On the Use of Radio Resource Tests in Wireless ad hoc Networks

Size: px
Start display at page:

Download "On the Use of Radio Resource Tests in Wireless ad hoc Networks"

Transcription

1 Tecnical Report RT/29/2009 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica João Leitão Luis Rodrigues Carlos Ribeiro May 2009

2

3 Abstract Sybil identities are a major treat to te dependable operation of wireless ad oc networks. Tis paper defines a framework to assess te power and performance of radio resource tests (RRT), a tecnique tat allows te detection of Sybil identities. Several RRTs are analyzed and compared using tis framework, including two novel RRTs and an optimization of a RRT previously proposed in te literature. Finally, we sow ow tese tests can be used to detect te presence of Sybil identities in an one-op population, and conclude tat different tests are suitable for different network scenarios.

4 .

5 On te Use of Radio Resource Tests in Wireless ad oc Networks Diogo Mónica João Leitão Carlos Ribeiro Luís Rodrigues Abstract Sybil identities are a major treat to te dependable operation of wireless ad oc networks. Tis paper defines a framework to assess te power and performance of radio resource tests (RRT), a tecnique tat allows te detection of Sybil identities. Several RRTs are analyzed and compared using tis framework, including two novel RRTs and an optimization of a RRT previously proposed in te literature. Finally, we sow ow tese tests can be used to detect te presence of Sybil identities in an one-op population, and conclude tat different tests are suitable for different network scenarios. 1. Introduction Te Sybil Attack is a relevant treat to te secure and dependable operation of wireless ad oc networks. Te name for tis attack was first coined by Douceur in [6]. It consists in aving a malicious node simultaneously assuming multiple identities, commonly called sybil identities. Suc a node can easily disrupt te operation of distributed protocols, suc as distributed storage, routing, data aggregation, voting, intrusion detection, and resource saring [11, 7]. A radio resource test (RRT) is a tecnique tat allows detection of Sybil identities and, terefore, is a fundamental building block for developing dependable arcitectures for wireless ad oc networks. RRTs are a particular case of te more general class of arbitrary resource tests. Resource tests operate under te assumption tat it is possible to establis a bound to te resources available to a single node. Two non-sybil identities must, terefore, be capable of demonstrating tat tey own more aggregate resources tan tose available to a single node. Different kinds of resources can be tested, including computational power, storage capacity, and network bandwidt. Different tests ave tus been proposed in te past [10, 11, 4, 1]. RRTs assume tat eac node as access to a single radio device and builds upon te limitations of tese devices. RRTs ave te potential to support protocols tat do not require pre-configuration, nor pre-sared secrets, improving te scalability of te network. Tis paper makes te following contributions: i) we propose a framework to assess te power and performance of RRTs; ii) we propose a number of novel RRTs; iii) we make a comparative analysis of different RRTs; iv) we discuss ow tese tests can be used to test a population of identities, and determine te cost of suc combined test. Te remainder of tis paper is organized as follows: Section 2 introduces te assumptions made in tis paper and describes te radio resource tests tat will be studied. Section 3 discusses te power and performance of Tis work was partially supported by FCT under grant PTDC/EIA/65588/2006, and by LEMe in te context of project WiMes.

