Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments

Size: px
Start display at page:

Download "Flogger: A File-centric Logger for Monitoring File Access and Transfers within Cloud Computing Environments"

Transcription

1 11 Inernaional Join Conference of IEEE TrusCom-11/IEEE ICESS-11/FCST-11 Flogger: A File-cenric Logger for Monioring File Access and Transfers wihin Cloud Compuing Environmens Ryan K L Ko, Peer Jagadpramana, Bu Sung Lee Cloud and Securiy Lab HP Laboraories Singapore {ryan.ko peer.jagadpramana francis.lee}@hp.com Absrac Trus is one of he main obsacles o widespread Cloud adopion. In order o increase rus in Cloud compuing, we need o increase ransparency and accounabiliy of daa in he Cloud for boh enerprises and end-users. However, curren sysem ools are unable o log file accesses and ransfers effecively wihin a Cloud environmen. In his paper, we presen Flogger, a novel file-cenric logger suiable for boh privae and public Cloud environmens. Flogger records filecenric access and ransfer informaion from wihin he kernel spaces of boh virual machines (VMs) and physical machines (PMs) in he Cloud, hus giving full ransparency of he enire daa landscape in he Cloud. Wih Flogger, services can be buil above i o provide Cloud providers, end-users and regulaors wih he relevan provenance, e.g. a ool for an enduser o rack wheher his/ her file was ouched by an unauhorized user. We presen he iniial developmens of Flogger, and ineresing resuls from our experimens. We also presen compelling fuure work ha will shape he beginnings of a new logging paradigm: disribued VM/ PM file-cenric logging. Keywords- Cloud compuing; logging; audiabiliy; accounabiliy; rus in Cloud compuing; rused Cloud; Cloud compuing securiy; file-cenric logs; file-cenric logging mechanisms; deecive mechanisms. I. INTRODUCTION Trus is one of he main obsacles o widespread Cloud Compuing adopion. In order o increase rus in Cloud Compuing, here are boh prevenive and deecive measures [1]. While many Cloud Compuing service providers are focusing on prevenive measures (e.g. beer firewalls, sronger encrypion, ec), few are focusing on increasing he accounabiliy and ransparency of heir Clouds via deecive mechanisms (e.g. logging, repors for end-user self forensics) []. Wih Cloud compuing removing he need for end-users o own sysems, we also experience a change in mindse, from a focus on sysems securiy o a focus on daa securiy and proecion. There is a need o know he who, wha, where, when, how and why of daa movemens in he Cloud. This is made even more urgen wih he impending daa explosion [3], and he dawn of he so-called fourh paradigm [3, 4] described by he lae Microsof researcher Jim Gray. Wih he need for deecive measures and he change in focus o daa securiy and proecion, comes a demand for a robus securiy ools which will enable end-users, Cloud compuing service providers, adminisraors of Cloud services, and even regulaors o inspec, monior and analyze he rends of daa accesses and movemens wihin he largescale Cloud compuing environmen from a single poin of view. However, are curren deecive mechanisms ready for his change in paradigm? We begin by analyzing he curren sae of he ar: II. RELATED WORK A. User Space Cenralized File Sysem Call Monior In radiional one-sysem or local area nework (LAN) environmens, i is common o find user-space file monioring ools or exensions of file sysems (e.g. inoify [], swach [6], file aleraion moniors (FAM) [7]) o be widely used for monioring he single- or muliple-file aciviies wihin a single machine. Tools are also available for monioring packes in neworks (e.g. snor []). Wih large scales and heavy usage of virualizaion echnologies in Cloud compuing, such ools are insufficien o provide an over-arching view for monioring files across boh virual machines (VMs) and physical machines (PMs). Moreover, hese applicaions are usually housed wihin he user space, leaving hem vulnerable o user space aacks. B. File Inegriy Checkers as Inrusion Deecion File inegriy checkers such as TripWire inspec for changes o he files in he sysems by checking agains a baseline hash-key daabase which is regularly updaed wih he laes hash keys of he files wihin a sysem. Such an implemenaion is no scalable for he Cloud as here is a high volume of access, i.e. he need o regularly updae he key daabase is no feasible. Furhermore, hese ools do no provide a hisory of he file changes. Hence, while hey are able o idenify which files have changed, hey are unable o explain he hisory of wha acually happened o he files. Such limiaion is no desirable for forensics in he conex of he Cloud. C. Virual Environmen Moniors Wih he rise in adopion of virualizaion echnologies especially in privae Clouds, sofware such as he HyTrus Appliance [9] are saring o become more prominen. These ools enable adminisraors o regulae he access righs and o have an overview of he aciviies and consolidaion of common sysem logs for all virual machines. However, his visibiliy of he virual layer is sill no he full ransparency requesed by end-users [1] surveyed by he Fujisu Research Insiue, which saes ha % of hese users wan /11 $6. 11 IEEE DOI 1.119/TrusCom

2 o know exacly wha goes on in he physical servers hosing he gues machines. D. Cloud Sysems Healh and Performance Monioring When here is menion of monioring, here is a curren emphasis of monioring he server performance in Clouds. Such a focus on sysem monioring is no oally aligned o he acual needs of users. Despie having color schemes, visualizaions and aracive dashboards, ools such as VMWare vfabric Hyperic [11] and CloudKick [1] are sill unable o offer he crucial need of monioring daa movemens and ransfers in he Cloud. III. NEW BREED OF LOGGERS REQUIRED I is now eviden from observing he limiaions of he sae-of-he-ar ha we need he following necessary requiremens for effecive monioring of daa in he Cloud: Transcend VM/ PM - I mus be in kernel space, and mus be able o ranscend boh virual and physical spaces in he Cloud, providing full ransparency of all operaions in he Cloud. Provenance - I mus provide a full or a summarized/ concise provenance of daa life cycles and ransfers in he Cloud. This is also in andem wih he increase in he emphasis of daa governance [13] and accounabiliy [1]. Single Audiable View - I mus be able o provide a single consolidaed repor for inspecion. Efficien sorage - I mus be efficien in boh shor erm sorage and long erm archival. Analyics I mus provide audiing feaures o enable srong analyics and quick observaions of fooprins of file aciviies and ransfers. Wih he above lis in mind, we propose Flogger (shor for File-Cenric Logger), a novel file-cenric logger ha can be implemened in boh VM and PM kernels in a noninvasive manner wihin nodes in he Cloud. IV. FLOGGER - ARCHITECTURE AND DESIGN A. Flogger Addresses he Sysem Layer of he TrusCloud Framework Flogger addresses he needs of sysem layer wihin he TrusCloud Framework [1]. TrusCloud is a layered framework describing he differen layers of granulariy for Cloud accounabiliy. The Sysem Layer in he framework highlighed he imporance of monioring and audiing conainers of daa (e.g. files) wihin and ou of he Cloud. Wih he foundaional Sysem Layer, we can hen sudy movemen and changes of daa wihin and across files (Daa Layer), and also workflows and daa flows (Workflow Layer) hus giving full provenance of daa in he Cloud and in compliance o he Law/ Regulaion Layer and he Policies Layer. Furher descripions of issues relaed o hese layers of accounabiliy are described in [1]. B. Flogger Componens and Archiecure Figure 1 shows Floggers and heir accompanying componens, and demonsraes he underlying mechanisms capuring file acions and movemens from he underlying kernel space (depiced by he numeric sequence in Figure 1). A simple example of he resuling file-cenric log (in shor, flog ) capured by boh a VM and is hos PM is shown in Figure. 1) Componens The ypical implemenaion consiss of he following componens (See Figure 1): Flogger (Linux) A Linux Loadable Kernel Module (LKM) running on VM which inerceps file and nework operaions and wries he evens as VM flogs. Flogger (Windows) A Windows Device Driver running on PM which inerceps file operaions and wries he evens as PM flogs. Componens accompanying Flogger - File Sender Clien program running on VM which ransfers he VM log files from VM o PM via a direc communicaion channel. - File Sender daemon running on VM which regularly execues he File Sender Clien program. - File Sender Server program running on hos PMs which receives he VM log files sen by he File Sender Clien program. - Two Daabase Loader daemons running on PM. The firs one regularly loads he VM log files ino a remoe daabase server. The second one regularly loads he PM log files ino he same remoe daabase server. Wih hese componens, we can hen view and analyze he consolidaed VM and PM flogs using any daabase fronend ools or in spreadshee ools reading comma-separaed value (CSV)/ ab-separaed value (TSV) files. ) How Flogger Works Flogger capures file-cenric logs (a.k.a. flogs) via he following seps (wih reference o he labels in Figure 1): Sep 1: Linux Flogger/ Windows Flogger inercep every file access in he VMs. The Floggers capure he following informaion (Flog Subse A) (non-exhausive lis): VM Accessed file name and full pah e.g. /home/users/john/docs/sensiive. VM File access dae/ime VM IP address VM MAC address Machine ype i.e. VM or PM UID of file owner of he accessed file GID of file owner of he accessed file UID of process owner who accessed he file GID of process owner who accessed he file Acion done o accessed file e.g. Creae, Read, Wrie, Socke (Send Message), Socke (Receive Message), Delee I is imporan o noe ha he lis in Flog Subse A is no exhausive and more aribues are added o make he sysem more robus, e.g. more imesamps. 766

