CRESTBOT: A New Family of Resilient Botnets

Size: px
Start display at page:

Download "CRESTBOT: A New Family of Resilient Botnets"

Transcription

1 CRESTBOT: A New Family of Resilient Botnets Duc T. Ha, Hung Q. Ngo, Madhusudhanan Chandasekaan Depatment of Compute Science and Engineeing State Univesity of New Yok at Buffalo Amhest, NY 1426, USA {ducha,hungngo,mc79}@buffalo.edu Abstact We show that it is possible to design botnet stuctues called CRESTBOT based on extacto gaphs which ae highly esilient to command-and-contol (C&C) take-downs, yet do not equie significant changes to existing botnet designs and codes, and do not suffe fom the implementation complexity of P2P-based and hybid stuctues. The UDP family of CRESTBOT is shown to be able to send commands fom the botmaste much faste than taditional botnet. Ou analyses ae validated by extensive expeiments on Emulab. Ou esults pove that cuent C&C-takedown solutions ae ineffective against well designed botnets such as ou CRESTBOT. Secondly, shot UDP commands can be as eliable as TCP commands with much less time consumption. Thid, extemely fast command issuing is possible, which at fist glance might seem beneficial to the attacke; howeve, it might also be of use fo the good guys when cetain ace conditions ae desied such as softwae patching o quick bot takedowns. Index Tems CRESTBOT, bot, botnet, esiliency, expande I. INTRODUCTION Bot netwoks (botnets) ae an extemely seious poblem of today s netwoking infastuctue, economy, and national secuity. These netwoks of lage numbes of compomised machines (bots) ae used by attackes (botmastes) to pofit fom DDoS attacks, spam elaying, identity theft, click faud, malwaes, etc. Industy estimates have suggested that botnets have become eve-so pevalent involving moe than 1 million Intenet hosts [1] Most cuent botnets employ a hieachical design with the botmaste contolling the compomised machines using Intenet Relay Chat (IRC). Commands ae issued by the botmaste to a small numbe of specially designated nodes called command-and-contol (C&C) nodes whee they ae elayed to the emaining bots. The botmaste s identity is thus hidden behind a laye of C&C, making souce-taceback vey difficult. Recent defense solutions have focused on C&C node detection and take-down to disupt and limit botnets scope. A C&C node taken down means all the bots subscibing to it ae puned, theeby educing the botnet s size and capacity. Moeove, as each C&C node seves a elatively lage numbe of bots, it is possible to tack them using honeypots and DNSbased analysis. Consequently, sophisticated botnet vaiants have ecently emeged which adopt pee-to-pee (P2P) stuctue using some well known P2P-based potocol such as Kademlia [2], Gnutella, etc. Unlike C&C-based botnets, P2P-based botnets ae moe esilient to node failues. Compomising a node only gives out its neighbos. Though effective, diect adoption of P2P-based botnets is not staightfowad due to the complex and esouce-demanding natue of P2P potocols. A hybid P2P-based botnet has also been poposed [3] which daws on the advantages of P2P-based potocol while having C&C like nodes to assist in faste and efficient command popagation. Howeve, implementation of such a hybid appoach is athe unconventional, equiing significant changes to the existing botnet design and code. We will show that it is possible to design botnet stuctues which ae highly esilient to C&C take-downs, yet do not equie significant changes to existing botnet designs and codes, do not suffe fom the implementation complexity of P2P-based and hybid stuctues. Ou poposed stuctue is named CRESTBOT, fo C&C-based RESilienT Botnet. Resiliency often equies some degee of edundancy, which may demand othe esouces such as time and space. We will show that the space equiement of CRESTBOT is negligible; and, moe impotantly, it is possible to keep command boadcast time almost as fast as non-esilient stuctues by using UDP commands instead of TCP as befoe. CRESTBOT is designed based on extactos, a kind of expanding gaphs vey pevasive in compute science nowadays [4]. We veify ou esults both analytically and expeimentally using Emulab []. The dive-home points of this eseach ae as follows. Fist, C&C-takedown solutions ae ineffective against CRESTBOT, which is vey simple to implement and equies minimal changes to existing botcodes. Second, with popely designed dissemination stuctues, shot UDP commands can be as eliable as TCP commands with much less time consumption. This could potentially be used in othe aeas of netwoking. Thid, extemely fast command issuing is possible, which at fist glance might seem beneficial to the attacke; howeve, it might also be beneficial to the good guys when cetain ace conditions ae desied (patching, bot takedowns, etc.). The emainde of the pape is oganized as follows. Section 2 eviews selected elated woks. Section 3 analyzes the esiliency of existing C&C-based botnet and poposed new stuctues with stong esiliency guaantee. In Section 4, we expeimentally validate the analyses. Finally, we conclude and discuss defense appoaches dawn fom ou wok in Section /8/$2. 28 IEEE. 1