6 different RRTs. Section 4 addresses te use of RRTs for testing larger populations of identities. Section 5 provides a discussion of adequate scenarios for te use of different RRTs. Section 6 concludes te paper and establises some directions for future work. 2. Radio Resource Tests 2.1. Assumptions A radio resource test is typically based on te following assumptions about radio devices [7]: A1) Eac node in te network owns at most a single radio device; A2) Eac device can operate over, at most, K different cannels; A3) No radio device can simultaneously transmit on two different cannels; A4) No radio device can listen simultaneously on two different cannels; A5) A node cannot detect a collision wile transmitting. Eac particular test may use only a subset of tese assumptions. Nodes wit more tan two radio devices can be modeled as multiple colluding nodes. Eac RRT is caracterized by a set of parameters RRT (, c, w) as follows. Parameter is te size of te set S = {s 1,s 2,..., s } of distinct identities tat can be tested simultaneously, in a single test. Parameter c is te number of callenger identities (not in S) tat need to actively participate in te test. Parameter w is te number of tester nodes tat can extract information from te test Tests Being Analyzed Simultaneous Sender Test (SST) Newsome el al. [7] proposed a RRT based on aving te entities to be tested transmit simultaneously on different cannels. In teir original paper, te autors only call teir test radio resource test but, ere, we dubbed it Simultaneous Sender Test (SST) to distinguis it from oter tests. As originally proposed, SST is a RRT (K, 1, 1), i.e., a test tat allows a single node to test simultaneously as many identities as te number of cannels available to te radio devices. Te test operates as follows: Te callenger assigns a different cannel to eac identity being tested. Ten, tese identities start transmitting simultaneously. According to A3, sybil identities will be unable to simultaneously transmit on teir assigned cannels. Te callenger can ten listen to a cannel at random, to verify if te corresponding identity is actually transmitting. If one of te tested identities does not transmit on te assigned cannel, it is assumed to be a sybil identity. Since te callenger can only ceck one cannel at a time, te reply transmissions ave to be repeated r times, to acieve te desired probability of detection. Te required number of rounds r will be derived at a later section. Optimized Simultaneous Sender Test (osst) As te name implies, te Optimized Simultaneous Sender Test (osst) is an optimization of SST. Altoug tis optimization is not referred in any way in [7], we do not list tis test as a novel test, since te optimization is incremental (altoug powerful, as we will see later). Te osst is based on te fact tat te test proposed in [7] can be used as a RRT (K, 0,N K), were N is te number of nodes in te one-op neigborood of te nodes being tested. In fact: i) for a set of k identities (k < N) to be tested, it is possible to devise a deterministic cannel assignment algoritm, tus avoiding te need for an explicit callenger (c =0), and; ii) any node in te one-op neigborood of te nodes being tested can be a tester, i.e. several nodes can detect, at te same time, te existence (or nonexistence) of sybil identities in te set being tested. Simultaneous Receiver Test (SRT) Bot te SST and te osst ave te disadvantage of being very asymmetrical in resource usage: all te tested identities need to transmit during te test. A set of malicious nodes may,

7 terefore, drain te power resources of te network by issuing successive callenges, possibly wit distinct sybil identities. Te Simultaneous Receiver Test (SRT) is a novel RRT (K, 1, 1), tat we now propose. As wit SST, te callenger (wose need may be avoided) assigns a different cannel to eac of te K tested identities. However, in te SRT test, tested identities ave to listen in tose cannels. Te callenger ten sends a message in one of tese cannels, cosen at random. Te corresponding identity is ten required to eco tis message. If one or more of te identities being tested are sybil, accordingly to A4, tey will be unable to listen in all cannels simultaneously, and tere is a probability tat te message will not be ecoed. As before, te callenger may need to perform multiple rounds, to ensure tat sybil identities can be reliably detected. Forced Collision Test (FCT) All te tests described so far require te radio devices to operate in more tan one cannel (i.e., K 2). We now propose a test tat can be performed in settings were radio devices are limited to a single cannel. Te test is based on assumption A5, a known limitation of radio devices [2]. Te Forced Collision Test (FCT) is a RRT (2, 1, 1), were one callenger can test two different identities, s 1 and s 2. Te test operates as follows: s 1 is required to transmit a message M to s 2. If s 2 receives M, it sould retransmit it. During te transmission of M by s 1, te callenger randomly decides to i) cause a collision on te wireless medium, or ii) listen to te medium to verify compliance of s 1. If s 1 and s 2 are different identities, s 2 will be able to retransmit M if tere was no collision, and unable to do so oterwise. If s 1 and s 2 are sybil identities, te malicious node tat controls tem will ave to guess if a collision was generated or not. As in all previous tests, te test must ave r rounds, in order to be conclusive Oter Tests In [8], a somewat different kind of test was proposed. Contrarily to te SST, tis test is completely passive, in te sense tat it does not require te active participation of nodes. Despite tis difference, te main assumptions remain te same. Te autors proposed a protocol, named PASID-GD, tat identifies sybil identities, by comparing te number of expected and observed collisions. However, tis kind of passive approac as a practical problem: it allows te normal participation of sybil identities in te network until tey are detected. Tis means tat an attacker can continuously generate new sybil identities to take te place of tose tat are detected, tereby continuously participating in te network wit multiple identities. Conversely, te use of active tests, suc as te RRTs, allow us to guarantee tat no sybil identities participate in te network before being properly tested. Additionally, a number of tecniques tat rely on location information to detect sybil identities ave been proposed [3, 5, 8, 9]. Suc information can be eiter inferred using radio signal strengt indication [5], or by relying on external components to provide suc information e.g. GPS [9]. Wile te existence of external location sources is plausible for veicular networks, tey are not typical for ad oc networks 1. On te oter and, radio strengt based approaces can be easily attacked, by varying te transmission power, leading to inaccurate detection of sybil identities. 3. Analysis We now discuss te power and performance of eac of te four tests presented earlier: SST, osst, SRT and FCT. Tis analysis considers te following metrics: vulnerability to collusion, message cost, ratio of resource consumption between legitimate and sybil nodes, and syncronization requirements. 1 For instance, it is not typical for laptops to be equipped wit GPS receivers.