3 Figure 1. Archiecure and flow of ineracions and informaion passing beween Flogger componens Figure. Sample consolidaed file-cenric log (flog) exraced from querying he log sorage 767

4 No. (Included for his paper) filename full_pah ~ c/ c/ c/ c/ c/ c/ c/ ~ c/ c/ c/ c/ c/ u i d g i d Table 1: Exraced columns from flogs of Scenario 1 file_ user nam e pid p_uid alice 4436 alice 3 alice 4436 alice 3 alice 44 alice 3 alice 44 alice 3 alice 44 alice 3 alice 44 alice alice 44 alice alice 44 alice 3 alice 44 alice 3 alice 49 alice 3 alice 49 alice 3 alice bob proce ss_us ernam e vm_ip4 vm_ip6 vm_mac fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 fe c9fffec bc44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 :c:9:c :bc:44 vm_ine rface eh eh eh eh eh eh eh eh eh eh eh eh dae_ime :: :: :6: :7: :7: :7: :7: :7: :7: :: :: ::34+ imeva l_sec imeval_u sec vm_ip 4_raw acion Creae Read Read Wrie Read Rename (Old File) Rename (New File) Rename (New File) Read Read Read Read Sep 1 : Jus like VMs, PMs also have Floggers which inercep he PMs file sysem calls and hen sores hem in he Daa Sore. Sep : Afer he file life-cycle relaed informaion are capured, hey are sen o he hos PM. The VM Flogger direcly sends he capured informaion (Flog Subse A) o PM Receiver Daemon via a Communicaion Channel beween VM and PM. The Communicaion Channel is special mechanism available on ypical hypervisors which enable a serial cable-like communicaion beween VMs and PMs. I does no involve neworking ransfers. Hence, no VM Flogger ransfer Flogs o PM File Sender Servers via nework ransfers. This increases he securiy of he ransfer of Flogs. Sep 3: VM File Sender Daemon regularly execues he File Sender Clien which reads he File Access Deails (Flog Subse A) and sends hem o he PM via he Communicaion Channel beween VM and PM. Sep 4: PM File Sender Server receives he File Access Deails (Flog Subse A) from VM File Sender Clien via he Communicaion Channel beween VM and PM. Sep : PM Flogger generaes oher PM informaion (Flog Subse B), for example (bu no limied o): PM IP address PM MAC address Sep 6: The PM Flogger sends Subse B o PM File Sender Server. Subses A & B will give users a consolidaed se of informaion (i.e. Flog) which can pinpoin he VMs and PMs involved in each file s life cycle o enable full accounabiliy of disribued VM and PM archiecures, e.g. Cloud compuing. Sep 7: Wihin he PM Subne, he PM Daabase loader daemons wrie he join/ consolidaed informaion (boh Subse A & Subse B) o a Daa Sore e.g. daabase for fuure daa mining and reporing. Noe ha all he consolidaion of he Flogs across PMs ino he Daa Sore ake place only in he PM Subne. Users in he VM Subne should have no 76

5 awareness of hese behind-he-scenes seps. I is also noeworhy o know ha we have no decided on he exac shor, medium and long erm sorage of flogs, as his require anoher se of I/O experimens agains benchmarks and scale. V. RESULTS AND EXAMPLE SCENARIOS This paper repors our iniial experimens focusing on deploying Floggers o capure flogs across VMs and PMs for a Cloud, and also o demonsrae ha we are able o join he informaion for VMs and heir underlying hos PMs. This gives a comprehensive overview of he file-cenric accesses and ransfers wihin a ypical Cloud. Many oher research opics and quesions were raised and hey will be covered in Secion VI. A. Environmens Experimens Conduced In In order o prove he concep of Flogger, we have developed and run he implemenaion of Flogger on he following operaing sysems: Flogger (Linux) in he Linux Family o CenOS.3 o Fedora 1 o Ubunu 11.4 Flogger (Windows) in he Windows Family o Windows XP Professional SP3 o Windows Server R Flogs generaed were also pushed ino daabases via he DB loaders. Experimens were conduced agains he prominen open-source row-based relaional daabase PosgreSQL 9. and in preparaion for daa analyical needs over flogs, we also experimened wih he column-sore MoneDB. B. Use Case Scenarios To illusrae he Flogger in acion, we will explain wo example scenarios. I is imporan o noe he number of scenarios is no exhausive, and hey serve o enhance he appreciaion of he usage and poenial of Flogger. 1) Example Scenario 1: Recording and Deecion of Unauhorized User Accessing a File In his scenario, a ficiious user Alice creaes a sensiive documen () and modified he documen. Some ime laer, anoher user Bob reads he sensiive documen wihou Alice s permission. Table 1 shows a subse of he columns and resuls of flogs from a VM as a resul of enacing his scenario. The log rows number 1 o 11, excluding 6 o, depic Alice creaing and modifying he sensiive documen. The log rows number 6 o (he Rename operaions) depic he ex edior doing some behind-he-scene housekeeping operaions during a save operaion. Ineresingly, he log row number 1 depics Bob reading he sensiive documen wihou Alice s permission. Noe ha Bob s username is displayed in row 1 insead of Alice s username. ) Example Scenario : Capuring of File Transfers Across VMs in he Cloud In he nex scenario, we show Flogger capuring file ransfers wihin he Cloud. The firs VM running CenOS.3 sends a file (escopy.) via he Linux program scp (Secure Copy) o he second VM running Ubunu In Figures 3(a) o 3(d), he sender VM log rows number and 7 depic he nework operaions (Socke (Send Message)) when he firs VM is sending he file. (We have spli up he able ino pars a o d due o space reasons). (a) (b) (c) (d) Figure 3. Exrac from Scenario Sender Logs (a) (b) (c) (d) Figure 4. Exrac from Scenario Receiver Logs In Figures 4(a) o 4(d), he receiver VM log row number 14 depics one of he nework operaions (Socke (Receive Message)) when he second VM is receiving he file. Noe: mos of he receiver log rows have been hidden due o space consrain. Noe ha a he same ime, corresponding physical machine logs are also generaed in heir underlying PMs during he scp ransfer. Boh ses of VM and PM logs can hen be joined for furher analysis and forensics. 769

