AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS

Size: px
Start display at page:

Download "AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS"

Transcription

1 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 AN EFFICIENT GROUP KEY MANAGEMENT USING CODE FOR KEY CALCULATION FOR SIMULTANEOUS JOIN/LEAVE: CKCS Melisa Hajyvahabzadeh 1, Elia Eidkhai 1, S. Aahita Mortazavi 1, ad Alireza Nemaey Pour 1 Dept. of IT Egieerig, Sharif Uiversity of Techology, Kish Islad, Ira melisa.vahabzadeh@gmail.com; elia.eidkhai@gmail.com; mortazavi.aahita@gmail.com Dept. of Computer Software Techology Egieerig, Islamic Azad Uiversity of Abhar, Ira pour@abhariau.ac.ir ABSTRACT This paper presets a efficiet group key maagemet protocol, CKCS (Code for Key Calculatio i Simultaeous joi/leave) for simultaeous joi/leave i secure multicast. This protocol is based o logical key hierarchy. I this protocol, whe ew members joi the group simultaeously, server seds oly the group key for those ew members. The, curret members ad ew members calculate the ecessary keys by ode codes ad oe-way hash fuctio. A ode code is a radom umber which is assiged to each key to help users calculate the ecessary keys. Agai, at leave, the server just seds the ew group key to remaiig members. The results show that CKCS reduces computatioal ad commuicatio overhead, ad also message size i simultaeous joi/leave. KEYWORDS Secure Multicast, Group Key Maagemet, Group Security, Simultaeous joi/leave, Code for Key Calculatio, Re-keyig 1. INTRODUCTION IP multicast (hereiafter multicast) is a efficiet group commuicatio protocol to deliver multicast cotet from a sigle source to multiple users. This commuicatio techology uses IGMP (Iteret Group Maagemet Protocol) [1] for group membership that allows members to joi the group ad receive cotet freely. As a result, ope group membership by IGMP leads to eavesdroppig. I order to avoid this threat, group key maagemet has bee proposed. Group key is a key that is shared by all group members ad the seder for ecryptig data by the seder ad decryptig trasmitted data by the group members. The security requiremets of secure multicast are forward secrecy ad backward secrecy []. Forward secrecy esures whe a member leaves the group, he/she caot access successfully the curret cotet. Backward secrecy esures that a ew member caot access ay data which is set before its joi process. Because of these requiremets, group key eeds to be updated o each membership chage ad to be distributed to the valid group members securely. This process is called group re-keyig or re-keyig i short. Two types of group membership, sigle ad simultaeous exist i multicast. Figure 1 illustrates the process of joi/leave i which oly oe member, u +1 jois/leaves the multicast group. I sigle joi/leave, the server is cosidered to reply oly oe user s joi/leave request. However i real world, simultaeous joi/leave occurs more frequetly. Simultaeous joi/leave refers to DOI : /ijcc

2 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 u 1 u u 3... u group members u +1 jois u +1 leaves u 1 u u 3... u u +1 group members Figure 1. Sigle joi/leave Figure. Simultaeous joi/leave multiple requests from differet users to the server at the same time. Figure shows the simultaeous joi/leave operatios which occur cocurretly i a multicast group. I simultaeous joi/leave, the server eeds to respose multiple requests sychroously. As providig forward/backward secrecy is importat i sigle joi/leave, these requiremets are crucial i simultaeous case as well. Re-keyig implies large overhead o each membership chage for dyamic groups. Usually, the overhead at leave is larger tha the overhead at joi. Because whe a ew member jois the group, the ew group key ca be ecrypted by the previous oe ad distributed by multicast to the existig members except the ew member who receives the group key by uicast beig ecrypted by his/her idividual key. But whe a member leaves the group, the group key is ecrypted by each member s idividual key ad is trasmitted by uicast to the remaiig members idividually. I this case, the previous group key is supposed compromised. So, for a group with members, the re-keyig overhead is O(). May protocols have bee proposed for group key maagemet [3]-[10]. The mai purpose of them is how to distribute group key to valid members efficietly at leave. The proposed protocols are based o logical hierarchy model. The commo issue with all of these protocols is that they focus oly o sigle joi/leave. Although these protocols reduce the re-keyig overhead largely at leave from O() to O(log ), they icrease re-keyig overhead from O(1) to O(log ) at joi [3]-[8]. While proposals i [9],[10] reduce re-keyig overhead at joi for multicast commuicatio compared with [3]-[8], oe of them [3]-[10] focus o reducig rekeyig overhead for a ew member at joi. I fact, reducig re-keyig overhead for ew members at joi is a importat factor for simultaeous mode. Because, whe m members joi the group simultaeously, the server should deliver the ecessary keys to both the ew ad the curret members. For the curret members, the overhead has already bee decreased, but for ew member the overhead still remais. So, i simultaeous mode, reducig overhead of key delivery to ew members at joi is a critical factor. Therefore, it is ecessary to have the miimum overhead for the ew members at joi. 6

3 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 For this purpose, the overhead of re-keyig for ew member i sigle joi/leave should be miimized at first. The, by improvig that method, the proposed protocol ca be used i simultaeous mode. As stated before, most of the previous approaches do ot cosider simultaeous joi/leave. [11] is the oly research that addresses simultaeous joi/leave by periodic re-keyig. However, this proposal does ot support forward ad backward secrecies. This is the mai problem with this protocol because some members may repeat joi/leave withi a period. Moreover, this approach does ot propose ay specific method for re-keyig. This paper develops the mechaism of key tree maagemet i [1] ad adopts the protocol to simultaeous joi/leave. CKCS is a hierarchical protocol which has the miimum re-keyig overhead at joi/leave compared to [3]-[10]. I CKCS, all ecessary keys are calculated by members usig code for key calculatio rather tha distributed by the key server. As a result, key geeratio, key ecryptio ad message size overhead are reduced to O(m) where m deotes the umber of members who joi the group simultaeously. This paper is orgaized as follows. Sectio shows the overview of the secure multicast etwork, ad discusses the researches which are based o the hierarchical approach. The desig priciples ad detailed desig of our proposal are show i sectios 3 ad 4, respectively. At the ed of sectio 5, we discuss the security of our protocol. I sectio 6, we compare our protocol with the hierarchical based researches. Sectio 7 is the coclusio.. RELATED WORK.1. Network Structure Figure 3 illustrates the etwork structure of secure multicast. This etwork has three major parts; key server, multicast seder ad multicast members. Key server is resposible for geeratig the keys ad deliverig them to both multicast seder ad the existig members. Multicast seder ecrypts the cotets by the key which is received from the key server ad distributes the ecrypted cotet to all the group members. Multicast members are the authorized users who receive group cotet from multicast seder ad also the ecessary keys from the key server. Whe a ew member jois a multicast group, he/she should sed IGMP request to his/her earest router to receive multicast data from the etwork. Also, the ew member eeds to sed a joi request to the key server. Whe the ew member s request is accepted by the key server, rekeyig process should be started. All the updated keys must be delivered by the key server to multicast seder, the ew member ad all the existig members. Whe a member leaves a multicast group, he/she eeds to sed IGMP leave message to stop cotet delivery at first. The, this member should iform the key server by sedig a leave message. I ext subsectio, re-keyig process of some previously proposed protocols is reviewed... Existig LKH Approaches Waller et al. i [3] proposed LKH (Logical Key Hierarchy) approach for group key maagemet i secure multicast. Later, several versios of LKH based protocols were proposed [4]-[10]. I these protocols, a cetralized server is resposible for maagig the group ad distributig the group key to all group members. I LKH based protocols, the members of multicast group are mapped to the leaves of a logical key tree. This tree is a d-ary tree, typically a biary oe. Each member stores all the keys from the leaf ode alog the path to the root. The root key is the group key. Whe a member jois or leaves the group, all the keys i his/her possessio eed to be chaged to ew oes. The lowest level i the tree ca be the startig poit i a way that a ew paret key is ecrypted by usig its two child keys ad distributed to 63

