.G. Graff, K.R. va Wyck. Secure Codig. O Reilly, 00 [NN0] S. Northcutt, J. Novak. Network Itrusio Detectio - A Aalyst s Hadbook. secod editio, New Riders, 00. [SR] G. Schäfer, M. Rossberg. Netzsicherheit - dpukt.verlag, 676 Seite, Gebude, 9,90 Euro, 0. [VM0] J. Viega, G. McGraw. Buildig Secure Software. Addiso-Wesley, 00. 0

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

1 Enterprise Modeler

1 Enterprise Modeler 1 Eterprise Modeler Itroductio I BaaERP, a Busiess Cotrol Model ad a Eterprise Structure Model for multi-site cofiguratios are itroduced. Eterprise Structure Model Busiess Cotrol Models Busiess Fuctio

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

How Deutsche Telekom protects customer data

How Deutsche Telekom protects customer data KEEPING THE CLOUD OF THINGS Secure How Deutsche Telekom protects customer data CotetS Maximum security with the Cloud of Thigs A secure start CONTENTS 1. THE CLOUD OF THINGS IT All starts with access 1.

More information

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods.

Software development of components for complex signal analysis on the example of adaptive recursive estimation methods. Software developmet of compoets for complex sigal aalysis o the example of adaptive recursive estimatio methods. SIMON BOYMANN, RALPH MASCHOTTA, SILKE LEHMANN, DUNJA STEUER Istitute of Biomedical Egieerig

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

The CCITT Communication Protocol for Videophone Teleconferencing Equipment

The CCITT Communication Protocol for Videophone Teleconferencing Equipment The CCITT Commuicatio Protocol for Videophoe Telecoferecig Equipmet Ralf Hiz Daimler-Bez AG Istitut ffir Iformatiostechik Tcl. 0731 / 505-21 32 Fax. 0731 / 505-41 04 Wilhelm-R.uge-Str. 11 7900 Ulm Abstract

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Goals of this Lecture Activity Diagram Example

Goals of this Lecture Activity Diagram Example Goals of this Lecture Activity Diagram Example Object-Orieted Aalysis ad Desig - Fall 998 Preset a example activity diagram Ð Relate to requiremets, use cases, ad class diagrams Also, respod to a questio

More information

CA Top Secret r14 for z/os

CA Top Secret r14 for z/os PRODUCT SHEET: CA TOP SECRET FOR z/os CA Top Secret r14 for z/os CA Top Secret for z/os (CA Top Secret) provides iovative ad comprehesive security for your busiess trasactio eviromets icludig z/os, Maiframe

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Baan Tools User Management

Baan Tools User Management Baa Tools User Maagemet Module Procedure UP008A US Documetiformatio Documet Documet code : UP008A US Documet group : User Documetatio Documet title : User Maagemet Applicatio/Package : Baa Tools Editio

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

System and Software Architecture Description (SSAD)

System and Software Architecture Description (SSAD) System ad Software Architecture Descriptio (SSAD) Diabetes Health Platform Team #6 Jasmie Berry (Cliet) Veerav Naidu (Project Maager) Mukai Nog (Architect) Steve South (IV&V) Vijaya Prabhakara (Quality

More information

Customer Portal Quick Reference User Guide

Customer Portal Quick Reference User Guide Customer Portal Quick Referece User Guide Overview This user guide is iteded for FM Approvals customers usig the Approval Iformatio Maagemet (AIM) customer portal to track their active projects. AIM is

More information

Firewall and IDS. TELE3119: Week8

Firewall and IDS. TELE3119: Week8 Firewall ad IDS TELE3119: Week8 Outlie Firewalls Itrusio Detectio Systems (IDSs) Itrusio Prevetio Systems (IPSs) 8-2 Example Attacks Disclosure, modificatio, ad destructio of data Compromise a host ad

More information

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III

GE FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III GE2112 - FUNDAMENTALS OF COMPUTING AND PROGRAMMING UNIT III PROBLEM SOLVING AND OFFICE APPLICATION SOFTWARE Plaig the Computer Program Purpose Algorithm Flow Charts Pseudocode -Applicatio Software Packages-

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Τεχνολογία Λογισμικού

Τεχνολογία Λογισμικού ΕΘΝΙΚΟ ΜΕΤΣΟΒΙΟ ΠΟΛΥΤΕΧΝΕΙΟ Σχολή Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών Τεχνολογία Λογισμικού, 7ο/9ο εξάμηνο 2018-2019 Τεχνολογία Λογισμικού Ν.Παπασπύρου, Αν.Καθ. ΣΗΜΜΥ, ickie@softlab.tua,gr

More information

Modern Systems Analysis and Design Seventh Edition

Modern Systems Analysis and Design Seventh Edition Moder Systems Aalysis ad Desig Seveth Editio Jeffrey A. Hoffer Joey F. George Joseph S. Valacich Desigig Databases Learig Objectives ü Cocisely defie each of the followig key database desig terms: relatio,