6 Figures and 6 below depic he Socke (Send Message) and Socke (Receive Message) respecively being capured in he Linux kernel message log. Figure. Scenario Sender Kernel Message Log File Figure 6. Scenario Receiver Kernel Message Log File C. Provenance from Logs From he wo scenarios, we can now visualize he daa provenance poenial informaion ha Floggers can provide for Cloud end-users, adminisraors and even regulaors. Virual machine file access and ransfers are logged wih heir corresponding file sysem calls in he physical hoss. Such correlaion gives a good ransparency of he locaion of files wihin a Cloud, and analyical ools can be buil over hese flogs o le people answer quesions such as Are my files really deleed in his Cloud? or Can I see who has accessed my sensiive file in his Cloud?. VI. CURRENT AND FUTURE WORK The developmen of Floggers and he successful consolidaion of simulaneously-generaed VM and PM filecenric logs addressed he need for higher Cloud accounabiliy and ransparency, bu also revealed limiaions and several compelling fuure research direcions: A. Inegriy and Securiy of he Logger and Logs A he momen, flogs are passed securely down he communicaion channels from he VMs o heir hos PMs. As such, here is no nework ransfer of flogs a he virual layer and he VM subne (see Figure 1). Flogs consolidaed a he PMs are sen o he daa sore wihin he PM subne. Securiy of he Floggers also depends on he inegriy of he machine kernels in he Cloud. However, he assumpion of he kernel inegriy is insufficien. Vulnerabiliies may exis when PMs are ransferring logs o he daabase sorage. Auhenicaion or simple clien puzzles-like proocols beween PMs and he sorage may be inroduced when flogs are ransferred. There is also a need for flogs o remain amper-proof and immuable. These requiremens are our curren op prioriies. B. Scale and Log Daa Size Explosion Compared o sysem-cenric logs (e.g. even logs, sysem logs, or user accoun aciviy logs), file-cenric logs (flogs) grow a a relaively higher rae. In one of our experimens, a file creaed in a word processing applicaion generaed up o approximaely 9, file aciviies wihin 3 minues even hough user-riggered aciviies (e.g. wrie) are kep o he minimum. I was laer revealed ha is auomaic backup feaures was enabled, causing i o be exremely chay. We are also aware ha he prospec of flogs ougrowing he size of he acual files o be racked is a realisic one. However, he concerns of he exponenial growh of logs may be miigaed by our curren aemps in exploring iered sorage and archival [1], de-duplicaion and summarizaion echniques. C. Rules for Applicaion Fooprins Capured in Flogs In our experimen, we also noe an ineresing observaion of recurring fooprins for differen ypes of sofware. This opens he possibiliy of creaing heurisics and rules for idenificaion of anomalies and aacks in he Cloud. D. Visualizaions Wih he large amoun of daa colleced, i is perhaps a good idea o formulae differen ypes of useful exploraory and presenaion visualizaions for he discovery and presenaion of noable rends and paerns in he flogs. Visualizaion needs for end-users, adminisraors and regulaors are differen. For example, Cloud service providers may only offer end-users knowledge abou he high-level geography wihou revealing specific daa ceners locaions. End-users can sill know if heir daa has violaed 77

7 cross-geography policies of daa ransfers. On he oher hand, regulaors may be graned special access accouns o visualize and audi he compliance of full daa flows wihin he Cloud. E. Linkage wih Governance, Regulaion and Compliance (GRC) needs Wih he daa accesses and ransfers logged by Flogger, auomaic audiing and high availabiliy of daa flow informaion are now realisic fuures in he Cloud. This is also inline wih he vision of he Workflow Layer in he TrusCloud framework[1]. VII. CONCLUDING REMARKS In his paper, we emphasized he imporance of a filecenric deecive measures for increasing rus in he Cloud. We also demonsraed he increase of ransparency and accounabiliy of he Cloud via he novel file-cenric logging mechanisms known as Floggers. Curren sysem logs only focuses on general sysem healh indicaors (e.g. upimes, processor usage, evens, ec). There is no focus on he life cycles of files sored in he file sysems across boh VM and PM. Our echnique has addressed he need for a file-cenric logging wihin neworks of PMs hosing muliple-folds of VMs. Moreover, curren sysem logs are sandalones kep wihin each VM or PM, and a bes, across muliple VMs or PMs, bu never consolidaed or managed across boh VM and PM simulaneously. There is a need for users o be aware of he exac VMs and he physical locaions of underlying PMs ha hey have sored daa in. Our echnique, Flogger, has addressed his by logging file life-cycle relaed evens on boh VMs and heir underlying hos PMs. Floggers can be applied ino boh privae and public Cloud compuing environmens. Because of he serviceoriened naure of Cloud services, Cloud users no longer need o own and mainain heir own PMs, bu raher, sore heir informaion in he Cloud, wihou he need o be concerned of he vendors server sysem healh indicaors. Our echnique will enable sysem adminisraors and endusers o audi file life cycles, access and ransfer hisories. File-cenric logs, or flogs, colleced by Floggers will also enable sysem adminisraors and end-users o idenify boh he virual and physical locaion of original and duplicae files o faciliae accounabiliy, IT forensics and racking of criminal aciviies wihin a Cloud provider s servers. The iniial experimens show a lo of promise. While here is much fuure work involved, we srongly feel ha his is he exciing beginning of he disribued VM/PM filecenric logging paradigm for Cloud compuing. Miranda Mowbray from he TrusCloud research projec [1] for heir valuable criique and feedback. REFERENCES [1] R.K.L. Ko, P. Jagadpramana, M. Mowbray, S. Pearson, M. Kirchberg, Q. Liang and B.S. Lee, TrusCloud - A Framework for Accounabiliy and Trus in Cloud Compuing, Proc. IEEE nd Cloud Forum for Praciioners (IEEE ICFP 11), IEEE Compuer Sociey, 11, pp. 1-. [] R.K.L. Ko, B.S. Lee and S. Pearson, Towards Achieving Accounabiliy, Audiabiliy and Trus in Cloud Compuing, Proc. Inernaional workshop on Cloud Compuing: Archiecure, Algorihms and Applicaions (CloudComp11), Springer, 11, pp. -1. [3] A.J.G. Hey, S. Tansley and K.M. Tolle, The fourh paradigm: daa-inensive scienific discovery, Microsof Research Redmond, WA, 9. [4] S. Sakr, A. Liu, D. Baisa and M. Alomari, A Survey of Large Scale Daa Managemen Approaches in Cloud Environmens, Communicaions Surveys & Tuorials, IEEE, no. 99, pp [] R. Love, Kernel Korner: Inro o inoify, Linux Journal, vol., no. 139,, pp.. [6] S.E. Hansen and E.T. Akins, Auomaed sysem monioring and noificaion wih swach, USENIX Associaion s Proceedings of he Sevenh Sysems Adminisraion (LISA VII) Conference, [7] Silicon Graphics Inernaional Corp, File Aleraion Monior (FAM) Overview, 9; hp://oss.sgi.com/projecs/fam/. [] M. Roesch, Snor-lighweigh inrusion deecion for neworks, Proc. 13h Large Insallaion Sysem Adminisraion Conference (LISA), 1999, pp [9] HyTrus, HyTrus Appliance, 1; hp:// [1] Fujisu Research Insiue, Personal daa in he cloud: A global survey of consumer aiudes, 1; hp:// [11] VMWare Hyperic, Performance Monioring for Cloud Services, 11; hp:// [1] CloudKick, CloudKick - Cloud Monioring and Managemen, 11; hps:// [13] Cloud Securiy Alliance, Securiy Guidance for Criical Areas of Focus in Cloud Compuing V.16, 9; hps://cloudsecuriyalliance.org/csaguide.pdf. ACKNOWLEDGMENTS We would like o hank our colleagues Markus Kirchberg, Teck Hooi Lim, Alan Tan, Chun Hui Suen, Ahmed Aneeh, Ahmed Rifau Rasheed, Siani Pearson, and 771