8 3.1. Vulnerability to Collusion Collusion appens wen two or more malicious nodes coordinate teir efforts to protect one or more sybil identities. For instance, some malicious nodes may vouc for te sybil identities of oter malicious nodes being tested, making it impossible to identify suc identities as being sybil. Intuitively, one can circumvent colluding nodes by testing simultaneously more identities tan te existing number of colluding nodes. Tis would ensure tat, in tese tests, all colluding nodes would ave to vouc for one of teir own identities, and, tus, all remaining sybil identities would eventually be identified as so. More precisely, to ensure tat a radio resource test RRT (, c, w) operates correctly in environments wit at most m colluding identities 2, we must ave m. Due to tis fact, SST, osst, and SRT can tolerate as many as 1 colluding nodes. Notice tat tese protocols are limited by parameter, wic depends on te total number of radio cannels available to nodes. On sarp contrast, because FCT can only be performed on a pair of nodes, tis protocol cannot operate correctly in te presence of colluding nodes. A single pair of colluding nodes can vouc for an arbitrary large number of sybil identities Message Cost We now discuss te message cost of eac test. We also derive te number of rounds (r) required to detect sybil identities wit a given target probability. Before discussing r, let us look at te cost of a single round for eac test (mt). In SST and osst, eac round requires every tested node to send one message (mt = ). In SRT, at most two messages (mt =2) are excanged (one from te callenger and its eco from te tested node). In FCT, two messages are generated (mt =2), one from one of te tested nodes and anoter from te oter tested node (no forced collision) or from te callenger (forced collision case). Te probability of detecting a given sybil identify in S after r rounds of a RRT (, c, w) test (p d ) is given by: ( p d =1 1 1 ) r Solving in order to r, one can calculate te number of rounds required to attain a specific detection probability: 3.3. Resource consumption r = log (1 p d) log ( 1 1 ) We now discuss te onus tat a RRT (, c, w) test imposes on legitimate nodes wen a malicious node is involved in te test. Te malicious node can be te callenger or te owner of one sybil identity being tested. In tis context, we define te resource consumption cost as te difference between te number of messages sent by correct nodes and messages sent by te malicious node. Notice tat RRTs wit iger cost levels are more vulnerable to denial of service (DoS) attacks. In SST, if te callenger is malicious, it sends a single message to initiate te test and ten eac of te correct nodes send a message on te assigned cannel. Since tere are r transmission rounds, te value of is r 1. If bot te malicious node and its sybil identity are in S, tan te sybil will not reply to te callenger query and, terefore, = r +1 3r. If a malicious node is being tested, but its sybil is not in S, ten = r +1 2r. In SRT, if te malicious node is te callenger, ten as a value of 0 (zero), since te callenger as to send a message for eac reply. If bot a malicious node and its sybil identity are being tested, = 2 3 malicious node is being tested, but its sybil is not, ten = 2 2 r. 2 Notice tat, in scenarios witout colluding nodes: m =1. r. If a