2 II. SELECTED RELATED WORK Existing studies on botnets fall unde the following two main categoies: (i) Pefom case-study of botnet behavios and stuctues; (ii) Popose techniques fo botnet detection and disuption. Fo example, Feiling et al. [6] infiltated a eal botnet to identify C&Cs and study bot commands. Rajab et al. [7] employed a multifaceted and distibuted infastuctue to study botnet behavios. Othes woks focused on measuing botnet size by vaious techniques such as by DNS ediection [8] o DNS cache snooping [9]. Recently, seveal techniques have also been poposed to detect botnet existence: anomaly detection [1], taffic o netwok activity statistics analyses [11]. To the best of ou knowledge, this pape is the fist to analyze taditional botnet and thei vaiances esiliency and show how command issuing can be made vey fast. Incidents fom the past have showed us that malicious pogams always evolve into instances with moe and moe advanced featues and techniques (the UDP wom Slamme is a good example). In fact, botnets with moe esilient topologies using P2P stuctues have aleady aisen [12]. Reseach on hypothetically poweful botnets such as ous is thus impotant to pepae fo the wost, to develop, test, and benchmak counte-measue systems in advance. III. BOTNET RESILIENCY AND CRESTBOT A. Resiliency of a Taditional Botnet Topology Fo a taditional C&C botnet (Figue 1(a)), the botmaste fist infects (diectly o indiectly) vulneable PCs with malicious softwaes called bots. Each bot then contacts a cental seve though which the botmaste elays commands as well as collects feedback infomation fom the bots. The C&Cs can eithe be public seves (often Intenet Chat Potocol o IRC seves) o dedicated machines set up by the botmaste to function as C&Cs. Depending on how the botmaste commands each the bots, botnets can also be categoized into push o pull style. In a push style C&C, the C&Cs fowad commands fom the botmaste to the bots in eal time, while in a pull style, bots contact the C&C fo new commands. Most common bot families such as AgoBot, PhatBot, GTBot [6] belong to this categoy. HTTP-based botnets on the othe hand ae pull-style botnets, whee bots quey (e.g using GET and POST) a web seve fo new commands fom the botmaste. Whicheve the botnet s type is, its esiliency can be measued by the expected numbe of bots who still eceive commands (in push-style botnets) o still can each the botmaste (in the pull-style botnets) given the pobability that C&Cs ae down (o the faction of C&Cs which ae down). C&C based botnets can be viewed as a 3-level tee topology shown in Figue 1(b). Node v epesents the botmaste, x i, 1 i M epesents the C&Cs and y j, 1 j N epesent the bots. Fo the sake of claity, we assume that each C&C is in chage of d bots, though ou analysis applies fo any C&C degee. Let p be the pobability that a C&C is taken down, the expected numbe of uneachable bots is then N(1 p ). y 1 x 1 Fig. 1. (a) Typical Botnet Scenaio x 2 v x M 1 y 2 y 3 y 4 y N 3 y N 2 y N 1 y N (b) Modeled Topology x M Typical and Modeled C&C Botnet Topology This taditional topology is thus not vey esilient: the numbe of affected bots is linealy popotional to 1 p.anadvesay (e.g a system administato o secuity analyst) with the ight emoval stategy of the C&Cs (e.g. emove heavily loaded C&C) can isolate a majo potion of the botnet. Since the numbe of C&Cs is much smalle than the numbe of bots, an advesay then needs elatively little effot to cipple a lage botnet. B. Fist Attempt at a Moe Resilient Stuctue One potential way to impove esiliency is to employ P2P topologies o to ely on existing P2P netwoks. Fo example, Peacomm [12] employs a P2P netwok fo its C&Cs. Howeve, P2P potocols impose exta outing and maintenance ovehead, making the botnet moe pone to being detected. On the othe hand, the communication suppotive natue of IRC, the availability of public IRC seves o web seves make it much easie fo the botmaste to oganize a C&C-based botnet. We thus believe C&C-based botnets and the likes will emain popula in the nea futue. To incease the taditional stuctue esiliency, a natual appoach is to incease the numbe of paths fom the oot to each bot. It is thus sensible to let each bot connect to b C&Cs. Let Z denote the numbe of eachable bots, then d M k N /8/$2. 28 IEEE. 2

3 v X = X i c copies G 1 G c 1 G c Y 1 Y c 1 The G i ae all copies of the same gaph H Fig. 2. The Resilient Topology R Y c Bot Alive Ratio Standad Topo, b=1.3 Resilient Topo, b=2 Resilient Topo, b=3.2 Resilient Topo, b=4 Resilient Topo, b=.1 Resilient Topo, b=6 Resilient Topo, b= C&C Down Pobability E[Z] =N(1 p b ). The negative effect of emoved C&Cs on the numbe of bots is now educed exponentially while the botcode changes equied ae minimal. In ode to guaantee that (1 )N bots ae eachable with pobability at least (1 δ), how lage should b be? The distibution of Z is binomial with paamete (1 p b ). Thus, it will be concentated aound the mean. To guaantee that Z>(1 )N with high pobability, we thus will need p b to be quite a bit less than. Moe concetely, by Chenoff bound h i Pob[Z <(1 )N] =Pob (1 p b)(1 pb )N ½ ³ < exp N 2 (1 p b 2¾ n o pb ) =exp N 2 1 p b Z< (1 ) ( p b )2 1 p b which is at most δ if, afte simple calculus, p b 1 2N ln(1/δ) (1 ) 1 N ln(1/δ)+ 1 4N 2 ln2 (1/δ) This guaantee may not even be possible with paametes fo which 1 2N ln(1/δ) (1 ) 1 N ln(1/δ)+ 1 4N 2 ln2 (1/δ) (like when is elatively small). Even when is not too small, the equied value of b maybetoolagetobeuseful pactically. Fistly, the physical capacity of C&Cs is usually limited. Fo example, a chat channel typically hosts aound a hunded uses o less, and a chat seve nomally handles only seveal thousand uses. Secondly, highe values of b incease the isk of being detected fo the bots. We will next design a moe esilient stuctue to povide the above epsilon-delta guaantee. C. The extacto-based CRESTBOT design A (w, )-extacto is a bipatite gaph H =(L R, E) with left pat L = M w and ight pat R = y, suchthatevey subset of at least w left vetices has at least (1 )y neighbos on the ight. It is known that, fo any and any w M, thee exist (w, )-extactos in which all left vetices have degee d = Θ(log M), y = Θ(wd), and the distibution of ight degees ae close to unifom, i.e. of degee Md/y = Θ(M/w) [13]. We now constuct a new esilient stuctue R (Figue 2) as follows: fo i =1,...,c,letG i =(X i Y i ; E i ) be copies Fig. 3. Resiliency of the same (w, )-extacto H. ToconstuctR, we glue togethe the X i -side of G 1,...,G c, i.e. identify vetices in the X i in any one-to-one manne. Let X denote the glued X i, and Y = Y 1 Y c. The souce v has an edge to each vetex in X. Intotal,thevetexsetofR is {v } X Y.The following theoem states the esiliency of this stuctue: Theoem 1: Fix any constant >. Letα> be any constant such that α>p.setw =(1 α)m. Thenwith pobability at least 1 exp( Θ(M)) (i.e. exponentially close to 1), whee M is the total numbe of C&Cs, a (1 )-faction of all bots will emain eachable in the stuctue R. Poof: The impotant point to notice hee is that, by definition of extactos, if less than a (1 )-faction of bots ae eachable, then moe than M w = αm C&Cs ae down. Let S be the numbe of unavailable C&Cs, then, noting that E[S] =Mp, Pob[less than (1 )N bots eachable] Pob[S >αm] h ³ i = Pob S> 1+ α p p p M exp M(α p ) 2 /(3p ) ª Figue 3 plots the esiliency of a topology R fo M = 2,N =6with vaious ight degee value b = Md N.Hee the coesponding atios of alive bots ae computed using the wost case value. At b =1, R degades back to the taditional topology whee p is invesely popotional to the atio of the emained bots. As b inceases, the impact of p is educed exponentially. In paticula, fo b =, when 8% C&Cs ae down, only 3% of bots ae affected, compaed to 8% of the taditional topology. At b =7, moe than 9% of the bots ae still eachable even when up to 7% of the C&C ae down. IV. A NEW CLASS OF UDP BOTNET We define CRESTBOT (C&C-based RESilienT Botnets) as a family of botnets using the above topology constuction. The existence of esilient topologies give ise to a potential class of CRESTBOT using UDP as the undelying tansmission potocol. UDP CRESTBOT employ esilient topologies to compensate any potential loss caused by using UDP. UDP offes /8/$2. 28 IEEE. 3