Simple Network Management Based on PHP and SNMP

Simple Network Management Based on PHP and SNMP Simple Nework Managemen Based on PHP and SNMP Krasimir Trichkov, Elisavea Trichkova bsrac: This paper aims o presen simple mehod for nework managemen based on SNMP - managemen of Cisco rouer. The paper

More information

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version

Test - Accredited Configuration Engineer (ACE) Exam - PAN-OS 6.0 Version Tes - Accredied Configuraion Engineer (ACE) Exam - PAN-OS 6.0 Version ACE Exam Quesion 1 of 50. Which of he following saemens is NOT abou Palo Alo Neworks firewalls? Sysem defauls may be resored by performing

More information

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR

PART 1 REFERENCE INFORMATION CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONITOR . ~ PART 1 c 0 \,).,,.,, REFERENCE NFORMATON CONTROL DATA 6400 SYSTEMS CENTRAL PROCESSOR MONTOR n CONTROL DATA 6400 Compuer Sysems, sysem funcions are normally handled by he Monior locaed in a Peripheral

More information

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes.

Sam knows that his MP3 player has 40% of its battery life left and that the battery charges by an additional 12 percentage points every 15 minutes. 8.F Baery Charging Task Sam wans o ake his MP3 player and his video game player on a car rip. An hour before hey plan o leave, he realized ha he forgo o charge he baeries las nigh. A ha poin, he plugged

More information

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report)

Implementing Ray Casting in Tetrahedral Meshes with Programmable Graphics Hardware (Technical Report) Implemening Ray Casing in Terahedral Meshes wih Programmable Graphics Hardware (Technical Repor) Marin Kraus, Thomas Erl March 28, 2002 1 Inroducion Alhough cell-projecion, e.g., [3, 2], and resampling,

More information

Lecture 18: Mix net Voting Systems

Lecture 18: Mix net Voting Systems 6.897: Advanced Topics in Crypography Apr 9, 2004 Lecure 18: Mix ne Voing Sysems Scribed by: Yael Tauman Kalai 1 Inroducion In he previous lecure, we defined he noion of an elecronic voing sysem, and specified

More information

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding

Analysis of Various Types of Bugs in the Object Oriented Java Script Language Coding Indian Journal of Science and Technology, Vol 8(21), DOI: 10.17485/ijs/2015/v8i21/69958, Sepember 2015 ISSN (Prin) : 0974-6846 ISSN (Online) : 0974-5645 Analysis of Various Types of Bugs in he Objec Oriened

More information

The Impact of Product Development on the Lifecycle of Defects

The Impact of Product Development on the Lifecycle of Defects The Impac of Produc Developmen on he Lifecycle of Rudolf Ramler Sofware Compeence Cener Hagenberg Sofware Park 21 A-4232 Hagenberg, Ausria +43 7236 3343 872 rudolf.ramler@scch.a ABSTRACT This paper invesigaes

More information

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems

Why not experiment with the system itself? Ways to study a system System. Application areas. Different kinds of systems Simulaion Wha is simulaion? Simple synonym: imiaion We are ineresed in sudying a Insead of experimening wih he iself we experimen wih a model of he Experimen wih he Acual Ways o sudy a Sysem Experimen

More information

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a

Design and Application of Computer-aided English Online Examination System NONG DeChang 1, a 3rd Inernaional Conference on Maerials Engineering, Manufacuring Technology and Conrol (ICMEMTC 2016) Design and Applicaion of Compuer-aided English Online Examinaion Sysem NONG DeChang 1, a 1,2 Guangxi

More information

A time-space consistency solution for hardware-in-the-loop simulation system

A time-space consistency solution for hardware-in-the-loop simulation system Inernaional Conference on Advanced Elecronic Science and Technology (AEST 206) A ime-space consisency soluion for hardware-in-he-loop simulaion sysem Zexin Jiang a Elecric Power Research Insiue of Guangdong

More information

Chapter 8 LOCATION SERVICES

Chapter 8 LOCATION SERVICES Disribued Compuing Group Chaper 8 LOCATION SERVICES Mobile Compuing Winer 2005 / 2006 Overview Mobile IP Moivaion Daa ransfer Encapsulaion Locaion Services & Rouing Classificaion of locaion services Home

More information

COSC 3213: Computer Networks I Chapter 6 Handout # 7

COSC 3213: Computer Networks I Chapter 6 Handout # 7 COSC 3213: Compuer Neworks I Chaper 6 Handou # 7 Insrucor: Dr. Marvin Mandelbaum Deparmen of Compuer Science York Universiy F05 Secion A Medium Access Conrol (MAC) Topics: 1. Muliple Access Communicaions:

More information

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional);

Network management and QoS provisioning - QoS in Frame Relay. . packet switching with virtual circuit service (virtual circuits are bidirectional); QoS in Frame Relay Frame relay characerisics are:. packe swiching wih virual circui service (virual circuis are bidirecional);. labels are called DLCI (Daa Link Connecion Idenifier);. for connecion is

More information

Voltair Version 2.5 Release Notes (January, 2018)

Voltair Version 2.5 Release Notes (January, 2018) Volair Version 2.5 Release Noes (January, 2018) Inroducion 25-Seven s new Firmware Updae 2.5 for he Volair processor is par of our coninuing effors o improve Volair wih new feaures and capabiliies. For

More information

A Matching Algorithm for Content-Based Image Retrieval

A Matching Algorithm for Content-Based Image Retrieval A Maching Algorihm for Conen-Based Image Rerieval Sue J. Cho Deparmen of Compuer Science Seoul Naional Universiy Seoul, Korea Absrac Conen-based image rerieval sysem rerieves an image from a daabase using

More information

BI-TEMPORAL INDEXING

BI-TEMPORAL INDEXING BI-TEMPORAL INDEXING Mirella M. Moro Uniersidade Federal do Rio Grande do Sul Poro Alegre, RS, Brazil hp://www.inf.ufrgs.br/~mirella/ Vassilis J. Tsoras Uniersiy of California, Rierside Rierside, CA 92521,

More information

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks

Service Oriented Solution Modeling and Variation Propagation Analysis based on Architectural Building Blocks Carnegie Mellon Universiy From he SelecedWorks of Jia Zhang Ocober, 203 Service Oriened Soluion Modeling and Variaion Propagaion Analysis based on Archiecural uilding locks Liang-Jie Zhang Jia Zhang Available

More information

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany

Low-Cost WLAN based. Dr. Christian Hoene. Computer Science Department, University of Tübingen, Germany Low-Cos WLAN based Time-of-fligh fligh Trilaeraion Precision Indoor Personnel Locaion and Tracking for Emergency Responders Third Annual Technology Workshop, Augus 5, 2008 Worceser Polyechnic Insiue, Worceser,

More information

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System

User Adjustable Process Scheduling Mechanism for a Multiprocessor Embedded System Proceedings of he 6h WSEAS Inernaional Conference on Applied Compuer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 346 User Adjusable Process Scheduling Mechanism for a Muliprocessor Embedded

More information

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services

Improving the Efficiency of Dynamic Service Provisioning in Transport Networks with Scheduled Services Improving he Efficiency of Dynamic Service Provisioning in Transpor Neworks wih Scheduled Services Ralf Hülsermann, Monika Jäger and Andreas Gladisch Technologiezenrum, T-Sysems, Goslarer Ufer 35, D-1585

More information

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably.