4 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 users. Sice the height of the key tree is log, as a resultthe complexity of re-keyig is also O(log ). Figure 3. Network structure of secure multicast [9] Figure 4 shows the outlie of re-keyig procedure for LKH at joi. This figure depicts the logical key tree with seve existig members, u 1 through u 7, whe u 8 jois the group. At this time, the affected middle ode keys, K 7,8 ad K 5,8, ad the group key, K G, are chaged to K 7,8, K 5,8, ad K G respectively, because these odes are o the path from u 8 to the root. The, the key server seds the ew keys to the related members. First, all the keys which u 8 eeds to have, K 7,8, K 5,8 ad K G are set by uicast to u 8 beig ecrypted with K 8, K 7,8 ad K 5,8, respectively. Next, K 7,8 is set to u 7 beig ecrypted by K 7. For the existig members, the updated keys are set by multicast. I this example, K 5,8 is set to {u 5,u 6 }, ad u 7 beig ecrypted with K 5,6 ad K 7,8 respectively. K G is set for {u 1,u, u 3, u 4 } ad for {u 5, u 6, u 7 } beig ecrypted with K 1,4 ad K 5,8, respectively. Figure 4. A example of logical key tree for LKH ad OFT at joi/leave For leave operatio, the same procedure is performed. Whe a member leaves the group, for example u 8, the ode key of the leavig member should be deleted from the key tree at first. Next, all the affected middle odes i the path to the root are updated to ew oes ad are set to remaiig members. By this method, LKH reduces re-keyig overhead at leave from O() to O(log ). OFT [4] is aother LKH based approach. The mai idea of this approach is to reduce the key distributio overhead of the server by shiftig a part of key calculatio to users side. The key of 64

5 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 ode (i), K i,is calculated by usig the formula K i = f(g (K left (i) ),g (K right (i) )). I this formula, f(x) is a mixig fuctio ad g(x) is a oe-way hash fuctio. The value of g(x) is called blided key. K left (i) deotes the key of left child while K right (i) deotes the key of right childe of the ode. I OFT, whe a member jois a multicast group, he/she receives some iformatio icludes the group key, his/her siblig s blided key, ad acestors siblig blided keys. For example, i Figure 4 whe u 8 jois the group, he/she should receive the siblig blided key, g(k 7 ), ad his acestors sibligs blided keys which are g(k 5,6 ) ad g(k 1,4 ). These keys are ecrypted by K 8. O the other had, u 8 calculates K 7,8, K 5,8 ad K G by usig the followig formulas. ( ( ) ( )) K = f g K, g K, 7,8 7 8 ( ( ) ( )) ( ( 1,4 ), ( 5,8 )). K = f g K, g K, 5,8 5,6 7,8 K = f g K g K G After u 8 jois the group, the blided keys of K 7,8, K 5,8 ad K G are ecrypted with their siblig keys ad advertised by multicast to the existig group members as follows: ( ( 5,8 )) ( ( 7,8 )) 1 4 u u : g K 7 u : ( g ( K8 )) K7 multicast 5 6 s u u : g K Now, by receivig these blided keys, all the group members ca update the ecessary keys through the above formula. I this method, whe a member leaves the group, the key updatig process will be doe as well as joi operatio. Therefore, OFT reduces the overhead of rekeyig from O(log ) to O(1/ log ). I [9], authors divide the group members ito some subgroups ad assig a subgroup key to each subgroup. I this protocol, the key server assigs a secret to each joiig member, ad the group key is geerated usig those secrets. Moreover, each member is give the iverse value of secrets of all the other members except its ow. Those iverse values help the remaiig members to update the group key at leave. Whe a member leaves the group, the key server oly iforms the remaiig members that the member has left the group. The ew key is geerated by idividual members usig the iverse value of the leavig member. I order to reduce the burde of maitaiig the iverse values, this protocol divides the curret members ito subgroups. By this mechaism, the protocol ca reduce the computatioal ad commuicatioal overhead at member leave ad the maiteace overhead of iverse values at idividual members. Although this protocol focuses o reducig the re-keyig overhead at leave but it also reduces re-keyig overhead at joi. Cosequetly, this protocol reduces re-keyig overhead at leave from O(log ) i LKH to O(log [/m]) at leave whe m is the umber of subgroups. OKD [10] is defied based o oe-way key derivatio. I this method, users compute some of the updated keys i each group membership chage istead of receivig all ew keys from the server. A derivatio fuctio, f (x) is used to geerate ew keys from the old oes. OKD cosiders 3-ary tree for key tree. I OKD, whe a ew member jois the group, he/she is assiged to a suitable brach of the key tree ad all the ecessary keys are set by uicast to the ew member but the curret group members calculate their ecessary keys by themselves. While OKD reduces re-keyig overhead at joi for multicast commuicatio compared with other LKH based protocols []-[7], it does ot focus o reducig re-keyig overhead for a ew K1,4 K5,6 (1) () 65

6 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 member at joi. So, OKD is ot suitable whe several members joi a group simultaeously. The details of OKD exist i [10]. As show above, LKH based methods are acceptable because they reduce re-keyig overhead largely. If the group size is small, for example less tha hudred members, oe might ot use a hierarchical approach. However, whe the group size grows to several thousads or millios, hierarchical approaches such as LKH based protocols are eeded. More importat, whe simultaeous joi is cosidered for a system, the overhead of re-keyig for the ew members is crucial because the server has to geerate the ew keys ad ecrypt them for each ew member idividually to sed them. While protocols i [9],[10] reduce re-keyig overhead at joi for multicast commuicatio compared to the other LKH based oes [3]-[8], they do ot focus o reducig re-keyig overhead for the ew members which is ecessary for simultaeous joi. Therefore, the overhead of re-keyig for ew members i simultaeous mode is a crucial factor. To hadle this issue, we develop the mechaism of the key tree for simultaeous joi/leave i our previously proposed protocol [1] ad ow we evaluate its performace i simultaeous mode. 3. DESIGN PRINCIPLE We ow preset our ew efficiet protocol for group key maagemet i simultaeous mode. I fact, this work (CKCS: Code for Key Calculatio i Simultaeous), is a extesio of our origial idea [1]. We add some features ad adopt them to simultaeous mode. The followig desig priciples have bee performed i our protocol. (1) Figure 3 illustrates the etwork structure of secure multicast. Usig the same etwork structure for CKCS, the key server is resposible for geeratig ad distributig oly the group key to ew members at joi. First of all, ew users sed a IGMP message to the earest router for receivig the multicast cotet from a multicast seder. Next, ew users eed to sed a joi request to the key server for receivig the sessio group key for decryptig the ecrypted cotet. Fially, whe members leave the group, they sed the leave requests to the key server. The key server updates the group key ad redistributes it to the remaiig members ad multicast seder by multicast. () Figure 5 illustrates the logical key tree i CKCS. The tree applies the cocept of key tree i LKH approaches. Whe m members joi a group simultaeously, the server creates a key tree for those users, ad combies it with the curret key tree by addig a ew ode to top of these two trees. Here, this top ode is cosidered as the group key. By this techique, the height of the key tree remais uchaged ad as a result we have a balaced tree. (3) Similar to LKH based approaches, i CKCS, some keys eed to be updated after each membership chage. The updated keys are calculated by the group members rather tha distributed by the key server. For this purpose, each ode of the key tree is assiged to a specific code called ode code. A ode code is a radom umber which is assiged to each middle ode key to help the users calculate the ecessary keys. This code is delivered to the ew member at joi as a positio of that member i the key tree. It is calculated by cocateatig a radom umber to right digit of its paret ode code. Geerally, each paret ode code ca be obtaied by deletig the rightmost digit from his/her child code. By this mechaism, each member kows the codes of all odes i his/her path to the root. So, members ca update the affected ode keys usig these codes ad the hash fuctio after each membership chage (Figure 6). (4) I this step, we explai simultaeous joi i CKCS. Whe several users joi a group cocurretly, the server creates a ew key tree for ew users by assigig a positio code to the top ode of the ew key tree. The previous key tree ad the ew oe are cocateated to each other by addig a top ode which is cosidered as a ew group key. The key server ecrypts the ew group key with each ew user's idividual key ad seds them by oe 66