4 two poweful weapons: speed and flow stealth against defense systems, especially those elying on stable flow infomation [11]. We name such botnets as UCRESTBOT. In the following sections, we will evaluate and compae the boadcast time of UCRESTBOT with that of a tadition TCP botnet. The boadcast time is defined as the amount of time fom when the botmaste sends the fist bit of a message until the last bit of that message disappeas fom the netwok. 1) Lossless Tansmission: To simplify the estimation, we conside the case when the bandwidth of each link is unifom, denoted as. We also assume the latency of all links in each laye (between the botmaste and C&Cs, between C&Cs and bots) ae the same, denoted as L 1,L 2 espectively. Denote the length of a message as m, and denote the message boadcast time as T UCRES. Each C&C can send any message to its subscibed bots in a consecutive manne without little o no delay between each tansmission. The following lemma states the expected message boadcast time of UCRESTBOT. Lemma 2: Let Q = m + L p. The expected boadcast time of a UCRESTBOT can be appoximated as: E[T UCRES]=Q M + p(pm 1) 1 p +(1 p M )(dq + L 1 + L 2). (1) Hee d is the left degee of each C&C as defined in the pevious section, L p is the pocessing delay at each node. Poof: Let x I be the last C&C that emains at the second laye. I is a andom vaiable with pobability Pob[I = j] = p M j (1 p ).DenoteZ I as the time the last bot connected to x I eceives the( message. The boadcast time of UCRESTBOT Z I if I>, is: T UCRES =.Wethenhave: Z =, I = E[T UCRES]= = = Q MX Z I Pob[I = j] j=1 MX (j.q + d.q + L 1 + L 2)p M j (1 p ) j=1 M + p(pm 1) 1 p +(1 p M )(dq + L 1 + L 2 ) (2) We now compute the boadcast time fo a TCP botnet using the taditional topology, denoted as T TCP.Ingeneal, the oveall end-to-end delay fo a TCP link is dependent of the specific featues of the undelying TCP stack such as window size, acknowledgment method, congestion contol algoithm etc. Howeve, we obseve that most bot commands ae shot (less than a few hunded bytes) thus can fit ina tansmission window o even in one data segment. Since we ae not consideing packet loss, a single message end-to-end delay will consist mainly of one diection popagation delay and the Round Tip Time fo the connection setup. In addition, we assume that the C&C seves can multiplex simultaneous connections duing the connection setup (e.g by using multiple theads,acommontechniqueusedbymanywoms)toeduce the waiting time. The esult in the pevious lemma can then be modified to compute the message boadcast time fo a taditional TCP botnet: Lemma 3: Define Q as befoe. The expected popagation time fo TCP is: E[T TCP ]=Q M + p(pm 1) 1 p +(1 p M )(dq +3L 1 +3L 2 ). Note the coefficient 3 associated with each L 1,L 2 tem come fom the thee way handshake pocess in TCP. 2) Lossy Tansmission: Denote p e as the packet loss ate on each link. Since UDP povides no etansmission, the endto-end delay fo each successful connection emains the same. The new expected boadcast time of CRESTBOT can then simply be uppe bounded (it can be smalle when thee s no tansmission at the second laye) as in (1),(3) with a new failue pobability p a = p e + p p e p. The delay fo TCP botnet howeve is faily complicated. We boow the well established TCP model in [14] to estimate the delay of a shot TCP connection. The expected delay of a shot TCP connection ove a link with latency L is modeled as: E[T con(l)] = E[L h ]+E[T ss]+e[t loss ]+E[T ca]+e[t delack ] (4) whee E[L h ],E[T ss ],E[T loss ],E[T ca ] and E[T delack ] ae the expected value of handshake, slow stat, etansmission timeouts o fast ecovey, emaining data tansmission, and delayed acknowledgment time espectively. The exact fomula of each tem can be found in [14]. The expected time fo TCP can then be lowe bounded as: E[T TCP (p e )] > (1 p M ){T TCP (L 1 )(1 p e )+p e E[T con (L 1 )]} +(1 p M ){T TCP(L 2)(1 p e) d +[1 (1 p e) d ]E[T con(l 2)]} () whee T TCP (L) = M +3L is the appoximated delay of a shot TCP link with latency L when thee is no packet loss. V. EXPERIMENT To evaluate the accuacy of ou estimation, we conducted extensive expeiments on Emulab []. Emulab is a netwok testbed that offes ealistic expeiments with both actual hadwae and softwae platfoms. Compaed to taditional simulation methods, Emulab povides a testing envionment with much highe fidelity to the eal wold. A. Expeiment Setup Inpactice,theeffectivesize(thenumbeoflivebots)foa botnet is just aound seveal thousands, as pointed out by Rajab et al [9]. Howeve, Cooke [] noted that botnets of size a few hundeds ae also common because they ae difficult to detect and easie to sell o ent. We hence conside two small botnets of size 3 and 6, with 1 and 2 C&Cs espectively. Note that in this setting a C&C contols 3 bots on aveage. Fo this setting, the set of C&Cs is oughly 3% of the bot population (Wang s esilient topology [3] equies 2%). In the next pats of this section, we will efe to these botnets as Bot3 and Bot6. Fo the physical netwok topology, we used BRITE [16], a univesal topology geneato designed to synthesize ealistic netwok topologies. BRITE suppots multiple geneation (3) /8/$2. 28 IEEE. 4