I. INTRODUCTION. Keywords -- Web Server, Perceived User Latency, HTTP, Local Measuring. interchangeably. Evaluaing Web User Perceived Laency Using Server Side Measuremens Marik Marshak 1 and Hanoch Levy School of Compuer Science Tel Aviv Universiy, Tel-Aviv, Israel mmarshak@emc.com, hanoch@pos.au.ac.il 1

More information

Using CANopen Slave Driver

Using CANopen Slave Driver CAN Bus User Manual Using CANopen Slave Driver V1. Table of Conens 1. SDO Communicaion... 1 2. PDO Communicaion... 1 3. TPDO Reading and RPDO Wriing... 2 4. RPDO Reading... 3 5. CANopen Communicaion Parameer

More information

Learning in Games via Opponent Strategy Estimation and Policy Search

Learning in Games via Opponent Strategy Estimation and Policy Search Learning in Games via Opponen Sraegy Esimaion and Policy Search Yavar Naddaf Deparmen of Compuer Science Universiy of Briish Columbia Vancouver, BC yavar@naddaf.name Nando de Freias (Supervisor) Deparmen

More information

4 Error Control. 4.1 Issues with Reliable Protocols

4 Error Control. 4.1 Issues with Reliable Protocols 4 Error Conrol Jus abou all communicaion sysems aemp o ensure ha he daa ges o he oher end of he link wihou errors. Since i s impossible o build an error-free physical layer (alhough some shor links can

More information

Gauss-Jordan Algorithm

Gauss-Jordan Algorithm Gauss-Jordan Algorihm The Gauss-Jordan algorihm is a sep by sep procedure for solving a sysem of linear equaions which may conain any number of variables and any number of equaions. The algorihm is carried

More information

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM

BEST DYNAMICS NAMICS CRM A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM DYNAMICS CR A Publicaion by elogic s fines Microsof Dynamics CRM Expers { ICS CRM BEST OF 2014 A COMPILATION OF TECH-TIPS TO HELP YOUR BUSINESS SUCCEED WITH DYNAMICS CRM NAMICS CRM { DYNAMICS M INTRODUCTION

More information

Assignment 2. Due Monday Feb. 12, 10:00pm.

Assignment 2. Due Monday Feb. 12, 10:00pm. Faculy of rs and Science Universiy of Torono CSC 358 - Inroducion o Compuer Neworks, Winer 218, LEC11 ssignmen 2 Due Monday Feb. 12, 1:pm. 1 Quesion 1 (2 Poins): Go-ack n RQ In his quesion, we review how

More information

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The

source managemen, naming, proecion, and service provisions. This paper concenraes on he basic processor scheduling aspecs of resource managemen. 2 The Virual Compuers A New Paradigm for Disribued Operaing Sysems Banu Ozden y Aaron J. Goldberg Avi Silberschaz z 600 Mounain Ave. AT&T Bell Laboraories Murray Hill, NJ 07974 Absrac The virual compuers (VC)

More information

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012

Scheduling. Scheduling. EDA421/DIT171 - Parallel and Distributed Real-Time Systems, Chalmers/GU, 2011/2012 Lecture #4 Updated March 16, 2012 EDA421/DIT171 - Parallel and Disribued Real-Time Sysems, Chalmers/GU, 2011/2012 Lecure #4 Updaed March 16, 2012 Aemps o mee applicaion consrains should be done in a proacive way hrough scheduling. Schedule

More information

Video Content Description Using Fuzzy Spatio-Temporal Relations

Video Content Description Using Fuzzy Spatio-Temporal Relations Proceedings of he 4s Hawaii Inernaional Conference on Sysem Sciences - 008 Video Conen Descripion Using Fuzzy Spaio-Temporal Relaions rchana M. Rajurkar *, R.C. Joshi and Sananu Chaudhary 3 Dep of Compuer

More information

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch

MIC2569. Features. General Description. Applications. Typical Application. CableCARD Power Switch CableCARD Power Swich General Descripion is designed o supply power o OpenCable sysems and CableCARD hoss. These CableCARDs are also known as Poin of Disribuion (POD) cards. suppors boh Single and Muliple

More information

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl

Po,,ll. I Appll I APP2 I I App3 I. Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl Illll Illlllll II Illlll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illll Illlll Illl Illl Illl US 20110153728A1 (19) nied Saes (12) Paen Applicaion Publicaion (10) Pub. No.: S 2011/0153728

More information

4. Minimax and planning problems

4. Minimax and planning problems CS/ECE/ISyE 524 Inroducion o Opimizaion Spring 2017 18 4. Minima and planning problems ˆ Opimizing piecewise linear funcions ˆ Minima problems ˆ Eample: Chebyshev cener ˆ Muli-period planning problems

More information

Accenture Report Documentum 4i on NetApp filers Deployment Guide

Accenture Report Documentum 4i on NetApp filers Deployment Guide Accenure Repor Documenum 4i on NeApp filers Deploymen Guide Documen Purpose This projec was conduced by Accenure o research & develop a Nework Appliance filer and Documenum 4i Deploymen Guide. This documen

More information

Handling uncertainty in semantic information retrieval process

Handling uncertainty in semantic information retrieval process Handling uncerainy in semanic informaion rerieval process Chkiwa Mounira 1, Jedidi Anis 1 and Faiez Gargouri 1 1 Mulimedia, InfoRmaion sysems and Advanced Compuing Laboraory Sfax Universiy, Tunisia m.chkiwa@gmail.com,

More information

Optimal Crane Scheduling

Optimal Crane Scheduling Opimal Crane Scheduling Samid Hoda, John Hooker Laife Genc Kaya, Ben Peerson Carnegie Mellon Universiy Iiro Harjunkoski ABB Corporae Research EWO - 13 November 2007 1/16 Problem Track-mouned cranes move

More information

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks

Less Pessimistic Worst-Case Delay Analysis for Packet-Switched Networks Less Pessimisic Wors-Case Delay Analysis for Packe-Swiched Neworks Maias Wecksén Cenre for Research on Embedded Sysems P O Box 823 SE-31 18 Halmsad maias.wecksen@hh.se Magnus Jonsson Cenre for Research

More information

Managing XML Versions and Replicas in a P2P Context

Managing XML Versions and Replicas in a P2P Context Managing XML Versions and Replicas in a P2P Conex Deise de Brum Saccol1 1,2, Nina Edelweiss 2, Renaa de Maos Galane 2,4, Carlo Zaniolo 3 2 Insiuo de Informáica - Universidade Federal do Rio Grande do Sul

More information

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs

On the Impact of Concurrency for the Enforcement of Entailment Constraints in Process-driven SOAs On he Impac of Concurrency for he Enforcemen of Enailmen Consrains in Process-driven OAs Thomas Quirchmayr and Mark rembeck Insiue for Informaion ysems, New Media Lab, WU Vienna, Ausria {firsname.lasname}@wu.ac.a

More information

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY

AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY AN ACCESS CONTROL MODEL OF VIRTUAL MACHINE SECURITY QIN Zhong-yuan 1,3, CHEN Qi 2, LV You 2, QIANG Yong 2, GUO Ai-wen 2, SHEN Ri-sheng 1,3, Zhang Qunfang 4 1 Informaion Science and Engineering School,