7 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 Figure 5. The logical key tree i CKCS (a) (b) Figure 6. Node code maagemet (a) ode code geeratio (b) simple example multicast message. Each ew member geerates the middle ode keys i his/her path to the root by applyig hash fuctio o bitwise XOR of the group key with each ode code. Curret members oly eed to compute the top ode of ew key tree which is calculated by applyig hash fuctio o the previous group key. (5) This step describes simultaeous leave i CKCS. Depedig o the positio of leavig members, two cases are cosidered; the worst case ad the best case (Figure 7). The worst case occurs whe members leave the group from differet leaves of the key tree while the best case happes whe members who are located i oe half of the key tree. At leave, the siblig ode of each leavig member is moved to his/her paret positio i the key tree. To provide forward secrecy, the server is resposible for updatig the group key ad sedig it to the remaiig members. The server ecrypts the ew group key with top ode of each part ad seds it by multicast to all remaiig group members. The re-keyig overhead at leave has the lowest value by cosiderig the best case. leavig members remaiig members (a) (b) Figure 7. Leave operatio i simultaeous mode (a) worst case (b) best case 67

8 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July DETAILED DESIGN I this sectio, we preset CKCS i details. CKCS focuses o user side key calculatio rather tha server side key distributio. I this protocol, a code is assiged to each middle ode of the key tree to help users calculate the ecessary middle ode keys Key Tree Structure ad Node Code Maagemet i CKCS The key server maages the group members ad seds them oly the group key. Whe ew members joi the group, they eed to kow their idividual keys ad their positios i the key tree accordig to the basic iformatio. After receivig joi requests, the key server seds the ew members their idividual keys, ad also their positio codes i the key tree. The idividual keys of the ew members ad their positio codes are set via a secure chael. Each ode of the key tree has a uique code. New members ca calculate the ecessary middle ode keys i their path to the root by usig ode codes. Each middle ode key is updated by applyig hash fuctio o bitwise XOR of the group key ad the correspodig ode code as below. Kmiddle _ ode = f ( KG ode _ code) (3) Moreover, the group key is updated after each membership chage. New members receive the group key from the key server ecrypted by their idividual keys. The curret members ca calculate it by applyig oe-way hash fuctio o the previous group key as below. K G = f ( KG ) (4) I simultaeous joi, whe multiple users joi the multicast group, the server creates the key tree of ew users at first ad allocates each ew user to oe leaf of the key tree. The key tree of old group members ad ew simultaeous users are combied with each other by addig a ew ode to the top. At this time, the top ode is assumed as the ew group key. The code of the ew top ode (root ode) is calculated by deletig a digit from the rightmost digit of the previous root code. The, the codes of middle odes for simultaeous joi are created by cocateatig a radom umber to the rightmost digit of the paret code as below. Childode_code = (Paretode_code Radom digit(s)). (5) Figure 8 shows the ode code maagemet procedure i simultaeous mode. Here, by joiig the ew users,{u 5, u 6, u 7, u 8 }, simultaeously, ew ode key, K 1,8, is created o top of the previous root ode key, K 1,4. The key tree of ew members, {u 5, u 6, u 7, u 8 }, is located to the right child positio of the ew root ode. Here, the code of ew root is 7 calculated by deletig 8 from the right side of 78. The middle ode codes of doted braches (key tree of ew members) are created by attachig a radom umber to the right side of their parets code. Figure 8. Node code maagemet key tree i simultaeous case 68

9 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July Joi Operatio We use Figure 9 to explai how re-keyig is doe i simultaeous joi by a simple example of a multicast group with 4curret members {u 1, u, u 3, u 4 } while {u 5, u 6, u 7 } joi the group simultaeously. The procedure is doe as follows: (1) {u 5, u 6, u 7 } sed joi requests to the key server cocurretly. The server creates their key tree ad geerates their idividual keys. Idividual keys of the ew members, {K 5, K 6, K 7 }, are set through a secure chael to them. The key tree of ew members is attached to the curret key tree by addig a top ode, K 1,7, to the top ofk 1,4. This ew top ode, K 1,7, is the ew group key. () There server calculates code of K 1,7 ad all the ew middle odes i the ew key tree. 7 is assiged to K 1,7 by deletig 8 from the rightmost digit of 78 assiged to K 1,4. I the ew members key tree, code of each middle ode is geerated by attachig a radom umber to the rightmost digit of his/her paret ode code. These codes are 73, 734 assiged to K 5,7 ad K 5,6, respectively. After geeratig these odes codes, the server seds the positio codes to them through a secure chael. (3) The key server updates the group key from K G to K G, usig oe-way hash fuctio. K = f ( K ) (6) G 1,4 (4) The, K G is ecrypted by each ew member s idividual key ad set by oe multicast message. (7) multicast s { u, u, u }: ( KG ) K,( K ),( ). 5 G K K 6 G K7 (5) The curret group members, {u 1, u, u 3, u 4 }, who are located i curret key tree, calculate the ew group key, K G, by applyig oe-way hash fuctio to the previous group key K G.,,, : = ( ) (8) u u u u KG f K1,4 (6) The ew members, {u 5, u 6, u 7 }, compute all their ecessary middle ode keys i their path to the root by the followig formula:, : ( ), 5 6 u u K5,6 = f KG 734,, : ( ) u u u K5,7 = f KG 73 (9) 7 K 1, K 1,4 K 5, K 1, K 3,4 K 5,6 u 7 u 1 u u 3 u 4 u 5 u 6 K 7 K 1 K K 3 K 4 K 5 K 6 curret key tree ew key tree Figure 9. Updatig key tree i simultaeous joi i CKCS 69

10 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July Leave Operatio I CKCS, whe several members leave the group, the key tree is divided ito two equal parts. As Figure 10 shows, the deleted odes belog to oe half of the key tree. So, these parts will be divided agai ad agai util just the leavig members braches are remaied. The umber of tree divisios is equal to (log -1) where is the umber of group members. The key server ecrypts the ew group key by the keys of the top ode of each half. We ow use Figure 10 to explai how re-keyig is doe i simultaeous leave by a simple example of a multicast group with 8 members {u 1,..., u 8 } whe {u 1, u 4, u 8 }leave the group. The procedure is doe as follows: (1) Whe {u 1, u 4, u 8 } leave the group, the odes of K 1,, K 3,4, ad K 7,8 are deleted from the key tree ad u, u 3 ad u 7 are promoted to their top ode positios. () The key server geerates a radom group key, K G. (3) K G is set to the remaiig group members by multicast, beig ecrypted by the top ode key of each part, K, K 3, K 5, 6, K 7. The group key is set to the members who are located i each part, part-1, part-, part-3, ad part-4 respectively. s u : ( K G ) u : ( K ) K 3 multicast G K3 5 6 u, u : ( K G ) K5,6 7 u : ( K G ) K7 (10) (4) Now, {u, u 3, u 5, u 6, u 7 } whose their middle odes are affected from this simultaeous leave, update K 1,4 ad K 5,7 to K 1,4 ad K 5,7 respectively by applyig oe-way hash fuctio o bitwise XOR of the group key ad the related ode codes., : ( ), 3 u u K1,4 = f KG 78,, : ( ) u u u K5,7 = f KG 73 (11) Figure 10. Simultaeous leave for CKCS 70