5 Agent Management Expeiment Data Collection Message Boadcast Time (s) Message Boadcast Time (s) 2 1 Emulab Inteface C&C/Bot Agents (a) Expeiment Setup Physical Topology Estimated and Actual Boadcast Time, Bot3 Estimated TCP Time using Max Latencies Estimated TCP Time using Aveage Latencies Actual TCP Time Estimated UDP Time using Max Latencies Estimated UDP Time using Aveage Latencies Actual UDP Time C&C/Bot Agents BotMaste Agent Configuations (b) Estimated and Actual Boadcast Time, Bot3 Estimated and Actual Boadcast Time, Bot6 standad topology Estimated TCP Time using Max. Latencies Estimated TCP Time using Aveage Latencies Actual TCP Time Estimated UDP Time using Max. Latencies Estimated UDP Time using Aveage Latencies Actual UDP Time Configuations (c) Estimated and Actual Boadcast Time, Bot6 Fig. 4. Expeiment setup and esults models fo flat AS, flat Route and hieachical topologies. In each topology geneated by BRITE, nodes ae gouped into multiple ASes and communicate though inte-as links, which ae geneated in esemblance to thei Intenet countepats. Figue 4(a) illustates the setup of ou expeiment. We developed special C&C and Bot agents to simulate C&C and Bot s communication activities. The agents ae andomly distibuted on diffeent machines to simulate the vaiation of netwok topologies. Fo each ound, the Agent Management Component fist deploys agents following the esilient ovelay topology, then instucts BotMaste Agent to send commands to C&C Agents, which in tun fowad the commands to the Bots. Afte each ound, expeiment logs ae collected fom C&C and Bot Agents by the Data Collection Component. B. Results We fist validate the equations (1),(3) established in the pevious section. Recall that we assumed unifom bandwidth and latency on all the links between the botmaste and the C&Cs, as well as between the C&Cs and the bots. Since these assumptions aely hold in pactice, one can elax them by using the aveage values (computed ove all latencies at each laye). Howeve, ou expeiment esults show that it can lead to undeestimation when the latencies vaies widely and the boadcast time can be dominated by the lagest latencies at each level. As can be seen fom Figue 4(b,c), estimated boadcast time using aveage latency values is significantly smalle than the actual time. On the othe hand, estimation using the maximum values yields vey close esults. This holds tue fo both Bot3 and Bot6. We next validate the estimated (using maximum latencies) and actual boadcast time fo a TCP botnet with taditional topology and UCRESTBOT. We use a Bot3 fo the expeiment and use L p = 4 ms fo ou estimation. Figue (a) shows the estimated and actual time fo these botnets. It can be seen that UCRESTBOT boadcast time is only one thid of the countepat in a taditional TCP botnet. We also validate the estimation of UCRESTBOT in the fomula (1) when p vaies. Figue (b) shows the estimated and actual atio E[T UCRESTBOT ] when p vaies ove the case when p =. It can be seen that the actual atio decease much faste than the estimated atio using (1) and the estimated atio is not accuate. Upon close examination of Emulab mechanism, we obseve that L p on Emulab depends on the numbe of netwok connections and thus on p almost linealy. Afte adjusting L p by a facto of 1 p, the estimated atio becomes vey close to the actual esult. Fo lossy conditions, we fist an expeiments on Emulab using the packet loss simulation povided by Emulab. Howeve, the data collected showed abnomal delay compaed to existing TCP models in liteatue. Fo example, Figue (c) shows the gap between the aveage single connection delay at the fist laye of a taditional TCP Botnet3 and its estimated value accoding to [14]. This additional delay is due to the exta pocessing delay incued by the packet loss simulation in Emulab. This delay howeve does not appea unde a lighte packet loss simulation setup. To confim this, we measued the TCP connection delay between 2 machines unning FeeBSD, connected by a diect link with bandwidth 1Mbps, popagation latency 6ms. Figue 6(a) shows the actual and estimated TCP delay unde this setup. It can be seen that the model in [14] agees closely with the actual esults. Finally, Figue 6(b) shows the atio between a TCP Bot3 and UCRESTBOT Bot3 boadcast time when the packet loss ate p e vaies, estimated using (). As p e inceases, the atio also inceases almost linealy fom 3 duing the displayed p e ange. As p e eaches highe values, the atio will follow the same tend in Figue 6(a) /8/$2. 28 IEEE.