More information

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008

MATH Differential Equations September 15, 2008 Project 1, Fall 2008 Due: September 24, 2008 MATH 5 - Differenial Equaions Sepember 15, 8 Projec 1, Fall 8 Due: Sepember 4, 8 Lab 1.3 - Logisics Populaion Models wih Harvesing For his projec we consider lab 1.3 of Differenial Equaions pages 146 o

More information

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems

SEINA: A Stealthy and Effective Internal Attack in Hadoop Systems SEINA: A Sealhy and Effecive Inernal Aack in Hadoop Sysems Jiayin Wang, Teng Wang, Zhengyu Yang, Ying ao, Ningfang i, and Bo Sheng Deparmen of Compuer Science, Universiy of assachuses Boson, 1 orrissey

More information

Chapter 3 MEDIA ACCESS CONTROL

Chapter 3 MEDIA ACCESS CONTROL Chaper 3 MEDIA ACCESS CONTROL Overview Moivaion SDMA, FDMA, TDMA Aloha Adapive Aloha Backoff proocols Reservaion schemes Polling Disribued Compuing Group Mobile Compuing Summer 2003 Disribued Compuing

More information

A NEW APPROACH FOR 3D MODELS TRANSMISSION

A NEW APPROACH FOR 3D MODELS TRANSMISSION A NEW APPROACH FOR 3D MODELS TRANSMISSION A. Guarnieri a, F. Piroi a, M. Ponin a, A. Veore a a CIRGEO, Inerdep. Research Cener of Carography, Phoogrammery, Remoe Sensing and GIS Universiy of Padova, Agripolis

More information

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game

The Beer Dock: Three and a Half Implementations of the Beer Distribution Game The Beer Dock 2002-08-13 17:55:44-0700 The Beer Dock: Three and a Half Implemenaions of he Beer Disribuion Game Michael J. Norh[1] and Charles M. Macal Argonne Naional Laboraory, Argonne, Illinois Absrac

More information

Connections, displays and operating elements. 3 aux. 5 aux.

Connections, displays and operating elements. 3 aux. 5 aux. Taser PlusKapiel3:Taser3.1Taser Plus Meren2005V6280-561-0001/08 GB Connecions, displays and operaing elemens Taser Plus Arec/Anik/Trancen Operaing insrucions A 1 2 1 2 3 4 5 6 C B A B 3 aux. 7 8 9 aux.

More information

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471

Location. Electrical. Loads. 2-wire mains-rated. 0.5 mm² to 1.5 mm² Max. length 300 m (with 1.5 mm² cable). Example: Belden 8471 Produc Descripion Insallaion and User Guide Transiser Dimmer (454) The DIN rail mouned 454 is a 4channel ransisor dimmer. I can operae in one of wo modes; leading edge or railing edge. All 4 channels operae

More information

Web System for the Remote Control and Execution of an IEC Application

Web System for the Remote Control and Execution of an IEC Application Web Sysem for he Remoe Conrol and Execuion of an IEC 61499 Applicaion Oana ROHAT, Dan POPESCU Faculy of Auomaion and Compuer Science, Poliehnica Universiy, Splaiul Independenței 313, Bucureși, 060042,

More information

Who Thinks Who Knows Who? Socio-cognitive Analysis of Networks. Technical Report

Who Thinks Who Knows Who? Socio-cognitive Analysis of  Networks. Technical Report Who Thinks Who Knows Who? Socio-cogniive Analysis of Email Neworks Technical Repor Deparmen of Compuer Science and Engineering Universiy of Minnesoa 4-192 EECS Building 200 Union Sree SE Minneapolis, MN

More information

Connections, displays and operating elements. Status LEDs (next to the keys)

Connections, displays and operating elements. Status LEDs (next to the keys) GB Connecions, displays and operaing elemens A Push-buon plus Sysem M Operaing insrucions 1 2 1 2 3 4 5 6 7 8 C B A 4 Inser he bus erminal ino he connecion of pushbuon A. 5 Inser he push-buon ino he frame.

More information

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages

An HTTP Web Traffic Model Based on the Top One Million Visited Web Pages An HTTP Web Traffic Model Based on he Top One Million Visied Web Pages Rasin Pries, Zsol Magyari, Phuoc Tran-Gia Universiy of Würzburg, Insiue of Compuer Science, Germany Email: {pries,rangia}@informaik.uni-wuerzburg.de

More information

LHP: An end-to-end reliable transport protocol over wireless data networks

LHP: An end-to-end reliable transport protocol over wireless data networks LHP: An end-o-end reliable ranspor proocol over wireless daa neworks Xia Gao, Suhas N. Diggavi, S. Muhukrishnan Absrac The nex generaion wireless neworks are posied o suppor large scale daa applicaions.

More information

Visual Indoor Localization with a Floor-Plan Map

Visual Indoor Localization with a Floor-Plan Map Visual Indoor Localizaion wih a Floor-Plan Map Hang Chu Dep. of ECE Cornell Universiy Ihaca, NY 14850 hc772@cornell.edu Absrac In his repor, a indoor localizaion mehod is presened. The mehod akes firsperson

More information

MB86297A Carmine Timing Analysis of the DDR Interface

MB86297A Carmine Timing Analysis of the DDR Interface Applicaion Noe MB86297A Carmine Timing Analysis of he DDR Inerface Fujisu Microelecronics Europe GmbH Hisory Dae Auhor Version Commen 05.02.2008 Anders Ramdahl 0.01 Firs draf 06.02.2008 Anders Ramdahl

More information

Reliability Analysis for Cryptographic Key Management

Reliability Analysis for Cryptographic Key Management Reliabiliy Analysis for Crypographic Key Managemen 1 Sheng Xiao, 2 Weibo Gong, 3 Don Towsley, 4, 5 Qingquan Zhang, 5 Ting Zhu 1 College of Informaion Science and Engineering, Hunan Universiy, China 2 Dep.

More information

Window Query and Analysis on Massive Spatio-Temporal Data

Window Query and Analysis on Massive Spatio-Temporal Data Available online a www.sciencedirec.com ScienceDirec IERI Procedia 10 (2014 ) 138 143 2014 Inernaional Conference on Fuure Informaion Engineering Window Query and Analysis on Massive Spaio-Temporal Daa

More information

Adding Time to an Object-Oriented Versions Model

Adding Time to an Object-Oriented Versions Model Insiuo de Informáica Universidade Federal do Rio Grande do Sul Poro Alegre - RS - BRAZIL Adding Time o an Objec-Oriened Versions Model Mirella Moura Moro Nina Edelweiss Silvia Maria Saggiorao Clesio Saraiva

More information

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES

MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES MORPHOLOGICAL SEGMENTATION OF IMAGE SEQUENCES B. MARCOTEGUI and F. MEYER Ecole des Mines de Paris, Cenre de Morphologie Mahémaique, 35, rue Sain-Honoré, F 77305 Fonainebleau Cedex, France Absrac. In image

More information

IDEF3 Process Description Capture Method

IDEF3 Process Description Capture Method IDEF3 Process Descripion Capure Mehod IDEF3 is par of he IDEF family of mehods developmen funded by he US Air Force o provide modelling suppor for sysems engineering and enerprise inegraion 2 IDEF3 Mehod

More information

CENG 477 Introduction to Computer Graphics. Modeling Transformations

CENG 477 Introduction to Computer Graphics. Modeling Transformations CENG 477 Inroducion o Compuer Graphics Modeling Transformaions Modeling Transformaions Model coordinaes o World coordinaes: Model coordinaes: All shapes wih heir local coordinaes and sies. world World