More information

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO

SERIAL COMMUNICATION INTERFACE FOR ESA ESTRO Bulleti E708 rev0 7/06/0 SERIAL COMMUNICATION INTERFACE FOR - SERIES FEATURES Supply voltage: 90 40vac Supply frequecy: 40 70 Hz Max. absorbtio: 40W Operatig temperature: 0 50 C Storage temperature: -0

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Service Oriented Enterprise Architecture and Service Oriented Enterprise

Service Oriented Enterprise Architecture and Service Oriented Enterprise Approved for Public Release Distributio Ulimited Case Number: 09-2786 The 23 rd Ope Group Eterprise Practitioers Coferece Service Orieted Eterprise ad Service Orieted Eterprise Ya Zhao, PhD Pricipal, MITRE

More information

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software

Structuring Redundancy for Fault Tolerance. CSE 598D: Fault Tolerant Software Structurig Redudacy for Fault Tolerace CSE 598D: Fault Tolerat Software What do we wat to achieve? Versios Damage Assessmet Versio 1 Error Detectio Iputs Versio 2 Voter Outputs State Restoratio Cotiued

More information

Data Protection: Your Choice Is Simple PARTNER LOGO

Data Protection: Your Choice Is Simple PARTNER LOGO Data Protectio: Your Choice Is Simple PARTNER LOGO Is Your Data Truly Protected? The growth, value ad mobility of data are placig icreasig pressure o orgaizatios. IT must esure assets are properly protected

More information

In this chapter, you learn the concepts and terminology of databases and

In this chapter, you learn the concepts and terminology of databases and A Itroductio to Database Developmet I this chapter, you lear the cocepts ad termiology of databases ad how to desig the tables that your forms ad reports will use. Fially, you build the actual tables used

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998

% Sun Logo for. X3T10/95-229, Revision 0. April 18, 1998 Su Microsystems, Ic. 2550 Garcia Aveue Moutai View, CA 94045 415 960-1300 X3T10/95-229, Revisio 0 April 18, 1998 % Su Logo for Joh Lohmeyer Chairperso, X3T10 Symbios Logic Ic. 1635 Aeroplaza Drive Colorado

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

CORD Test Project in Okinawa Open Laboratory

CORD Test Project in Okinawa Open Laboratory CORD Test Project i Okiawa Ope Laboratory Fukumasa Morifuji NTT Commuicatios Trasform your busiess, trasced expectatios with our techologically advaced solutios. Ageda VxF platform i NTT Commuicatios Expectatio

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 1 Computers ad Programs 1 Objectives To uderstad the respective roles of hardware ad software i a computig system. To lear what computer scietists

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

n Explore virtualization concepts n Become familiar with cloud concepts

n Explore virtualization concepts n Become familiar with cloud concepts Chapter Objectives Explore virtualizatio cocepts Become familiar with cloud cocepts Chapter #15: Architecture ad Desig 2 Hypervisor Virtualizatio ad cloud services are becomig commo eterprise tools to

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Addressing SaaS Security

Addressing SaaS Security White Paper Addressig SaaS Security by Padma Krisha O V E R C O M I N G L I M I T S This paper ide fies some of the best prac ces ad desig priciples followed by Triget i developig SaaS applica os to address

More information

Outline n Introduction n Background o Distributed DBMS Architecture

Outline n Introduction n Background o Distributed DBMS Architecture Outlie Itroductio Backgroud o Distributed DBMS Architecture Datalogical Architecture Implemetatio Alteratives Compoet Architecture o Distributed DBMS Architecture o Distributed Desig o Sematic Data Cotrol

More information

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk

n Learn how resiliency strategies reduce risk n Discover automation strategies to reduce risk Chapter Objectives Lear how resiliecy strategies reduce risk Discover automatio strategies to reduce risk Chapter #16: Architecture ad Desig Resiliecy ad Automatio Strategies 2 Automatio/Scriptig Resiliet

More information

Oracle Process Manufacturing

Oracle Process Manufacturing Oracle Process Maufacturig Product Developmet Recipe API User s Guide Release 11i Part No. A97387-04 Jauary 2005 Oracle Process Maufacturig Product Developmet Recipe API User s Guide, Release 11i Part

More information

Mindmapping: A General Purpose (Test) Planning Tool

Mindmapping: A General Purpose (Test) Planning Tool W8 Test Strategy, Plaig, Metrics Wedesday, May 2d, 2018 1:45 PM Midmappig: A Geeral Purpose (Test) Plaig Tool Preseted by: Bob Gale Zeergy Techologies Brought to you by: 350 Corporate Way, Suite 400, Orage