6 Message Boadcast Time (s) 2 1 Estimated and Actual Boadcast Time, Bot3 Estimated TCP Time using Max. Latencies Actual TCP Time Estimated CestBot(UDP) using Max. Time Actual UDP Time Res Topo Configuations Ratio Estimated and Actual Popagation Boadcast Time Ratio.6 Actual Ratio.6 Simple Estimated Ratio Adjusted Estimated Ratio C&C Removal Pobability Time(s) Estimated and Actual Boadcast Time fo A Taditional TCP Botnet 2 Estimated Time Actual Time Packet Loss Pobability (a) Taditional and UCRESTBOT Boadcast Time (b) Actual, Estimated Time Ratio of UCRESTBOT (c) Actual and Estimated TCP Delay Fig.. Message boadcast time and delay validation Latency(s) TCP Delay (Single Connection) Compaison Estimated Measued Link Loss Pobability (a) Single TCP Connection Delay Validation ated Boadcast Time Ratio of A Taditional TCP Botnet and UCRE 4.4 Ratio Packet Loss Rate (b) Boadcast Time Ratio UCRESTBOT and TCP Bot3 Fig. 6. TCP delay validation and estimated time atio VI. CONCLUSIONS In this pape we pesented a hypothetical family of botnets named CRESTBOT with esilient topologies based on extactos. We showed that CRESTBOT ae able to guaantee a high level of esiliency, yet do not equie substantial modification to the cuent C&C-based stuctues. We also studied a special UDP membe of the CRESTBOT family, UCRESTBOT, capable of sending commands fom the botmaste at least thee times faste than the taditional botnet. UCRESTBOT and CRESTBOT pose consideable challenge to system administatos by thei esiliency. To defense against these botnets, ealy intevention seems to be the only effective method. This is because most bots ae initially setup to connect to some seed C&Cs and thus ae vulneable duing this phase. Ealy detection and emoval of these seeds ae then citical to cipple these botnets. Techniques as discussed in the elated wok section can then be applied accodingly. REFERENCES [1] content/white papes/wp botnet.pdf. [2] Maymounkov and Maziees, Kademlia: A pee-to-pee infomation system based on the XOR metic, in Intenational Wokshop on Peeto-Pee Systems (IPTPS), LNCS, vol.1,22. [3] P. Wang, S. Spaks, and C. C. Zou, An advanced hybid pee-to-pee botnet, Poceedings 27 USENIX Fist wokshop on Hot Topics in Undestanding Botnets, Ap. 27. [4] S. Hooy, N. Linial, and A. Wigdeson, Expande gaphs and thei applications, Bull.Ame.Math.Soc.(N.S.), vol. 43, no. 4, pp (electonic), 26. [] B.White,J.Lepeau,L.Stolle,R.Ricci,S.Guupasad,M.Newbold, M. Hible, C. Bab, and A. Jogleka, An integated expeimental envionment fo distibuted systems and netwoks, in Poc. of the Fifth Symposium on Opeating Systems Design and Implementation. Boston, MA: USENIX Association, Dec. 22, pp [6] Feiling, Holz, and Wicheski, Botnet tacking: Exploing a ootcause methodology to pevent distibuted denial-of-sevice attacks, in ESORICS: Euopean Symposium on Reseach in Compute Secuity. LNCS, Spinge-Velag, 2. [7] M. A. Rajab, J. Zafoss, F. Monose, and A. Tezis, A multifaceted appoach to undestanding the botnet phenomenon, in Intenet Measuement Confeence, J.M.Almeida,V.A.F.Almeida,andP.Bafod, Eds. ACM, 26, pp [8] D. Dagon, C. Zou, and W. Lee, Modeling botnet popagation using time zones, in NDSS. The Intenet Society, 26. [9] M. Rajab, J. Zafoxx, F. Monose, and A. Tezia, My botnet is bigge than yous (maybe, bette than yous), Poceedings 27 USENIX Fist wokshop on Hot Topics in Undestanding Botnets, Ap. 27. [1] J. R. Binkley and S. Singh, An algoithm fo anomaly-based botnet detection, in SRUTI 6: Poceedings of the 2nd confeence on Steps to Reducing Unwanted TafficontheIntenet. Bekeley, CA, USA: USENIX Association, 26. [11] G. Gu, V. Yegneswaan, and Matin, Bothunte: Detecting malwae infection though ids-diven dialog coelation, pp [Online]. Available: [12] J.Gizzad,V.Shama,C.Nunney,B.KangB.,andD.D., Pee-topee botnets: Oveview and case study, Poceedings 26 1st USENIX Wokshop on Hot Topics in Undestanding Botnets, Ap. 27. [13] C.-J. Lu, O. Reingold, S. Vadhan, and A. Wigdeson, Extactos: optimal up to constant factos, in Poceedings of the Thity-Fifth Annual ACM Symposium on Theoy of Computing. New Yok: ACM, 23, pp (electonic). [14] N. Cadwell, S. Savage, and T. Andeson, Modeling tcp latency, INFOCOM 2. Nineteenth Annual Joint Confeence of the IEEE Compute and Communications Societies. Poceedings. IEEE, vol.3, pp vol.3, 26-3 Ma 2. [] E. Cooke, F. Jahanian, and D. Mcpheson, The zombie oundup: Undestanding, detecting, and disupting botnetns, in Wokshop on Steps to Reducing Unwanted Taffic ontheintenet(sruti), June 2, pp [16] A. Medina, A. Lakhina, I. Matta, and J. Byes, BRITE: an appoach to univesal topology geneation, in Modeling, Analysis and Simulation of Compute and Telecommunication Systems, 21. Poceedings. Ninth Intenational Symposium on, Cincinnati, OH, USA, 21, pp /8/$2. 28 IEEE. 6

IP Network Design by Modified Branch Exchange Method

IP Network Design by Modified Branch Exchange Method Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management

More information

Hierarchically Clustered P2P Streaming System

Hierarchically Clustered P2P Streaming System Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.

More information

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012

Journal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012 2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo

More information

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System

Slotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet

More information

Topological Characteristic of Wireless Network

Topological Characteristic of Wireless Network Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences

More information

Performance Optimization in Structured Wireless Sensor Networks

Performance Optimization in Structured Wireless Sensor Networks 5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame

More information

Prioritized Traffic Recovery over GMPLS Networks

Prioritized Traffic Recovery over GMPLS Networks Pioitized Taffic Recovey ove GMPLS Netwoks 2005 IEEE. Pesonal use of this mateial is pemitted. Pemission fom IEEE mu be obtained fo all othe uses in any cuent o futue media including epinting/epublishing

More information

THE THETA BLOCKCHAIN

THE THETA BLOCKCHAIN THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent

More information

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set

Modelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;

More information

Controlled Information Maximization for SOM Knowledge Induced Learning

Controlled Information Maximization for SOM Knowledge Induced Learning 3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity

More information

Detection and Recognition of Alert Traffic Signs

Detection and Recognition of Alert Traffic Signs Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives

More information

Point-Biserial Correlation Analysis of Fuzzy Attributes

Point-Biserial Correlation Analysis of Fuzzy Attributes Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh

More information

Erasure-Coding Based Routing for Opportunistic Networks

Erasure-Coding Based Routing for Opportunistic Networks Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant

More information

Separability and Topology Control of Quasi Unit Disk Graphs

Separability and Topology Control of Quasi Unit Disk Graphs Sepaability and Topology Contol of Quasi Unit Disk Gaphs Jiane Chen, Anxiao(Andew) Jiang, Iyad A. Kanj, Ge Xia, and Fenghui Zhang Dept. of Compute Science, Texas A&M Univ. College Station, TX 7784. {chen,

More information

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM

INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300

More information

Communication vs Distributed Computation: an alternative trade-off curve

Communication vs Distributed Computation: an alternative trade-off curve Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,

More information

IP Multicast Simulation in OPNET

IP Multicast Simulation in OPNET IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok

More information

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments

Combinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile

More information

Dynamic Topology Control to Reduce Interference in MANETs

Dynamic Topology Control to Reduce Interference in MANETs Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity

More information

Module 6 STILL IMAGE COMPRESSION STANDARDS

Module 6 STILL IMAGE COMPRESSION STANDARDS Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.