9 Finally, for FCT, as a value of r, if te malicious node is te callenger, 0.5 r if bot te malicious node and its sybil are being tested, and 0.5 r if a malicious node is being tested but its sybil is not. Tus, we ave tat te SST as te worst cost of all te tests, since it is possible for an attacker to consume a large number of network resources, wit a low corresponding effort Syncronization Requirements All RRTs compared in tis paper assume tat te participants in te test ave exclusive access to te medium for te duration of te test. Oterwise, nonparticipating nodes in te test may generate an unbound number of collisions tat, in turn, would make te tests inconclusive. Also, some tests (suc as SST and osst) require nodes to transmit simultaneously. However, in practice, nodes are not required to ave a perfect syncronization; it is enoug to ensure tat te time to transmit a message is orders of magnitude larger tan te allowed amount of desyncronization among nodes (suc tat a node cannot leverage on te desyncronization to send a message on bot cannels). 4. Using te RRTs for Population Control For any RRT (, c, w), K. Naturally, te number of identities tat need to be tested may be greater tan. Terefore, to test a population P composed of N identities, one as to execute a given RRT (, c, w) several times. Tus, te final cost of using a given RRT to test an entire population depends on bot te cost of eac individual test and also of te number of required tests. It will assumed tat all nodes in te system are in radio range (i.e. a single op scenario), and tat a common Time Division Multiple Access (TDMA) sceduler exists, to avoid collision and simplify te sceduling of individual tests. In order to ceck if tere are any sybil identities in P, eac node n must test every group of size ( < N) in P \ {n}. However, detection of a sybil identity can only occur in groups tat include all te colluding malicious nodes (m <) and teir sybil identities. Tere are G suc groups, were: ( ) N m 2 G(N,, m) =. m 1 Taking tis into consideration, te probability tat a callenger node detects a particular sybil identity becomes: p + d =1 ( 1 1 ) r.g(n,,m). (1) Notice tat p + d p d for te same r. In order to ensure a consistent view of P by all non-malicious nodes in P, we require eac sybil identity to be detected by every non-malicious node. Te overall probability of detection of a particular sybil identity is tus given by: p d =(p+ d )N m 1. (2) One could avoid requiring all nodes to perform all te tests, since a node could, upon detecting a sybil identity, simply broadcast a warning. Tat would make te remaining nodes ignore te sybil identity and avoid furter testing. Unfortunately, altoug tis approac allows large improvements on te performance of RRTs, one as to consider tat it also creates te opportunity for a simple attack against te group membersip of correct participants. If a malicious node broadcasts sybil notifications concerning correct participants tey will be expelled from te group, wic can be used at a later time by te malicious node to attack te system (e.g. to attack some majority based protocol being executed in te system).

10 = 2 = 6 = 8 = Probability of detection Number of rounds Figure 1. Probability of detection (p d ) as a function of te number of rounds (r) Figure 1 sows te value of p d for a network composed of 10 identities (N = 10) for distinct values of r and. For reference we also represent P d =0.95 wic is te value we will use in following sections 3. Solving equations (1) and (2) for r allows te specification of te number of rounds required for a desired probability of detection. ( ) log 1 r = R(N,, m, p N m 1 d )= p d G(N,, m).log ( 1 1 ) 4.1. Number of Tests We now express te total number of tests (NT) as a function of N,, m and p d. As previously described, eac node will perform r rounds of tests to all possible combinations of identities of all remaining nodes in te system (N 1). Considering tis, one can easily derive function NT for tis protocol as being: ( ) N 1 NT(N,, m, p d )=R(N,, m, p d ) N However, considering te optimization of SST (osst), te total number of tests decreases substantially, since nodes can avoid testing combinations of identities tat ave already been monitored wen oter nodes performed teir tests. If, on eac test, tere are 0 <w N tester nodes (te callenger node and te passive tester nodes), te function tat describes NT becomes: ( ) N 1 NT(N,, m, w, p d )=R(N,, m, p d ) = R(N,, m, p d ) ( N N w ) N w 3 Altoug we consider p d 0.95 as a case study, tests can be configured to any desired target value of p d.

11 Tis equation clearly sows te advantage of osst, wen configured wit te maximum allowable value for w (i.e. w = N ), in relation to te remaining RRTs (were w =1), for te number of required tests: 4.2. Total Message Cost NT SST/SRT/F CT = NT osst (N ) Te message cost of a RRT is defined as te total number of messages transmitted to complete te protocol. Tis metric is closely associated wit te energy consumption in te system due to execution of eac RRT. Te number of messages transmitted by eac protocol (MT ) can be expressed as te product between te number of tests NT and te number of messages transmitted on eac test (mt): MT (N,, m, w, mt, p d )=NT(N,, m, w, p d ) mt Number of transmissions 2.5 x SST SRT Optimized SST Number of identities in eac test () Figure 2. Total number of message transmissions (MT ) as a function of te number of simultaneously tested identities (). Comparison Table 1 parameterizes te MT function for eac type of test, given te specificities of teir operation. In SST, SRT and FCT te test is only carried by one callenger at a time, w =1. On te oter and, in te optimized version of SST (osst) every node not being tested is testing te group (w = N ). FCT can only test two nodes at a time ( =2) and, tus, can not andle collusion (m =1). Figure 2 plots te functions in Table 1 as a function of (FCT is not plotted because it cannot andle 2), wit N = 20,m=1and p d =0.95. All tree plots sow te same beavior. Te number of transmitted messages is iger for intermediate values of. Terefore, te number of simultaneously tested identities () sould be eiter very low ( =2) or very ig ( = N 1). However, te coice of is also dependent on te maximum number of colluding nodes (m) tat we want to tolerate, and te number of cannels K available (m K). Te non-optimized version of SST is always worse tan te remaining two, but te optimized version (osst) is better tan SRT for < 2N 3 and worse oterwise. Terefore, SRT is better for ig collusion scenarios (m > 2N 3 ) and osst is better for scenarios were fewer cannels are available.