11 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July SECURITY ANALYSIS I this sectio, we aalyze the security requiremets of CKCS. Backward secrecy esures that ew members at joi caot achieve the archived cotets i the group. I CKCS, the ew group key is orgaized by applyig oe-way hash fuctio to the previous group key. Oe-way hash fuctio has the property of oe-wayess which meas that it is easy to calculate y = E(x), but by give y it is computatioally hard to fid x. Therefore, it is impossible for a ew member to fid the previous group key. Forward secrecy esures that whe several members leave the group, they caot access successfully the curret cotets. I CKCS, the ew members caot geerate the curret sessio keys with their previous iformatio because the group key is geerated by the key server at leave, ad is trasmitted by the ode keys that the leavig members do ot have them. 6. COMPARISON I this sectio, we compare CKCS protocol with some previously proposed oes, LKH, OFT, ad OKD. We compare these protocols at joi ad leave operatios for simultaeous mode. The compariso measures are based o key geeratio, key ecryptio, commuicatio overhead, ad message size. Tables 1,, 3 ad 4 summarize our comparisos, focusig o the followig measures: Computatioal overhead o Key geeratio overhead: the umber of keys that must be geerated at joi/leave. o Ecryptio overhead: the umber of ecryptios. Commuicatio overhead: the umber of trasmissios from the key server. Message size: the total umber of keys i oe message. The computatioal overhead is the sum of key geeratio ad key ecryptio. I our comparisos show i the followig tables, deotes the group size which is the umber of members i the multicast group after joi ad before leave operatios. I additio, i simultaeous mode, m deotes the umber of members that joi or leave multicast group cocurretly. Fially, i simultaeous mode we cosider that m. I other words, the umber of simultaeous users is less tha or equal to the umber of group members. Biary key tree is assumed for key degree i compariso. As stated before, i biary key tree the height of tree is log which shows the umber of odes i each brach. Obviously, the efficiecy of a protocol is related to the height of the key tree. I other words, a key tree with smaller height is more efficiet tha a tree with larger height. Cosequetly, sice the tree height for all of these protocols is equal, the factors that make differeces i decreasig overhead are the re-keyig procedure ad the key distributio techique. The re-keyig method itself is a effective way to reduce the overhead. Regardig re-keyig method i LKH, OFT, ad OKD, the server has more loads for geeratig, ecryptig, ad deliverig keys to the members. I LKH ad OFT, the members do ot participate i key calculatio o each membership chages. While i OKD the members ivolve key update process with the key server but the re-keyig overhead problem for ew members still remais. Coversely i CKCS, the cotributio of curret members i re-keyig process ad miimum umber of key delivery to ew members are two decisive factors which make it more effective tha the other oes. Fially, the previously proposed protocols do ot cosider the simultaeous mode at all. So, the overhead of these approaches is ot acceptable for this mode. Assumig simultaeous mode for these protocols, the results are show i Tables 1,, 3 ad 4. I additio, we have implemeted programs to compare the overhead of these metioed protocols. These programs compare the processig time that each protocol speds for geeratig ad ecryptig ecessary keys after each membership chages based o the umber of users. 71

12 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 The source code of the programs is based o the script laguage program, ruby, usig OpeSSL cryptography library. These programs have bee ru o a 1.66 GHz Widows 7 processor with GB of RAM. We have used AES-56-OFB to geerate keys for LKH. The key geeratio algorithm for OFT, OKD, ad CKCSS is based o AES-56-OFB ad SHA-1. Fially, we sketch some plots (Figures 11, 1, 13, 14, 15, ad 16) for showig umerical compariso. For this purpose, we cosider that there are 100,000 group members ad 104, 048, 4096, ad 819 simultaeous users for joi/leave Computatioal Overhead The computatioal overhead for these Protocols deped o the umber of keys that eed to be geerated ad ecrypted by the server. Table 1 shows the key geeratio overhead at simultaeous joi/leave operatio. I LKH, group members do ot participate i middle ode keys calculatio i each joi/leave operatio. I OFT, oly a ew member at joi ad the remaiig members at leave eed to update the keys i their paths. I OKD, whe a member jois the group all the ecessary keys should be delivered to him/her by uicast ad all the remaiig members ca update their middle ode keys by themselves, but at leave some odes are resposible for updatig the affected keys. So,i these protocols, the key geeratio overhead islog for a sigle member admlogwhe m members joi/leave the group simultaeously. CKCS has the smallest overhead for key geeratio comparig with the others. Table 1.The comparisos of key geeratio overhead i simultaeous joi/leave operatios. Protocols Joi Leave LKH m log m log OFT m log m log OKD m log m log CKCS m+1 1 As metioed above, the previously proposed protocols do ot cosider the simultaeous mode. Accordig to the results, i LKH, OFT, ad OKD whe m members joi/leave the multicast group, the server geerates keys to update the key tree (all the keys i the paths of m members to the root). If m=1, these amouts are equal to the sigle mode. I CKCS, this overhead is decreased to m at joi ad to 1 at simultaeous leave operatio. Whe m members joi the group sychroously, the server geerates a idividual key for each of them (m idividual keys for m members) ad oe group key. Also, whe m members leave the group, the server geerates oly a ew group key for the remaiig members. All the ecessary keys i CKCS are calculated by the group members. Table illustrates the key ecryptio overhead for m simultaeous joi/leave. The results show that LKH, OFT ad OKD have high overhead at joi/leave. But i CKCS, this overhead is the lowest oe because i each joi operatio the server ecrypts oly the ew group key with each ew member s idividual key. I CKCS, the key ecryptio overhead at leave is equal to the height of the key tree because the server ecrypts the group key by the top ode of each part for users who are located at that part. Table.The compariso of key ecryptio overhead at simultaeous joi/leave operatios. Protocols Joi Leave LKH 3m log m log OFT m log m log OKD m log m log CKCS m log 7

13 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 Figures11 ad 1 illustrate the computatioal overhead (processig time versus the umber of simultaeous users) for simultaeous joi/leave. As show, LKH has the highest gradiet whe m members joi/leave the group cocurretly. OFT ad OKD have the lower computatioal overhead tha LKH i simultaeous joi/leave. I simultaeous joi operatio, the computatioal overhead of OFT is higher tha OKD but at leave these protocols have almost the same overhead. CKCSS has the lowest overhead at both simultaeous membership chages LKH OFT OKD CKCSS processig time (sec) simultaeous users Figure 11. Computatioal overhead versus umber of group members at simultaeous joi LKH OFT OKD CKCSS processig time (sec) OFT,OKD overlap simultaeous users Figure 1. Computatioal overhead versus umber of group members at simultaeous leave 6.. Commuicatio Overhead ad Message Size Table 3 depicts the commuicatio overhead at simultaeous joi/leave operatio. Commuicatio overhead at simultaeous joi is divided ito two categories, uicast ad multicast overhead. As show i this table, LKH ad OFT have the same commuicatio overhead at joi/leave which is the highest oe. These two protocols have both uicast ad multicast commuicatio i each simultaeous joi. This happes because ecessary keys for ew members are set by uicast ad for remaiig members by multicast. I OKD ad CKCS, 73

14 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 all the keys are collected i oe message, ad set to ew members by oe multicast message. So, there is o overhead for uicast but 1 multicast trasmissio exists whe m members joi the group.figures13 ad 14 illustrate the umerical results for commuicatio overhead at simultaeous joi/leave respectively. Table 3.The commuicatio overhead at simultaeous joi/leave operatios. Protocols Joi Leave Uicast Multicast Multicast LKH log log log OFT log log log OKD log - log CKCS - 1 log LKH OFT OKD CKCSS uicast commuicatio (times) LKH,OFT,OKD overlap 0000 CKCSS simultaeous users (a) multicast commuicatio (times) LKH OFT OKD CKCSS LKH, OFT overlap OKD, CKCSS overlap simultaeous users (b) Figure 13. Commuicatio overhead versus umber of group memberssimultaeous joi (a) uicast commuicatio (b) multicast commuicatio