More information

Analysis of Wired Short Cuts in Wireless Sensor Networks

Analysis of Wired Short Cuts in Wireless Sensor Networks Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment

More information

HISTOGRAMS are an important statistic reflecting the

HISTOGRAMS are an important statistic reflecting the JOURNAL OF L A T E X CLASS FILES, VOL. 14, NO. 8, AUGUST 2015 1 D 2 HistoSketch: Disciminative and Dynamic Similaity-Peseving Sketching of Steaming Histogams Dingqi Yang, Bin Li, Laua Rettig, and Philippe

More information

An Unsupervised Segmentation Framework For Texture Image Queries

An Unsupervised Segmentation Framework For Texture Image Queries An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu

More information

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES

RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class

More information

A New Finite Word-length Optimization Method Design for LDPC Decoder

A New Finite Word-length Optimization Method Design for LDPC Decoder A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology

More information

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE

AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity

More information

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension

Segmentation of Casting Defects in X-Ray Images Based on Fractal Dimension 17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach

More information

Illumination methods for optical wear detection

Illumination methods for optical wear detection Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical

More information

A Memory Efficient Array Architecture for Real-Time Motion Estimation

A Memory Efficient Array Architecture for Real-Time Motion Estimation A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN

More information

An Improved Resource Reservation Protocol

An Improved Resource Reservation Protocol Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing

More information

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks

Spiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition

More information

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS

ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth

More information

Color Correction Using 3D Multiview Geometry

Color Correction Using 3D Multiview Geometry Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,

More information

Optical Flow for Large Motion Using Gradient Technique

Optical Flow for Large Motion Using Gradient Technique SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this

More information

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH

SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,

More information

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives

a Not yet implemented in current version SPARK: Research Kit Pointer Analysis Parameters Soot Pointer analysis. Objectives SPARK: Soot Reseach Kit Ondřej Lhoták Objectives Spak is a modula toolkit fo flow-insensitive may points-to analyses fo Java, which enables expeimentation with: vaious paametes of pointe analyses which

More information

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters

Frequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using

More information

Adaptation of TDMA Parameters Based on Network Conditions

Adaptation of TDMA Parameters Based on Network Conditions Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.

More information

The Dual Round Robin Matching Switch with Exhaustive Service

The Dual Round Robin Matching Switch with Exhaustive Service The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line

More information

The Internet Ecosystem and Evolution

The Internet Ecosystem and Evolution The Intenet Ecosystem and Evolution Contents Netwok outing: basics distibuted/centalized, static/dynamic, linkstate/path-vecto inta-domain/inte-domain outing Mapping the sevice model to AS-AS paths valley-fee

More information

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs

Fault-Tolerant Routing Schemes in RDT(2,2,1)/α-Based Interconnection Network for Networks-on-Chip Designs Fault-Toleant Routing Schemes in RDT(,,)/α-Based Inteconnection Netwok fo Netwoks-on-Chip Designs Mei Yang, Tao Li, Yingtao Jiang, and Yulu Yang Dept. of Electical & Compute Engineeing Univesity of Nevada,

More information

DISTRIBUTION MIXTURES

DISTRIBUTION MIXTURES Application Example 7 DISTRIBUTION MIXTURES One fequently deals with andom vaiables the distibution of which depends on vaious factos. One example is the distibution of atmospheic paametes such as wind

More information

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor

Obstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,

More information

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks

Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu

More information

Quality Aware Privacy Protection for Location-based Services

Quality Aware Privacy Protection for Location-based Services In Poceedings of the th Intenational Confeence on Database Systems fo Advanced Applications (DASFAA 007), Bangkok, Thailand, Apil 9-, 007. Quality Awae Pivacy Potection fo Location-based Sevices Zhen Xiao,,

More information

Mobility Pattern Recognition in Mobile Ad-Hoc Networks

Mobility Pattern Recognition in Mobile Ad-Hoc Networks Mobility Patten Recognition in Mobile Ad-Hoc Netwoks S. M. Mousavi Depatment of Compute Engineeing, Shaif Univesity of Technology sm_mousavi@ce.shaif.edu H. R. Rabiee Depatment of Compute Engineeing, Shaif

More information

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks

On the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New

More information

arxiv: v2 [physics.soc-ph] 30 Nov 2016

arxiv: v2 [physics.soc-ph] 30 Nov 2016 Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity

More information

Lecture # 04. Image Enhancement in Spatial Domain

Lecture # 04. Image Enhancement in Spatial Domain Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency

More information

An Extension to the Local Binary Patterns for Image Retrieval

An Extension to the Local Binary Patterns for Image Retrieval , pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science

More information

MANET QoS support without reservations

MANET QoS support without reservations SECURITY AND COMMUNICATION NETWORKS Secuity Comm. Netwoks (2010) Published online in Wiley InteScience (www.intescience.wiley.com)..183 SPECIAL ISSUE PAPER MANET QoS suppot without esevations Soon Y. Oh,

More information

On using circuit-switched networks for file transfers

On using circuit-switched networks for file transfers On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed

More information

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints

Tier-Based Underwater Acoustic Routing for Applications with Reliability and Delay Constraints Tie-Based Undewate Acoustic Routing fo Applications with Reliability and Delay Constaints Li-Chung Kuo Depatment of Electical Engineeing State Univesity of New Yok at Buffalo Buffalo, New Yok 14260 Email:

More information

The concept of PARPS - Packet And Resource Plan Scheduling

The concept of PARPS - Packet And Resource Plan Scheduling The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.