12 Test Messages transmitted Test parameters SST MT (N,, m, 1,, p d ) w =1, mt = osst MT (N,, m, N,, p d ) w = N, mt = SRT MT (N,, m, 1, 2,p d ) w =1, mt =2 FCT MT (N,2, 1, 1, 2,p d ) =2, w =1,m =1, mt =2 Table 1. Number of transmissions per test Figure 3 plots te MT in table 1 as a function of N wit m =1, p d =0.95 and = N 1 for SRT, and =2 for te oters (best case of eac of tem). FCT is always worse tan te oter tree. As expected, for =2, te optimized version of SST beaves better tan te remaining tests. Number of transmissions SST SRT Optimized SST FCT Number of nodes (n) Figure 3. Total number of message transmissions (MT ) as a function of te number nodes (N). 5. Discussion None of te proposed solutions is better tan all te oters in every scenario. Table 2 caracterizes te scenarios were eac solution performs better, wen compared wit oter RRTs. Te optimized version of SST (osst) is most adequate for scenarios wit low and medium collusion and were tere is no danger of denial of service attacks, because it requires te lowest number of messages of all RRT. SRT is te best one for scenarios wit ig levels of collusion (m > 2N 3 ), or were denial of service attacks need to be taken into account, because it as te lowest resource cost level. Finally, FCT is best suited for scenarios were tere is only one cannel available, since all te oter RRT require te simultaneous use of more tan one cannel. 6. Conclusions and Future Work Radio Resource Tests are a viable mecanism for detecting sybil identities in a wireless ad oc network. In tis paper we proposed a framework to compare te power and performance of RRTs. We ave also proposed two novel RRTs and an optimization to a RRT previously proposed in te literature. Furtermore, we ave analyzed

13 Test osst SRT FCT Best application context Low collusion and no DoS treat Hig collusion and/or DoS treat One cannel Table 2. Best application context for eac test tese tests bot in isolation and wen used to test an one-op population. We ave sown tat eac radio resource test is best adapted to a different specific scenario, wic we described. As future work, we would like to explore te idea of aving more sopisticated algoritms to test an entire population, leveraging on different cooperation algoritms among correct nodes. We also plan to explore te possibilities of extending te knowledge gained wit radio resource tests to multi-op networks. References [1] J. Aspnes, C. Jackson, and A. Krisnamurty. Exposing computationally-callenged Byzantine impostors. Tecnical Report YALEU/DCS/TR-1332, Yale University Department of Computer Science, July [2] R. Bar-Yeuda, O. Goldreic, and A. Itai. Efficient emulation of single-op radio network wit collision detection on multi-op radio network wit no collision detection. Distrib. Comput., 5(2):67 71, [3] R. A. Bazzi and G. Konjevod. On te establisment of distinct identities in overlay networks. In PODC 05: Proceedings of te twenty-fourt annual ACM symposium on Principles of distributed computing, pages , New York, NY, USA, ACM. [4] M. Castro, P. Druscel, A. Ganes, A. Rowstron, and D. S. Wallac. Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev., 36(SI): , [5] M. Demirbas and Y. Song. An rssi-based sceme for sybil attack detection in wireless sensor networks. In WOWMOM 06: Proceedings of te 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks, pages , Wasington, DC, USA, IEEE Computer Society. [6] J. R. Douceur and J. S. Donat. Te sybil attack. In Proceedings for te 1st International Worksop on Peer-to-Peer Systems, pages , Cambridge, MA, USA, Mar [7] J. Newsome, E. Si, D. Song, and A. Perrig. Te sybil attack in sensor networks: analysis & defenses. In Information Processing in Sensor Networks, IPSN Tird International Symposium on, pages , [8] C. Piro, C. Sields, and B. N. Levine. Detecting te sybil attack in mobile ad oc networks. Securecomm and Worksops, 2006, pages 1 11, Sept [9] B. Xiao, B. Yu, and C. Gao. Detection and localization of sybil nodes in vanets. In DIWANS 06: Proceedings of te 2006 worksop on Dependability issues in wireless ad oc networks and sensor networks, pages 1 8, New York, NY, USA, ACM. [10] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In Security and Privacy, SP IEEE Symposium on, pages 3 17, May [11] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev., 36(4): , 2006.