15 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 multicast commuicatio (times) LKH OFT OKD CKCSS OFT,OKD overlap CKCSS 4096 simultaeous users Figure 14. Commuicatio overhead versus umber of group members atsimultaeous leave Table 4 shows message size i simultaeous joi/leave. For simultaeous joi/leave, CKCS has the lowest message size i each message trasmissio. All the other protocols have large message size for simultaeous because of their ecessary trasmissios. I CKCS, the server seds oe multicast message which icludes m keys. Each of these keys cotais the group key ecrypted by the idividual key of each simultaeous user.figures15 ad 16 illustrate the umerical results for message size at simultaeous joi/leave respectively. 819 Table 4.Message size at simultaeous joi/leave operatios Protocols Joi Leave LKH m log m log OFT m log + 1 m log + 1 OKD m log m log CKCS m m message size (umber of keys i oe message) LKH OFT OKD CKCSS OFT,OKD overlap 4096 simultaeous users Figure 15. Message size at simultaeous joi

16 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 message size (umber of keys i oe message) LKH OFT OKD CKCSS OFT,OKD overlap 4096 simultaeous users Figure16. Message size at simultaeous leave Although LKH based protocols miimized the overhead of leave operatio to log, they added uecessary overhead to joi operatio. This amout gets larger whe umber of users icreases. With a glace at Tables 1,, 3, ad 4 it is ot difficult to see that CKCSS has two major features. First, the overhead of CKCSS at joi does ot deped o the umber of users. It meas that the overhead for ew member is a costat amout while there is o overhead for curret users. Secod, reducig the overhead for ew user at sigle joi is the other importat factor for simultaeous mode. This factor is crucial for simultaeous joi. 7. CONCLUSIONS This paper proposed a ew group key maagemet protocol, CKCS, for simultaeous joi/leave. The protocol is based o logical key hierarchy. I simultaeous mode, whe members joi the multicast group simultaeously, the server creates a ew key tree for the members ad their idividual keys. The ew key tree is attached to the old oe by addig a ew ode to the top of the previous oe. Whe several members leave the group, oly the ew group key is set to the remaiig members. At the ed, we coclude our proposal with some of its cotributios: CKCS reduces key geeratio ad key ecryptio overhead largely i simultaeous joi/leave. CKCS reduces uicast ad multicast commuicatio overhead largely at joi i simultaeous mode. CKCS reduces message size for uicast commuicatio. REFERENCES [1] Feer, W., (1997) Iteret Group Maagemet Protocol, Xerox PARC, RFC 36, Versio. [] Jiag, B. &Hu, X., (008) A Survey of Group Key Maagemet, IEEE, Iteratioal Coferece o Computer Sciece ad Software Egieerig, Vol. 3, pp [3] Waller, D., Harder, E. & Agee, R., (1999) Key Maagemet for Multicast: Issues ad Architectures, Natioal Security Agecy, RFC67. [4] McGrew, D.A. & Sherma,A.T., (003) Key Establishmet i Large Dyamic Groups Usig Oe- Way Fuctio Trees, IEEE Trasactios o Software Egieerig, Vol. 9/5, pp

17 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 [5] Je, D., Seo,S., Park, Y.& Lee, J., (010) Computatio-ad-storage-efficiet key tree maagemet protocol for secure multicast commuicatios, Elsevier, Computer Commuicatios, Vol. 33/, pp [6] He, Z. & Li, Y., (008) Dyamic Key Maagemet i a User Hierarchy, d Iteratioal Coferece o Ati-couterfeitig, Security ad Idetificatio, ASID 008, pp [7] Kwak, D., Lee, S. & Kim, J., (006) A Efficiet LKH Tree Balacig Algorithm for Group Key Maagemet, IEEE Commuicatio Letters, Vol. 10/3, pp. -4. [8] Lu, R., Li,X., Ho, P., She, X. & Cao,Z., (008) A New Dyamic Group Key Maagemet Scheme with Low Rekeyig Cost, IEEE, Wireless Commuicatios ad Networkig Coferece, WCNC 008, pp [9] Nemaey Pour, A., Kumekawa, K., Kato, T. &Itoh, S., (007) A Hierarchical Group Key Maagemet Scheme for Secure Multicast Icreasig Efficiecy of Key Distributio i Leave Operatio, Elsevier, Computer Networks, Vol. 51/17, pp [10] Li, J., Lai, F. &Lee,H., (005) Efficiet Group Key Maagemet Protocol with Oe-Way Key Derivatio, Proceedigs of the IEEE Coferece o Local Computer Networks 30th Aiversary (LCN 5), pp [11] Zhu, F., Noubir, G.&Cha, A. H., (003) Optimal Tree Structure for Key Maagemet of Simultaeous Joi/Leave i Secure Multicast, Techical Report, Wireless Security Laboratory, Northeaster Uiversity, Bosto, MA, USA. [1] Hajivahabzade, M., Eidkhai, E., Mortazavi, A., Nemaey Pour, A. (010) A New Group Key Maagemet Protocol usig Code for Key Calculatio: CKC, Proceedigs of IEEE, IEEE Computer Society, the Iteratioal Coferece o Iformatio Sciece ad Applicatios (ICISA010), Seoul, Korea, pp Authors Melisa Hajyvahabzadehreceived her B.Sc. ad M.Sc. degree i Iformatio Techology fromsharif Uiversity of Techology, Iteratioal Campus, Ira. Her research itrests iclude Security, IP Multicast, Group Key Maagemet Protocols, Autheticatio i various type of etworks. Elia Eidkhaireceived her B.Sc.ad M.Sc. degree i Iformatio Techology fromsharif Uiversity of Techology, Iteratioal Campus, Ira. Her research itrests iclude Security, Wireless Networks, IP Multicast, Group Key Maagemet Protocols i various type of etworks. Seyedeh Aahita Mortazavireceived her B.Sc. ad M.Sc. degree i Iformatio Techology fromsharif Uiversity of Techology, Iteratioal Campus, Ira. Her research itrests iclude Security, IP Multicast, Group Key Maagemet Protocols i various type of etworks. 77

18 Iteratioal Joural of Computer Networks & Commuicatios (IJCNC) Vol.4, No.4, July 01 Alireza Nemaey Pour has received his B.S degree i Computer Sciece from Sao Uiversity, Japa, M.S i Computer Sciece from Japa Advaced Istitute of Sciece Ad Techology, Japa, ad Ph.D. degree i Iformatio Network Sciece from Graduate School of Iformatio Systems,the Uiversity of Electro-Commuicatios, Japa. He is curretly a faculty memberof Islamic Azad Uiversity of Abhar i Ira. I additio, He is a techical advisor of J-Tech Corporatio i Japa. His research iterests iclude Network Security, Group Commuicatio Security, Protocol Security, Iformatio Leakage, Spam Mail Prevetio, Web Spam Detectio, Group Autheticatio, ad Cryptography. 78

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale

Abstract With the evolution of the Internet, multicast communications seem particularly well adapted for large scale (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, Aalysis of the various key maagemet algorithms ad ew proposal i the secure multicast commuicatios Joe Prathap P M. Departmet of Iformatio

More information

Message Integrity and Hash Functions. TELE3119: Week4

Message Integrity and Hash Functions. TELE3119: Week4 Message Itegrity ad Hash Fuctios TELE3119: Week4 Outlie Message Itegrity Hash fuctios ad applicatios Hash Structure Popular Hash fuctios 4-2 Message Itegrity Goal: itegrity (ot secrecy) Allows commuicatig

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET

WYSE Academic Challenge Sectional Computer Science 2005 SOLUTION SET WYSE Academic Challege Sectioal Computer Sciece 2005 SOLUTION SET 1. Correct aswer: a. Hz = cycle / secod. CPI = 2, therefore, CPI*I = 2 * 28 X 10 8 istructios = 56 X 10 8 cycles. The clock rate is 56