More information

A Recommender System for Online Personalization in the WUM Applications

A Recommender System for Online Personalization in the WUM Applications A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based

More information

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM

ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM ADDING REALISM TO SOURCE CHARACTERIZATION USING A GENETIC ALGORITHM Luna M. Rodiguez*, Sue Ellen Haupt, and Geoge S. Young Depatment of Meteoology and Applied Reseach Laboatoy The Pennsylvania State Univesity,

More information

ANN Models for Coplanar Strip Line Analysis and Synthesis

ANN Models for Coplanar Strip Line Analysis and Synthesis 200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute

More information

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1)

(1) W tcp = (3) N. Assuming 1 P r 1. = W r (4) a 1/(k+1) W 2/(k+1) 1 Multi Path PERT Ankit Singh and A. L. Naasimha Reddy Electical and Compute Engineeing Depatment, Texas A&M Univesity; email: eddy@ece.tamu.edu. Abstact This pape pesents a new multipath delay based algoithm,

More information

Positioning of a robot based on binocular vision for hand / foot fusion Long Han

Positioning of a robot based on binocular vision for hand / foot fusion Long Han 2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,

More information

A Novel Automatic White Balance Method For Digital Still Cameras

A Novel Automatic White Balance Method For Digital Still Cameras A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing

More information

A modal estimation based multitype sensor placement method

A modal estimation based multitype sensor placement method A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;

More information

Any modern computer system will incorporate (at least) two levels of storage:

Any modern computer system will incorporate (at least) two levels of storage: 1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe

More information

Towards Adaptive Information Merging Using Selected XML Fragments

Towards Adaptive Information Merging Using Selected XML Fragments Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,

More information

Efficient protection of many-to-one. communications

Efficient protection of many-to-one. communications Efficient potection of many-to-one communications Miklós Molná, Alexande Guitton, Benad Cousin, and Raymond Maie Iisa, Campus de Beaulieu, 35 042 Rennes Cedex, Fance Abstact. The dependability of a netwok

More information

A Two-stage and Parameter-free Binarization Method for Degraded Document Images

A Two-stage and Parameter-free Binarization Method for Degraded Document Images A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and

More information

Event-based Location Dependent Data Services in Mobile WSNs

Event-based Location Dependent Data Services in Mobile WSNs Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,

More information

Wormhole Detection and Prevention in MANETs

Wormhole Detection and Prevention in MANETs Womhole Detection and Pevention in MANETs Lija Joy Compute Science and Engineeing KMEA Engineeing College Enakulum, Keala, India lijavj@gmail.com Sheena Kuian K Compute Science and Engineeing KMEA Engineeing

More information

Configuring RSVP-ATM QoS Interworking

Configuring RSVP-ATM QoS Interworking Configuing RSVP-ATM QoS Intewoking Last Updated: Januay 15, 2013 This chapte descibes the tasks fo configuing the RSVP-ATM QoS Intewoking featue, which povides suppot fo Contolled Load Sevice using RSVP

More information

Scaling Location-based Services with Dynamically Composed Location Index

Scaling Location-based Services with Dynamically Composed Location Index Scaling Location-based Sevices with Dynamically Composed Location Index Bhuvan Bamba, Sangeetha Seshadi and Ling Liu Distibuted Data Intensive Systems Laboatoy (DiSL) College of Computing, Geogia Institute

More information

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs

IP MULTICAST. Adiseshu Hari, T. V. Lakshman and Gordon Wilfong Nokia Bell Labs IP MULTICAST Adiseshu Hai, T. V. Lakshman and Godon Wilfong Nokia DIMACS Wokshop on Algoithms fo Data Cente Netwoks Rutges Univesity, NJ 1 Why is IP Multicast not deployed in public netwoks? Denial-of-Sevice

More information

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS

SCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),

More information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information

Title. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220

More information

P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks

P-SEP: a prolong stable election routing algorithm for energy-limited heterogeneous fog-supported wireless sensor networks J Supecomput (217) 73:733 755 DOI 1.17/s11227-16-1785-9 P-: a polong stable election outing algoithm fo enegy-limited heteogeneous fog-suppoted wieless senso netwoks Paola G. Vinueza Naanjo 1 Mohammad

More information

Exploring non-typical memcache architectures for decreased latency and distributed network usage.

Exploring non-typical memcache architectures for decreased latency and distributed network usage. Syacuse Univesity SURFACE Electical Engineeing and Compute Science Technical Repots College of Engineeing and Compute Science 9-5-20 Exploing non-typical memcache achitectues fo deceased latency and distibuted

More information

Ethernet PON (epon): Design and Analysis of an Optical Access Network.

Ethernet PON (epon): Design and Analysis of an Optical Access Network. Ethenet PON epon: Design and Analysis of an Optical Access Netwo. Glen Kame Depatment of Compute Science Univesity of Califonia, Davis, CA 9566, USA Tel:.530.297.527; Fax:.530.297.530 E-mail: ame@cs.ucdavis.edu

More information

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution

Concomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants

More information

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry

Fast quality-guided flood-fill phase unwrapping algorithm for three-dimensional fringe pattern profilometry Univesity of Wollongong Reseach Online Faculty of Infomatics - Papes (Achive) Faculty of Engineeing and Infomation Sciences 2010 Fast quality-guided flood-fill phase unwapping algoithm fo thee-dimensional

More information

A ROI Focusing Mechanism for Digital Cameras

A ROI Focusing Mechanism for Digital Cameras A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula

More information

An Optimised Density Based Clustering Algorithm

An Optimised Density Based Clustering Algorithm Intenational Jounal of Compute Applications (0975 8887) Volume 6 No.9, Septembe 010 An Optimised Density Based Clusteing Algoithm J. Hencil Pete Depatment of Compute Science St. Xavie s College, Palayamkottai,

More information

EE 6900: Interconnection Networks for HPC Systems Fall 2016

EE 6900: Interconnection Networks for HPC Systems Fall 2016 EE 6900: Inteconnection Netwoks fo HPC Systems Fall 2016 Avinash Kaanth Kodi School of Electical Engineeing and Compute Science Ohio Univesity Athens, OH 45701 Email: kodi@ohio.edu 1 Acknowledgement: Inteconnection