More information

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory

CS 152 Computer Architecture and Engineering. Lecture 6 - Memory CS 152 Compuer Archiecure and Engineering Lecure 6 - Memory Krse Asanovic Elecrical Engineering and Compuer Sciences Universiy of California a Berkeley hp://www.eecs.berkeley.edu/~krse hp://ins.eecs.berkeley.edu/~cs152

More information

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng

Accelerating Call Route Query of Multi-domain SIP System via P2P GONG Jing, SHEN Qing-guo, SHEN Huan-sheng 3rd Inernaional Conference on Mecharonics and Informaion Technology (ICMIT 2016) Acceleraing Call Roue Query of Muli-domain IP ysem via P2P GONG Jing, HEN Qing-guo, HEN Huan-sheng College of Communicaions

More information

Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling

Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling Quick Verificaion of Concurren Programs by Ieraively Relaxed Scheduling Parick Mezler, Habib Saissi, Péer Bokor, Neeraj Suri Technische Univerisä Darmsad, Germany {mezler, saissi, pbokor, suri}@deeds.informaik.u-darmsad.de

More information

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS

FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS FIELD PROGRAMMABLE GATE ARRAY (FPGA) AS A NEW APPROACH TO IMPLEMENT THE CHAOTIC GENERATORS Mohammed A. Aseeri and M. I. Sobhy Deparmen of Elecronics, The Universiy of Ken a Canerbury Canerbury, Ken, CT2

More information

1. Function 1. Push-button interface 4g.plus. Push-button interface 4-gang plus. 2. Installation. Table of Contents

1. Function 1. Push-button interface 4g.plus. Push-button interface 4-gang plus. 2. Installation. Table of Contents Chaper 4: Binary inpus 4.6 Push-buon inerfaces Push-buon inerface Ar. no. 6708xx Push-buon inerface 2-gang plus Push-buon inerfacechaper 4:Binary inpusar. no.6708xxversion 08/054.6Push-buon inerfaces.

More information

Video streaming over Vajda Tamás

Video streaming over Vajda Tamás Video sreaming over 802.11 Vajda Tamás Video No all bis are creaed equal Group of Picures (GoP) Video Sequence Slice Macroblock Picure (Frame) Inra (I) frames, Prediced (P) Frames or Bidirecional (B) Frames.

More information

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram

Announcements. TCP Congestion Control. Goals of Today s Lecture. State Diagrams. TCP State Diagram nnouncemens TCP Congesion Conrol Projec #3 should be ou onigh Can do individual or in a eam of 2 people Firs phase due November 16 - no slip days Exercise good (beer) ime managemen EE 122: Inro o Communicaion

More information

Real Time Integral-Based Structural Health Monitoring

Real Time Integral-Based Structural Health Monitoring Real Time Inegral-Based Srucural Healh Monioring The nd Inernaional Conference on Sensing Technology ICST 7 J. G. Chase, I. Singh-Leve, C. E. Hann, X. Chen Deparmen of Mechanical Engineering, Universiy

More information

Coded Caching with Multiple File Requests

Coded Caching with Multiple File Requests Coded Caching wih Muliple File Requess Yi-Peng Wei Sennur Ulukus Deparmen of Elecrical and Compuer Engineering Universiy of Maryland College Park, MD 20742 ypwei@umd.edu ulukus@umd.edu Absrac We sudy a

More information

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters

Michiel Helder and Marielle C.T.A Geurts. Hoofdkantoor PTT Post / Dutch Postal Services Headquarters SHORT TERM PREDICTIONS A MONITORING SYSTEM by Michiel Helder and Marielle C.T.A Geurs Hoofdkanoor PTT Pos / Duch Posal Services Headquarers Keywords macro ime series shor erm predicions ARIMA-models faciliy

More information

Selective Offloading in Mobile Edge Computing for the Green Internet of Things

Selective Offloading in Mobile Edge Computing for the Green Internet of Things EDGE COMPUTING FOR THE INTERNET OF THINGS Selecive Offloading in Mobile Edge Compuing for he Green Inerne of Things Xinchen Lyu, Hui Tian, Li Jiang, Alexey Vinel, Sabia Maharjan, Sein Gjessing, and Yan

More information

STEREO PLANE MATCHING TECHNIQUE

STEREO PLANE MATCHING TECHNIQUE STEREO PLANE MATCHING TECHNIQUE Commission III KEY WORDS: Sereo Maching, Surface Modeling, Projecive Transformaion, Homography ABSTRACT: This paper presens a new ype of sereo maching algorihm called Sereo

More information

FLORIDA INTERNATIONAL UNIVERSITY. Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA

FLORIDA INTERNATIONAL UNIVERSITY. Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA FLORIDA INTERNATIONAL UNIVERSITY Miami, Florida DIMUSE: AN INTEGRATED FRAMEWORK FOR DISTRIBUTED MULTIMEDIA SYSTEM WITH DATABASE MANAGEMENT AND SECURITY SUPPORT A disseraion submied in parial fulfillmen

More information

Improved TLD Algorithm for Face Tracking

Improved TLD Algorithm for Face Tracking Absrac Improved TLD Algorihm for Face Tracking Huimin Li a, Chaojing Yu b and Jing Chen c Chongqing Universiy of Poss and Telecommunicaions, Chongqing 400065, China a li.huimin666@163.com, b 15023299065@163.com,

More information

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2

Data Structures and Algorithms. The material for this lecture is drawn, in part, from The Practice of Programming (Kernighan & Pike) Chapter 2 Daa Srucures and Algorihms The maerial for his lecure is drawn, in par, from The Pracice of Programming (Kernighan & Pike) Chaper 2 1 Moivaing Quoaion Every program depends on algorihms and daa srucures,

More information

(10) Patent No.: US 6,931,558 Bl (57) ABSTRACT ~ :!j 304 ; OS. BMR. & TSM files needed at restore time. Boot ~II backed-up ~ 106

(10) Patent No.: US 6,931,558 Bl (57) ABSTRACT ~ :!j 304 ; OS. BMR. & TSM files needed at restore time. Boot ~II backed-up ~ 106 111111 1111111111111111111111111111111111111111111111111111111111111 US006931558Bl (12) Unied Saes Paen Jeffe e ai. (10) Paen No.: US 6,931,558 Bl (45) Dae of Paen: Aug. 16,2005 (54) COMPUTER RESTORATION

More information

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches

Protecting User Privacy in a Multi-Path Information-Centric Network Using Multiple Random-Caches Chu WB, Wang LF, Jiang ZJ e al. Proecing user privacy in a muli-pah informaion-cenric nework using muliple random-caches. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 585 598 May 27. DOI.7/s39-7-73-2

More information

Improving Ranking of Search Engines Results Based on Power Links

Improving Ranking of Search Engines Results Based on Power Links IPASJ Inernaional Journal of Informaion Technology (IIJIT) Web Sie: hp://www.ipasj.org/iijit/iijit.hm A Publisher for Research Moivaion... Email: edioriiji@ipasj.org Volume 2, Issue 9, Sepember 2014 ISSN

More information

NEWTON S SECOND LAW OF MOTION

NEWTON S SECOND LAW OF MOTION Course and Secion Dae Names NEWTON S SECOND LAW OF MOTION The acceleraion of an objec is defined as he rae of change of elociy. If he elociy changes by an amoun in a ime, hen he aerage acceleraion during

More information

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi:

MOBILE COMPUTING. Wi-Fi 9/20/15. CSE 40814/60814 Fall Wi-Fi: MOBILE COMPUTING CSE 40814/60814 Fall 2015 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018