More information

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN

A Key Distribution method for Reducing Storage and Supporting High Level Security in the Large-scale WSN Iteratioal Joural of Digital Cotet Techology ad its Applicatios Vol. 2 No 1, March 2008 A Key Distributio method for Reducig Storage ad Supportig High Level Security i the Large-scale WSN Yoo-Su Jeog *1,

More information

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB)

Session Initiated Protocol (SIP) and Message-based Load Balancing (MBLB) F5 White Paper Sessio Iitiated Protocol (SIP) ad Message-based Load Balacig (MBLB) The ability to provide ew ad creative methods of commuicatios has esured a SIP presece i almost every orgaizatio. The

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming

Lecture Notes 6 Introduction to algorithm analysis CSS 501 Data Structures and Object-Oriented Programming Lecture Notes 6 Itroductio to algorithm aalysis CSS 501 Data Structures ad Object-Orieted Programmig Readig for this lecture: Carrao, Chapter 10 To be covered i this lecture: Itroductio to algorithm aalysis

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015

15-859E: Advanced Algorithms CMU, Spring 2015 Lecture #2: Randomized MST and MST Verification January 14, 2015 15-859E: Advaced Algorithms CMU, Sprig 2015 Lecture #2: Radomized MST ad MST Verificatio Jauary 14, 2015 Lecturer: Aupam Gupta Scribe: Yu Zhao 1 Prelimiaries I this lecture we are talkig about two cotets:

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme

Improving Information Retrieval System Security via an Optimal Maximal Coding Scheme Improvig Iformatio Retrieval System Security via a Optimal Maximal Codig Scheme Dogyag Log Departmet of Computer Sciece, City Uiversity of Hog Kog, 8 Tat Chee Aveue Kowloo, Hog Kog SAR, PRC dylog@cs.cityu.edu.hk

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Security of Bluetooth: An overview of Bluetooth Security

Security of Bluetooth: An overview of Bluetooth Security Versio 2 Security of Bluetooth: A overview of Bluetooth Security Marjaaa Träskbäck Departmet of Electrical ad Commuicatios Egieerig mtraskba@cc.hut.fi 52655H ABSTRACT The purpose of this paper is to give

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpeCourseWare http://ocw.mit.edu 6.854J / 18.415J Advaced Algorithms Fall 2008 For iformatio about citig these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 18.415/6.854 Advaced Algorithms

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

The Magma Database file formats

The Magma Database file formats The Magma Database file formats Adrew Gaylard, Bret Pikey, ad Mart-Mari Breedt Johaesburg, South Africa 15th May 2006 1 Summary Magma is a ope-source object database created by Chris Muller, of Kasas City,

More information

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis

Analysis Metrics. Intro to Algorithm Analysis. Slides. 12. Alg Analysis. 12. Alg Analysis Itro to Algorithm Aalysis Aalysis Metrics Slides. Table of Cotets. Aalysis Metrics 3. Exact Aalysis Rules 4. Simple Summatio 5. Summatio Formulas 6. Order of Magitude 7. Big-O otatio 8. Big-O Theorems

More information

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers *

Load balanced Parallel Prime Number Generator with Sieve of Eratosthenes on Cluster Computers * Load balaced Parallel Prime umber Geerator with Sieve of Eratosthees o luster omputers * Soowook Hwag*, Kyusik hug**, ad Dogseug Kim* *Departmet of Electrical Egieerig Korea Uiversity Seoul, -, Rep. of

More information

GPUMP: a Multiple-Precision Integer Library for GPUs

GPUMP: a Multiple-Precision Integer Library for GPUs GPUMP: a Multiple-Precisio Iteger Library for GPUs Kaiyog Zhao ad Xiaowe Chu Departmet of Computer Sciece, Hog Kog Baptist Uiversity Hog Kog, P. R. Chia Email: {kyzhao, chxw}@comp.hkbu.edu.hk Abstract

More information

1&1 Next Level Hosting

1&1 Next Level Hosting 1&1 Next Level Hostig Performace Level: Performace that grows with your requiremets Copyright 1&1 Iteret SE 2017 1ad1.com 2 1&1 NEXT LEVEL HOSTING 3 Fast page loadig ad short respose times play importat

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

Lecture 28: Data Link Layer

Lecture 28: Data Link Layer Automatic Repeat Request (ARQ) 2. Go ack N ARQ Although the Stop ad Wait ARQ is very simple, you ca easily show that it has very the low efficiecy. The low efficiecy comes from the fact that the trasmittig

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19

CIS 121 Data Structures and Algorithms with Java Spring Stacks, Queues, and Heaps Monday, February 18 / Tuesday, February 19 CIS Data Structures ad Algorithms with Java Sprig 09 Stacks, Queues, ad Heaps Moday, February 8 / Tuesday, February 9 Stacks ad Queues Recall the stack ad queue ADTs (abstract data types from lecture.

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network

Adaptive Resource Allocation for Electric Environmental Pollution through the Control Network Available olie at www.sciecedirect.com Eergy Procedia 6 (202) 60 64 202 Iteratioal Coferece o Future Eergy, Eviromet, ad Materials Adaptive Resource Allocatio for Electric Evirometal Pollutio through the

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Primitive polynomials selection method for pseudo-random number generator

Primitive polynomials selection method for pseudo-random number generator Joural of hysics: Coferece Series AER OEN ACCESS rimitive polyomials selectio method for pseudo-radom umber geerator To cite this article: I V Aiki ad Kh Alajjar 08 J. hys.: Cof. Ser. 944 0003 View the

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

One advantage that SONAR has over any other music-sequencing product I ve worked

One advantage that SONAR has over any other music-sequencing product I ve worked *gajedra* D:/Thomso_Learig_Projects/Garrigus_163132/z_productio/z_3B2_3D_files/Garrigus_163132_ch17.3d, 14/11/08/16:26:39, 16:26, page: 647 17 CAL 101 Oe advatage that SONAR has over ay other music-sequecig

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000.

Basic allocator mechanisms The course that gives CMU its Zip! Memory Management II: Dynamic Storage Allocation Mar 6, 2000. 5-23 The course that gives CM its Zip Memory Maagemet II: Dyamic Storage Allocatio Mar 6, 2000 Topics Segregated lists Buddy system Garbage collectio Mark ad Sweep Copyig eferece coutig Basic allocator

More information

The isoperimetric problem on the hypercube

The isoperimetric problem on the hypercube The isoperimetric problem o the hypercube Prepared by: Steve Butler November 2, 2005 1 The isoperimetric problem We will cosider the -dimesioal hypercube Q Recall that the hypercube Q is a graph whose

More information

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions

Lecturers: Sanjam Garg and Prasad Raghavendra Feb 21, Midterm 1 Solutions U.C. Berkeley CS170 : Algorithms Midterm 1 Solutios Lecturers: Sajam Garg ad Prasad Raghavedra Feb 1, 017 Midterm 1 Solutios 1. (4 poits) For the directed graph below, fid all the strogly coected compoets

More information

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation

Task scenarios Outline. Scenarios in Knowledge Extraction. Proposed Framework for Scenario to Design Diagram Transformation 6-0-0 Kowledge Trasformatio from Task Scearios to View-based Desig Diagrams Nima Dezhkam Kamra Sartipi {dezhka, sartipi}@mcmaster.ca Departmet of Computig ad Software McMaster Uiversity CANADA SEKE 08

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 18 Strategies for Query Processig Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio DBMS techiques to process a query Scaer idetifies

More information

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea

S. Mehta and K.S. Kwak. UWB Wireless Communications Research Center, Inha University Incheon, , Korea S. Mehta ad K.S. Kwak UWB Wireless Commuicatios Research Ceter, Iha Uiversity Icheo, 402-75, Korea suryaad.m@gmail.com ABSTRACT I this paper, we propose a hybrid medium access cotrol protocol (H-MAC) for

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

The golden search method: Question 1

The golden search method: Question 1 1. Golde Sectio Search for the Mode of a Fuctio The golde search method: Questio 1 Suppose the last pair of poits at which we have a fuctio evaluatio is x(), y(). The accordig to the method, If f(x())