More information

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems

Achievable Catalog Size in Peer-to-Peer Video-on-Demand Systems Achievable Catalog Size in Pee-to-Pee Video-on-Demand Systems Yacine Boufkhad, Fabien Mathieu, Fabien De Montgolfie, Diego Peino, Lauent Viennot To cite this vesion: Yacine Boufkhad, Fabien Mathieu, Fabien

More information

Lecture 27: Voronoi Diagrams

Lecture 27: Voronoi Diagrams We say that two points u, v Y ae in the same connected component of Y if thee is a path in R N fom u to v such that all the points along the path ae in the set Y. (Thee ae two connected components in the

More information

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver

RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Driver 1 RT-WLAN: A Soft Real-Time Extension to the ORiNOCO Linux Device Dive Amit Jain Daji Qiao Kang G. Shin The Univesity of Michigan Ann Abo, MI 4819, USA {amitj,dqiao,kgshin@eecs.umich.edu Abstact The cuent

More information

4.2. Co-terminal and Related Angles. Investigate

4.2. Co-terminal and Related Angles. Investigate .2 Co-teminal and Related Angles Tigonometic atios can be used to model quantities such as

More information

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE

A New and Efficient 2D Collision Detection Method Based on Contact Theory Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai MIAO, Jian XUE 5th Intenational Confeence on Advanced Mateials and Compute Science (ICAMCS 2016) A New and Efficient 2D Collision Detection Method Based on Contact Theoy Xiaolong CHENG, Jun XIAO a, Ying WANG, Qinghai

More information

WIRELESS sensor networks (WSNs), which are capable

WIRELESS sensor networks (WSNs), which are capable IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. XX, NO. XX, XXX 214 1 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang, Kuan

More information

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM

Simulation and Performance Evaluation of Network on Chip Architectures and Algorithms using CINSIM J. Basic. Appl. Sci. Res., 1(10)1594-1602, 2011 2011, TextRoad Publication ISSN 2090-424X Jounal of Basic and Applied Scientific Reseach www.textoad.com Simulation and Pefomance Evaluation of Netwok on

More information

Embeddings into Crossed Cubes

Embeddings into Crossed Cubes Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability

More information

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA

i-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043

More information

Conversion Functions for Symmetric Key Ciphers

Conversion Functions for Symmetric Key Ciphers Jounal of Infomation Assuance and Secuity 2 (2006) 41 50 Convesion Functions fo Symmetic Key Ciphes Deba L. Cook and Angelos D. Keomytis Depatment of Compute Science Columbia Univesity, mail code 0401

More information

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes

Information Retrieval. CS630 Representing and Accessing Digital Information. IR Basics. User Task. Basic IR Processes CS630 Repesenting and Accessing Digital Infomation Infomation Retieval: Basics Thosten Joachims Conell Univesity Infomation Retieval Basics Retieval Models Indexing and Pepocessing Data Stuctues ~ 4 lectues

More information

Multidimensional Testing

Multidimensional Testing Multidimensional Testing QA appoach fo Stoage netwoking Yohay Lasi Visuality Systems 1 Intoduction Who I am Yohay Lasi, QA Manage at Visuality Systems Visuality Systems the leading commecial povide of

More information

Assessment of Track Sequence Optimization based on Recorded Field Operations

Assessment of Track Sequence Optimization based on Recorded Field Operations Assessment of Tack Sequence Optimization based on Recoded Field Opeations Matin A. F. Jensen 1,2,*, Claus G. Søensen 1, Dionysis Bochtis 1 1 Aahus Univesity, Faculty of Science and Technology, Depatment

More information

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering

A Fuzzy Constraint-Based Routing Algorithm for Traffic Engineering Fuzz Constaint-ased Routing lgoithm fo Taffic Engineeing Junaid. Khan and Hussein M. lnuweii Depatment of Electical & Compute Engineeing, 2356 Main Mall, Univesit of itish Columbia, Vancouve,.C. Canada,

More information

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics

Worst-Case Delay Bounds for Uniform Load-Balanced Switch Fabrics Wost-Case Delay Bounds fo Unifom Load-Balanced Switch Fabics Spyidon Antonakopoulos, Steven Fotune, Rae McLellan, Lisa Zhang Bell Laboatoies, 600 Mountain Ave, Muay Hill, NJ 07974 fistname.lastname@alcatel-lucent.com

More information

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks

Effects of Model Complexity on Generalization Performance of Convolutional Neural Networks Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k

More information

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks

An Energy-Efficient Approach for Provenance Transmission in Wireless Sensor Networks An Enegy-Efficient Appoach fo Povenance Tansmission in Wieless Senso Netwoks S. M. Iftekhaul Alam Pudue Univesity alams@pudue.edu Sonia Fahmy Pudue Univesity fahmy@cs.pudue.edu Abstact Assessing the tustwothiness

More information

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3

Getting Started PMW-EX1/PMW-EX3. 1 Rotate the grip with the RELEASE button pressed. Overview. Connecting the Computer and PMW-EX1/EX3 A PMW-EX1/PMW-EX3 Getting Stated Oveview This document descibes how to use the XDCAM EX Vesion Up Tool (heeafte Vesion Up Tool ) to upgade the PMW-EX1 and PMW-EX3 to vesion 1.20 (PMW-EX1) o vesion 1.10

More information

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks

Lifetime and Energy Hole Evolution Analysis in Data-Gathering Wireless Sensor Networks 788 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 12, NO. 2, APRIL 2016 Lifetime and Enegy Hole Evolution Analysis in Data-Gatheing Wieless Senso Netwoks Ju Ren, Student Membe, IEEE, Yaoxue Zhang,

More information

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC

Using SPEC SFS with the SNIA Emerald Program for EPA Energy Star Data Center Storage Program Vernon Miller IBM Nick Principe Dell EMC Using SPEC SFS with the SNIA Emeald Pogam fo EPA Enegy Sta Data Cente Stoage Pogam Venon Mille IBM Nick Pincipe Dell EMC v6 Agenda Backgound on SNIA Emeald/Enegy Sta fo block Intoduce NAS/File test addition;

More information