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

Goals of the Lecture UML Implementation Diagrams

Goals of the Lecture UML Implementation Diagrams Goals of the Lecture UML Implemetatio Diagrams Object-Orieted Aalysis ad Desig - Fall 1998 Preset UML Diagrams useful for implemetatio Provide examples Next Lecture Ð A variety of topics o mappig from

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance

Design and Implementation of Integrated Testing Tool based on Metrics and Quality Assurance Iteratioal Joural of Applied Egieerig Research ISSN 0973-4562 Volume 9, Number 21 (2014) pp. 10463-10472 Research Idia Publicatios http://www.ripublicatio.com Desig ad Implemetatio of Itegrated Testig

More information

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings

Chapter 4 Threads. Operating Systems: Internals and Design Principles. Ninth Edition By William Stallings Operatig Systems: Iterals ad Desig Priciples Chapter 4 Threads Nith Editio By William Stalligs Processes ad Threads Resource Owership Process icludes a virtual address space to hold the process image The

More information

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002

ICS Regent. Communications Modules. Module Operation. RS-232, RS-422 and RS-485 (T3150A) PD-6002 ICS Reget Commuicatios Modules RS-232, RS-422 ad RS-485 (T3150A) Issue 1, March, 06 Commuicatios modules provide a serial commuicatios iterface betwee the cotroller ad exteral equipmet. Commuicatios modules

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2]

Traditional queuing behaviour in routers. Scheduling and queue management. Questions. Scheduling mechanisms. Scheduling [1] Scheduling [2] Traditioal queuig behaviour i routers Schedulig ad queue maagemet Data trasfer: datagrams: idividual packets o recogitio of flows coectioless: o sigallig Forwardig: based o per-datagram, forwardig table

More information

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control

EE 459/500 HDL Based Digital Design with Programmable Logic. Lecture 13 Control and Sequencing: Hardwired and Microprogrammed Control EE 459/500 HDL Based Digital Desig with Programmable Logic Lecture 13 Cotrol ad Sequecig: Hardwired ad Microprogrammed Cotrol Refereces: Chapter s 4,5 from textbook Chapter 7 of M.M. Mao ad C.R. Kime,

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

Fundamentals of Communication Networks

Fundamentals of Communication Networks Politecico di Milao Scuola di Igegeria Idustriale e dell Iformazioe Fudametals of Commuicatio Networks Alessadro Redodi Teacher o Alessadro Redodi o Office: Dip. di Elettroica, Iformazioe e Bioigegeria

More information

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager.

Term Project Report. This component works to detect gesture from the patient as a sign of emergency message and send it to the emergency manager. CS2310 Fial Project Loghao Li Term Project Report Itroductio I this project, I worked o expadig exercise 4. What I focused o is makig the real gesture recogizig sesor ad desig proper gestures ad recogizig

More information

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani

University of North Carolina at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS. Sravanthi Chalasani Uiversity of North Carolia at Charlotte ECGR-6185 ADVANCED EMBEDDED SYSTEMS SMART CARDS Overview Itroductio History of smart cards Types of smart cards Categories of smart cards Smart Card Stadards SLE4442

More information

Baan Finance Financial Statements

Baan Finance Financial Statements Baa Fiace Fiacial Statemets Module Procedure UP041A US Documetiformatio Documet Documet code : UP041A US Documet group : User Documetatio Documet title : Fiacial Statemets Applicatio/Package : Baa Fiace

More information

Trusted Design in FPGAs

Trusted Design in FPGAs Trusted Desig i FPGAs Mark Tehraipoor Itroductio to Hardware Security & Trust Uiversity of Florida 1 Outlie Itro to FPGA Architecture FPGA Overview Maufacturig Flow FPGA Security Attacks Defeses Curret

More information

Performance Plus Software Parameter Definitions

Performance Plus Software Parameter Definitions Performace Plus+ Software Parameter Defiitios/ Performace Plus Software Parameter Defiitios Chapma Techical Note-TG-5 paramete.doc ev-0-03 Performace Plus+ Software Parameter Defiitios/2 Backgroud ad Defiitios

More information

Cyber Risk Mitigation for Smart Cities

Cyber Risk Mitigation for Smart Cities Cyber Risk Mitigatio for Smart Cities Abstract Rapid growth i global populatio ad evolvig techological, macro-ecoomic, ad evirometal ladscapes have fueled widespread iterest i smart cities, which are,

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA

SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS. Tamil Nadu, INDIA ARTICLE SECURED OPTIMAL ROUTING BASED ON TRUST AND ENERGY MODEL IN WIRELESS SENSOR NETWORKS A Sethil Kumar 1, E Logashamugam 2 * 1 Research Scholar, Dept. of Electroics ad Commuicatio Egieerig, St. Peter

More information

Basic Design Principles

Basic Design Principles + Basic Desig Priciples + Assigmet 2: Your studet web site 1. Baer 2. Your ame 3. Your accout umber 4. A lik to aother web page, preferably oe useful to you i this class 5. A photo, preferably of you 6.