More information

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1

Reliable Transmission. Spring 2018 CS 438 Staff - University of Illinois 1 Reliable Trasmissio Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Reliable Trasmissio Hello! My computer s ame is Alice. Alice Bob Hello! Alice. Sprig 2018 CS 438 Staff - Uiversity of Illiois 2 Reliable

More information

Avid Interplay Bundle

Avid Interplay Bundle Avid Iterplay Budle Versio 2.5 Cofigurator ReadMe Overview This documet provides a overview of Iterplay Budle v2.5 ad describes how to ru the Iterplay Budle cofiguratio tool. Iterplay Budle v2.5 refers

More information

Elementary Educational Computer

Elementary Educational Computer Chapter 5 Elemetary Educatioal Computer. Geeral structure of the Elemetary Educatioal Computer (EEC) The EEC coforms to the 5 uits structure defied by vo Neuma's model (.) All uits are preseted i a simplified

More information

Weston Anniversary Fund

Weston Anniversary Fund Westo Olie Applicatio Guide 2018 1 This guide is desiged to help charities applyig to the Westo to use our olie applicatio form. The Westo is ope to applicatios from 5th Jauary 2018 ad closes o 30th Jue

More information

Chapter 3 Classification of FFT Processor Algorithms

Chapter 3 Classification of FFT Processor Algorithms Chapter Classificatio of FFT Processor Algorithms The computatioal complexity of the Discrete Fourier trasform (DFT) is very high. It requires () 2 complex multiplicatios ad () complex additios [5]. As

More information

Probability of collisions in Soft Input Decryption

Probability of collisions in Soft Input Decryption Issue 1, Volume 1, 007 1 Probability of collisios i Soft Iput Decryptio Nataša Živić, Christoph Rulad Abstract I this work, probability of collisio i Soft Iput Decryptio has bee aalyzed ad calculated.

More information

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0

Polynomial Functions and Models. Learning Objectives. Polynomials. P (x) = a n x n + a n 1 x n a 1 x + a 0, a n 0 Polyomial Fuctios ad Models 1 Learig Objectives 1. Idetify polyomial fuctios ad their degree 2. Graph polyomial fuctios usig trasformatios 3. Idetify the real zeros of a polyomial fuctio ad their multiplicity

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2010 Itake Semester 7 Examiatio CS4532 CONCURRENT PROGRAMMING Time allowed: 2 Hours September 2014

More information

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks

Interference Aware Channel Assignment Scheme in Multichannel Wireless Mesh Networks Iterferece Aware Chael Assigmet Scheme i Multichael Wireless Mesh Networks Sumyeg Kim Departmet of Computer Software Egieerig Kumoh Natioal Istitute of Techology Gum South Korea Abstract Wireless mesh

More information

Sorting 9/15/2009. Sorting Problem. Insertion Sort: Soundness. Insertion Sort. Insertion Sort: Running Time. Insertion Sort: Soundness

Sorting 9/15/2009. Sorting Problem. Insertion Sort: Soundness. Insertion Sort. Insertion Sort: Running Time. Insertion Sort: Soundness 9/5/009 Algorithms Sortig 3- Sortig Sortig Problem The Sortig Problem Istace: A sequece of umbers Objective: A permutatio (reorderig) such that a ' K a' a, K,a a ', K, a' of the iput sequece The umbers

More information

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS

EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Iteratioal Joural o Natural Laguage Computig (IJNLC) Vol. 2, No., February 203 EFFECT OF QUERY FORMATION ON WEB SEARCH ENGINE RESULTS Raj Kishor Bisht ad Ila Pat Bisht 2 Departmet of Computer Sciece &

More information

Cubic Polynomial Curves with a Shape Parameter

Cubic Polynomial Curves with a Shape Parameter roceedigs of the th WSEAS Iteratioal Coferece o Robotics Cotrol ad Maufacturig Techology Hagzhou Chia April -8 00 (pp5-70) Cubic olyomial Curves with a Shape arameter MO GUOLIANG ZHAO YANAN Iformatio ad

More information

A Boolean Query Processing with a Result Cache in Mediator Systems

A Boolean Query Processing with a Result Cache in Mediator Systems A Boolea Query Processig with a Result Cache i Mediator Systems Jae-heo Cheog ad Sag-goo Lee * Departmet of Computer Sciece Seoul Natioal Uiversity Sa 56-1 Shillim-dog Kwaak-gu, Seoul Korea {cjh, sglee}cygus.su.ac.kr

More information

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence

9.1. Sequences and Series. Sequences. What you should learn. Why you should learn it. Definition of Sequence _9.qxd // : AM Page Chapter 9 Sequeces, Series, ad Probability 9. Sequeces ad Series What you should lear Use sequece otatio to write the terms of sequeces. Use factorial otatio. Use summatio otatio to

More information

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets

Throughput-Delay Scaling in Wireless Networks with Constant-Size Packets Throughput-Delay Scalig i Wireless Networks with Costat-Size Packets Abbas El Gamal, James Mamme, Balaji Prabhakar, Devavrat Shah Departmets of EE ad CS Staford Uiversity, CA 94305 Email: {abbas, jmamme,

More information

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits

Reversible Realization of Quaternary Decoder, Multiplexer, and Demultiplexer Circuits Egieerig Letters, :, EL Reversible Realizatio of Quaterary Decoder, Multiplexer, ad Demultiplexer Circuits Mozammel H.. Kha, Member, ENG bstract quaterary reversible circuit is more compact tha the correspodig

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services

A QoS Provisioning mechanism of Real-time Wireless USB Transfers for Smart HDTV Multimedia Services A QoS Provisioig mechaism of Real-time Wireless USB Trasfers for Smart HDTV Multimedia Services Ji-Woo im 1, yeog Hur 2, Jog-Geu Jeog 3, Dog Hoo Lee 4, Moo Sog Yeu 5, Yeowoo Lee 6 ad Seog Ro Lee 7 1 Istitute

More information

Combination Labelings Of Graphs

Combination Labelings Of Graphs Applied Mathematics E-Notes, (0), - c ISSN 0-0 Available free at mirror sites of http://wwwmaththuedutw/ame/ Combiatio Labeligs Of Graphs Pak Chig Li y Received February 0 Abstract Suppose G = (V; E) is

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

Σ P(i) ( depth T (K i ) + 1),

Σ P(i) ( depth T (K i ) + 1), EECS 3101 York Uiversity Istructor: Ady Mirzaia DYNAMIC PROGRAMMING: OPIMAL SAIC BINARY SEARCH REES his lecture ote describes a applicatio of the dyamic programmig paradigm o computig the optimal static

More information

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting

Prevention of Black Hole Attack in Mobile Ad-hoc Networks using MN-ID Broadcasting Vol.2, Issue.3, May-Jue 2012 pp-1017-1021 ISSN: 2249-6645 Prevetio of Black Hole Attack i Mobile Ad-hoc Networks usig MN-ID Broadcastig Atoy Devassy 1, K. Jayathi 2 *(PG scholar, ME commuicatio Systems,

More information

BOOLEAN MATHEMATICS: GENERAL THEORY

BOOLEAN MATHEMATICS: GENERAL THEORY CHAPTER 3 BOOLEAN MATHEMATICS: GENERAL THEORY 3.1 ISOMORPHIC PROPERTIES The ame Boolea Arithmetic was chose because it was discovered that literal Boolea Algebra could have a isomorphic umerical aspect.