MOBILE COMPUTING 3/18/18. Wi-Fi IEEE. CSE 40814/60814 Spring 2018 MOBILE COMPUTING CSE 40814/60814 Spring 2018 Wi-Fi Wi-Fi: name is NOT an abbreviaion play on Hi-Fi (high fideliy) Wireless Local Area Nework (WLAN) echnology WLAN and Wi-Fi ofen used synonymous Typically

More information

A Survey on mobility Models & Its Applications

A Survey on mobility Models & Its Applications A Survey on mobiliy Models & Is Applicaions Prof. Vikas Kumar Jain 1, Prof. Raju Sharma 2, Prof. Bhavana Gupa 3 1,2,3 Compuer Science & Engineering, CIST Absrac In his paper, we survey he curren scenario

More information

Delay in Packet Switched Networks

Delay in Packet Switched Networks 1 Delay in Packe Swiched Neworks Required reading: Kurose 1.5 and 1.6 CSE 4213, Fall 2006 Insrucor: N. Vlajic Delay in Packe-Swiched Neworks 2 Link/Nework Performance Measures: hroughpu and delay Link

More information

Detection Tracking and Recognition of Human Poses for a Real Time Spatial Game

Detection Tracking and Recognition of Human Poses for a Real Time Spatial Game Deecion Tracking and Recogniion of Human Poses for a Real Time Spaial Game Feifei Huo, Emile A. Hendriks, A.H.J. Oomes Delf Universiy of Technology The Neherlands f.huo@udelf.nl Pascal van Beek, Remco

More information

Automatic Calculation of Coverage Profiles for Coverage-based Testing

Automatic Calculation of Coverage Profiles for Coverage-based Testing Auomaic Calculaion of Coverage Profiles for Coverage-based Tesing Raimund Kirner 1 and Waler Haas 1 Vienna Universiy of Technology, Insiue of Compuer Engineering, Vienna, Ausria, raimund@vmars.uwien.ac.a

More information

Joint Feature Learning With Robust Local Ternary Pattern for Face Recognition

Joint Feature Learning With Robust Local Ternary Pattern for Face Recognition Join Feaure Learning Wih Robus Local Ternary Paern for Face Recogniion Yuvaraju.M 1, Shalini.S 1 Assisan Professor, Deparmen of Elecrical and Elecronics Engineering, Anna Universiy Regional Campus, Coimbaore,

More information

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering

WINNOWING : Protecting P2P Systems Against Pollution By Cooperative Index Filtering WINNOWING : Proecing P2P Sysems Agains Polluion By Cooperaive Index Filering Kyuyong Shin, Douglas S. Reeves, Injong Rhee, Yoonki Song Deparmen of Compuer Science Norh Carolina Sae Universiy Raleigh, NC

More information

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL

CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL CAMERA CALIBRATION BY REGISTRATION STEREO RECONSTRUCTION TO 3D MODEL Klečka Jan Docoral Degree Programme (1), FEEC BUT E-mail: xkleck01@sud.feec.vubr.cz Supervised by: Horák Karel E-mail: horak@feec.vubr.cz

More information

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers

Packet Scheduling in a Low-Latency Optical Interconnect with Electronic Buffers Packe cheduling in a Low-Laency Opical Inerconnec wih Elecronic Buffers Lin Liu Zhenghao Zhang Yuanyuan Yang Dep Elecrical & Compuer Engineering Compuer cience Deparmen Dep Elecrical & Compuer Engineering

More information

Who thinks who knows who? Socio-Cognitive Analysis of an Network

Who thinks who knows who? Socio-Cognitive Analysis of an  Network Who hinks who knows who? Socio-Cogniive Analysis of an Email Nework Nishih Pahak Deparmen of Compuer Science Universiy of Minnesoa Minneapolis, MN, USA npahak@cs.umn.edu Sandeep Mane Deparmen of Compuer

More information

Achieving Security Assurance with Assertion-based Application Construction

Achieving Security Assurance with Assertion-based Application Construction Achieving Securiy Assurance wih Asserion-based Applicaion Consrucion Carlos E. Rubio-Medrano and Gail-Joon Ahn Ira A. Fulon Schools of Engineering Arizona Sae Universiy Tempe, Arizona, USA, 85282 {crubiome,

More information

Software Architecture of the Light Weight Kernel, Catamount

Software Architecture of the Light Weight Kernel, Catamount Sofware Archiecure of he Ligh Weigh Kernel Caamoun Suzanne M. Kelly Sandia Naional Laboraories* Scalable Sysems Inegraion Deparmen PO BOX 5800 Albuquerque NM 87185-0817 smkelly@sandia.gov Ron Brighwell

More information

A Neural Network Based System for Classification of Attacks in IP Telephony

A Neural Network Based System for Classification of Attacks in IP Telephony A Neural Nework Based Sysem for Classificaion of Aacks in IP Telephony M. Voznak, J. Safarik and J. Slacha Absrac This aricle deals wih an applicaion of arificial inelligence on classificaion of aacks

More information

Hands on Lab Manual Coherence Introduction

Hands on Lab Manual Coherence Introduction Hands on Lab Manual Coherence Inroducion hp://www.oracle.com/echnework , YCPV VQ KORTQXG VJG RGTHQTOCPEG QH O[ CRRNKECVKQP &CP, EQR[ -CXC EQFG VQ CP +70/ (ZVGPUKQP", EQFGF KV VJKU YC[ +GTG U YJGTG [QW

More information

STRING DESCRIPTIONS OF DATA FOR DISPLAY*

STRING DESCRIPTIONS OF DATA FOR DISPLAY* SLAC-PUB-383 January 1968 STRING DESCRIPTIONS OF DATA FOR DISPLAY* J. E. George and W. F. Miller Compuer Science Deparmen and Sanford Linear Acceleraor Cener Sanford Universiy Sanford, California Absrac

More information

1 œ DRUM SET KEY. 8 Odd Meter Clave Conor Guilfoyle. Cowbell (neck) Cymbal. Hi-hat. Floor tom (shell) Clave block. Cowbell (mouth) Hi tom.

1 œ DRUM SET KEY. 8 Odd Meter Clave Conor Guilfoyle. Cowbell (neck) Cymbal. Hi-hat. Floor tom (shell) Clave block. Cowbell (mouth) Hi tom. DRUM SET KEY Hi-ha Cmbal Clave block Cowbell (mouh) 0 Cowbell (neck) Floor om (shell) Hi om Mid om Snare Floor om Snare cross sick or clave block Bass drum Hi-ha wih foo 8 Odd Meer Clave Conor Guilfole

More information

Nonparametric CUSUM Charts for Process Variability

Nonparametric CUSUM Charts for Process Variability Journal of Academia and Indusrial Research (JAIR) Volume 3, Issue June 4 53 REEARCH ARTICLE IN: 78-53 Nonparameric CUUM Chars for Process Variabiliy D.M. Zombade and V.B. Ghue * Dep. of aisics, Walchand

More information

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach

The University of Sheffield Department of Computer Science. Indexing XML Databases: Classifications, Problems Identification and a New Approach The Universiy of Sheffield Deparmen of Compuer Science Indexing XML Daabases: Classificaions, Problems Idenificaion and a New Approach Research Memorandum CS-7-5 Mohammed Al-Badawi Compuer Science Dep

More information

An efficient approach to improve throughput for TCP vegas in ad hoc network

An efficient approach to improve throughput for TCP vegas in ad hoc network Inernaional Research Journal of Engineering and Technology (IRJET) e-issn: 395-0056 Volume: 0 Issue: 03 June-05 www.irje.ne p-issn: 395-007 An efficien approach o improve hroughpu for TCP vegas in ad hoc

More information