More information

Schema for the DCE Security Registry Server

Schema for the DCE Security Registry Server Schema for the Security egistry Server Versio Date: 0/20/00 For questios or commets cocerig this documet, sed a email ote to dce-ldap@opegroup.org or call Doa Skibbie at 52 838-3896. . Itroductio...3 2.

More information

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links

Secure Software Upload in an Intelligent Vehicle via Wireless Communication Links Secure Software Upload i a Itelliget Vehicle via Wireless Commuicatio Liks Syed Masud Mahmud, Member, IEEE, Shobhit Shaker, Studet Member, IEEE Iria Hossai, Studet Member, IEEE Abstract The demad for drive-by-wire,

More information

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1

Adaptive Graph Partitioning Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, and W. J. Dewar 1 1 Adaptive Graph Partitioig Wireless Protocol S. L. Ng 1, P. M. Geethakumari 1, S. Zhou 2, ad W. J. Dewar 1 1 School of Electrical Egieerig Uiversity of New South Wales, Australia 2 Divisio of Radiophysics

More information

CIS 121. Introduction to Trees

CIS 121. Introduction to Trees CIS 121 Itroductio to Trees 1 Tree ADT Tree defiitio q A tree is a set of odes which may be empty q If ot empty, the there is a distiguished ode r, called root ad zero or more o-empty subtrees T 1, T 2,

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation

Loop Emulation Service Protocols over ATM. Enea LES-SIG-Bricks is a complete implementation of the Loop Emulation eea les-sig-bricks 1 Loop Emulatio Service Protocols over ATM Eea LES-SIG-Bricks is a complete implemetatio of the Loop Emulatio Service usig AAL2 stadard (AF-VMOA-0145.000) protocols. Eea LES-SIG-Bricks

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms

Security and Communication. Ultimate. Because Intercom doesn t stop at the hardware level. Software Intercom Server for virtualised IT platforms Because Itercom does t stop at the hardware level by Commed Software Itercom Server for virtualised IT platforms Ready for VMware Ready for Hyper-V VoIP Ultimate availability Itercom Server as a app The

More information

SCAN INSPECT TRACK SOLVE

SCAN INSPECT TRACK SOLVE SCAN INSPECT TRACK SOLVE Sca. Ispect. Track. Solve. These simple words drive the complex solutios we provide for the challeges our customers face. Need to sca a code? Not a issue. Ispect a vial? No problem.

More information

Modeling a Software Architecture. Paolo Ciancarini

Modeling a Software Architecture. Paolo Ciancarini Modelig a Software Architecture Paolo Ciacarii Ageda Describig software architectures Architectural frameworks Models based o architectural laguages Models based o UML Mai architectural views 2 Why documet

More information

SRx. HD/SD Dual Input Diversity COFDM Receiver. Features. Options. Accessories. Applications

SRx. HD/SD Dual Input Diversity COFDM Receiver. Features. Options. Accessories. Applications HD/SD Dual Iput Diversity COFDM Receiver Features Dual iput maximum ratio combiig diversity receiver Umatched adjacet chael performace Superior broadcast grade video MPEG-4 Part-10/H.264 2 moo audio chaels

More information

Lecture 1: Introduction

Lecture 1: Introduction Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 21 Cocurrecy Cotrol Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Cocurrecy cotrol protocols Set of rules to guaratee

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 10. Defining Classes. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 10 Defiig Classes Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 10.1 Structures 10.2 Classes 10.3 Abstract Data Types 10.4 Itroductio to Iheritace Copyright 2015 Pearso Educatio,

More information

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015

Heaps. Presentation for use with the textbook Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, 2015 Presetatio for use with the textbook Algorithm Desig ad Applicatios, by M. T. Goodrich ad R. Tamassia, Wiley, 201 Heaps 201 Goodrich ad Tamassia xkcd. http://xkcd.com/83/. Tree. Used with permissio uder

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Using VTR Emulation on Avid Systems

Using VTR Emulation on Avid Systems Usig VTR Emulatio o Avid Systems VTR emulatio allows you to cotrol a sequece loaded i the Record moitor from a edit cotroller for playback i the edit room alog with other sources. I this sceario the edit

More information

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team

Security Solutions SALES GUIDE. for Connectivity Data Center Applications & Content. Your JUNIPER NETWORKS dedicated Sales Team Security Solutios for Coectivity Data Ceter Applicatios & Cotet Your JUNIPER NETWORKS dedicated Sales Team tel. 07824 305561 Eklis.Miah@westcosecurity.co.uk www.westcosecurity.co.uk SALES GUIDE Juiper

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information