More information

Lecture 18. Optimization in n dimensions

Lecture 18. Optimization in n dimensions Lecture 8 Optimizatio i dimesios Itroductio We ow cosider the problem of miimizig a sigle scalar fuctio of variables, f x, where x=[ x, x,, x ]T. The D case ca be visualized as fidig the lowest poit of

More information

Descriptive Statistics Summary Lists

Descriptive Statistics Summary Lists Chapter 209 Descriptive Statistics Summary Lists Itroductio This procedure is used to summarize cotiuous data. Large volumes of such data may be easily summarized i statistical lists of meas, couts, stadard

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

. Written in factored form it is easy to see that the roots are 2, 2, i,

. Written in factored form it is easy to see that the roots are 2, 2, i, CMPS A Itroductio to Programmig Programmig Assigmet 4 I this assigmet you will write a java program that determies the real roots of a polyomial that lie withi a specified rage. Recall that the roots (or

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5.

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5. Morga Kaufma Publishers 26 February, 208 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Virtual Memory Review: The Memory Hierarchy Take advatage of the priciple

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

Fast Fourier Transform (FFT) Algorithms

Fast Fourier Transform (FFT) Algorithms Fast Fourier Trasform FFT Algorithms Relatio to the z-trasform elsewhere, ozero, z x z X x [ ] 2 ~ elsewhere,, ~ e j x X x x π j e z z X X π 2 ~ The DFS X represets evely spaced samples of the z- trasform

More information

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting)

MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fitting) MATHEMATICAL METHODS OF ANALYSIS AND EXPERIMENTAL DATA PROCESSING (Or Methods of Curve Fittig) I this chapter, we will eamie some methods of aalysis ad data processig; data obtaied as a result of a give

More information

Evaluation scheme for Tracking in AMI

Evaluation scheme for Tracking in AMI A M I C o m m u i c a t i o A U G M E N T E D M U L T I - P A R T Y I N T E R A C T I O N http://www.amiproject.org/ Evaluatio scheme for Trackig i AMI S. Schreiber a D. Gatica-Perez b AMI WP4 Trackig:

More information

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware

Parallel Polygon Approximation Algorithm Targeted at Reconfigurable Multi-Ring Hardware Parallel Polygo Approximatio Algorithm Targeted at Recofigurable Multi-Rig Hardware M. Arif Wai* ad Hamid R. Arabia** *Califoria State Uiversity Bakersfield, Califoria, USA **Uiversity of Georgia, Georgia,

More information

Guide to Applying Online

Guide to Applying Online Guide to Applyig Olie Itroductio Respodig to requests for additioal iformatio Reportig: submittig your moitorig or ed of grat Pledges: submittig your Itroductio This guide is to help charities submit their

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Python Programming: An Introduction to Computer Science

Python Programming: An Introduction to Computer Science Pytho Programmig: A Itroductio to Computer Sciece Chapter 6 Defiig Fuctios Pytho Programmig, 2/e 1 Objectives To uderstad why programmers divide programs up ito sets of cooperatig fuctios. To be able to

More information

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis

Extending The Sleuth Kit and its Underlying Model for Pooled Storage File System Forensic Analysis Extedig The Sleuth Kit ad its Uderlyig Model for Pooled File System Foresic Aalysis Frauhofer Istitute for Commuicatio, Iformatio Processig ad Ergoomics Ja-Niclas Hilgert* Marti Lambertz Daiel Plohma ja-iclas.hilgert@fkie.frauhofer.de

More information

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE

EFFICIENT MULTIPLE SEARCH TREE STRUCTURE EFFICIENT MULTIPLE SEARCH TREE STRUCTURE Mohammad Reza Ghaeii 1 ad Mohammad Reza Mirzababaei 1 Departmet of Computer Egieerig ad Iformatio Techology, Amirkabir Uiversity of Techology, Tehra, Ira mr.ghaeii@aut.ac.ir

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection

Ontology-based Decision Support System with Analytic Hierarchy Process for Tour Package Selection 2017 Asia-Pacific Egieerig ad Techology Coferece (APETC 2017) ISBN: 978-1-60595-443-1 Otology-based Decisio Support System with Aalytic Hierarchy Process for Tour Pacage Selectio Tie-We Sug, Chia-Jug Lee,

More information

A Study on the Performance of Cholesky-Factorization using MPI

A Study on the Performance of Cholesky-Factorization using MPI A Study o the Performace of Cholesky-Factorizatio usig MPI Ha S. Kim Scott B. Bade Departmet of Computer Sciece ad Egieerig Uiversity of Califoria Sa Diego {hskim, bade}@cs.ucsd.edu Abstract Cholesky-factorizatio

More information

Architectural styles for software systems The client-server style

Architectural styles for software systems The client-server style Architectural styles for software systems The cliet-server style Prof. Paolo Ciacarii Software Architecture CdL M Iformatica Uiversità di Bologa Ageda Cliet server style CS two tiers CS three tiers CS

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 26 Ehaced Data Models: Itroductio to Active, Temporal, Spatial, Multimedia, ad Deductive Databases Copyright 2016 Ramez Elmasri ad Shamkat B.

More information

Hashing Functions Performance in Packet Classification

Hashing Functions Performance in Packet Classification Hashig Fuctios Performace i Packet Classificatio Mahmood Ahmadi ad Stepha Wog Computer Egieerig Laboratory Faculty of Electrical Egieerig, Mathematics ad Computer Sciece Delft Uiversity of Techology {mahmadi,

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5

Morgan Kaufmann Publishers 26 February, COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Interface. Chapter 5 Morga Kaufma Publishers 26 February, 28 COMPUTER ORGANIZATION AND DESIGN The Hardware/Software Iterface 5 th Editio Chapter 5 Set-Associative Cache Architecture Performace Summary Whe CPU performace icreases:

More information

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1

CS200: Hash Tables. Prichard Ch CS200 - Hash Tables 1 CS200: Hash Tables Prichard Ch. 13.2 CS200 - Hash Tables 1 Table Implemetatios: average cases Search Add Remove Sorted array-based Usorted array-based Balaced Search Trees O(log ) O() O() O() O(1) O()

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms.

why study sorting? Sorting is a classic subject in computer science. There are three reasons for studying sorting algorithms. Chapter 5 Sortig IST311 - CIS65/506 Clevelad State Uiversity Prof. Victor Matos Adapted from: Itroductio to Java Programmig: Comprehesive Versio, Eighth Editio by Y. Daiel Liag why study sortig? Sortig

More information

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network

Evaluation of Distributed and Replicated HLR for Location Management in PCS Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 9, 85-0 (2003) Evaluatio of Distributed ad Replicated HLR for Locatio Maagemet i PCS Network Departmet of Computer Sciece ad Iformatio Egieerig Natioal Chiao

More information

UNIVERSITY OF MORATUWA

UNIVERSITY OF MORATUWA UNIVERSITY OF MORATUWA FACULTY OF ENGINEERING DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING B.Sc. Egieerig 2014 Itake Semester 2 Examiatio CS2052 COMPUTER ARCHITECTURE Time allowed: 2 Hours Jauary 2016

More information

Novel Encryption Schemes Based on Catalan Numbers

Novel Encryption Schemes Based on Catalan Numbers D. Sravaa Kumar, H. Sueetha, A. hadrasekhar / Iteratioal Joural of Egieerig Research ad Applicatios (IJERA) ISSN: 48-96 www.iera.com Novel Ecryptio Schemes Based o atala Numbers 1 D. Sravaa Kumar H. Sueetha

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

A Parallel DFA Minimization Algorithm

A Parallel DFA Minimization Algorithm A Parallel DFA Miimizatio Algorithm Ambuj Tewari, Utkarsh Srivastava, ad P. Gupta Departmet of Computer Sciece & Egieerig Idia Istitute of Techology Kapur Kapur 208 016,INDIA pg@iitk.ac.i Abstract. I this

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 22 Database Recovery Techiques Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Recovery algorithms Recovery cocepts Write-ahead

More information

Intermediate Statistics

Intermediate Statistics Gait Learig Guides Itermediate Statistics Data processig & display, Cetral tedecy Author: Raghu M.D. STATISTICS DATA PROCESSING AND DISPLAY Statistics is the study of data or umerical facts of differet

More information