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness

Optimal In-Network Packet Aggregation Policy for Maximum Information Freshness 1 Optimal In-etwork Packet Aggregation Policy for Maimum Information Fresness Alper Sinan Akyurek, Tajana Simunic Rosing Electrical and Computer Engineering, University of California, San Diego aakyurek@ucsd.edu,

More information

Haar Transform CS 430 Denbigh Starkey

Haar Transform CS 430 Denbigh Starkey Haar Transform CS Denbig Starkey. Background. Computing te transform. Restoring te original image from te transform 7. Producing te transform matrix 8 5. Using Haar for lossless compression 6. Using Haar

More information

Intra- and Inter-Session Network Coding in Wireless Networks

Intra- and Inter-Session Network Coding in Wireless Networks Intra- and Inter-Session Network Coding in Wireless Networks Hulya Seferoglu, Member, IEEE, Atina Markopoulou, Member, IEEE, K K Ramakrisnan, Fellow, IEEE arxiv:857v [csni] 3 Feb Abstract In tis paper,

More information

2.8 The derivative as a function

2.8 The derivative as a function CHAPTER 2. LIMITS 56 2.8 Te derivative as a function Definition. Te derivative of f(x) istefunction f (x) defined as follows f f(x + ) f(x) (x). 0 Note: tis differs from te definition in section 2.7 in

More information

Multi-Stack Boundary Labeling Problems

Multi-Stack Boundary Labeling Problems Multi-Stack Boundary Labeling Problems Micael A. Bekos 1, Micael Kaufmann 2, Katerina Potika 1 Antonios Symvonis 1 1 National Tecnical University of Atens, Scool of Applied Matematical & Pysical Sciences,

More information

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number

Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Bounding Tree Cover Number and Positive Semidefinite Zero Forcing Number Sofia Burille Mentor: Micael Natanson September 15, 2014 Abstract Given a grap, G, wit a set of vertices, v, and edges, various

More information

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of

George Xylomenos and George C. Polyzos. with existing protocols and their eæciency in terms of IP MULTICASTING FOR WIRELESS MOBILE OSTS George Xylomenos and George C. Polyzos fxgeorge,polyzosg@cs.ucsd.edu Computer Systems Laboratory Department of Computer Science and Engineering University of California,

More information

Real-Time Wireless Routing for Industrial Internet of Things

Real-Time Wireless Routing for Industrial Internet of Things Real-Time Wireless Routing for Industrial Internet of Tings Cengjie Wu, Dolvara Gunatilaka, Mo Sa, Cenyang Lu Cyber-Pysical Systems Laboratory, Wasington University in St. Louis Department of Computer

More information

Distributed and Optimal Rate Allocation in Application-Layer Multicast

Distributed and Optimal Rate Allocation in Application-Layer Multicast Distributed and Optimal Rate Allocation in Application-Layer Multicast Jinyao Yan, Martin May, Bernard Plattner, Wolfgang Mülbauer Computer Engineering and Networks Laboratory, ETH Zuric, CH-8092, Switzerland

More information

Protecting Storage Location Privacy in Sensor Networks

Protecting Storage Location Privacy in Sensor Networks Protecting Storage Location Privacy in Sensor Networks Jianming Zou, Wenseng Zang, and Daji Qiao Iowa State University Ames, IA 511 Email: {jmzou,wzang,daji}@iastate.edu ASTAT Numerous scemes ave been

More information

Symmetric Tree Replication Protocol for Efficient Distributed Storage System*

Symmetric Tree Replication Protocol for Efficient Distributed Storage System* ymmetric Tree Replication Protocol for Efficient Distributed torage ystem* ung Cune Coi 1, Hee Yong Youn 1, and Joong up Coi 2 1 cool of Information and Communications Engineering ungkyunkwan University

More information

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm

CESILA: Communication Circle External Square Intersection-Based WSN Localization Algorithm Sensors & Transducers 2013 by IFSA ttp://www.sensorsportal.com CESILA: Communication Circle External Square Intersection-Based WSN Localization Algoritm Sun Hongyu, Fang Ziyi, Qu Guannan College of Computer

More information

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks Okan Yilmaz and Ing-Ray Cen Computer Science Department Virginia Tec {oyilmaz, ircen}@vt.edu

More information

Investigating an automated method for the sensitivity analysis of functions

Investigating an automated method for the sensitivity analysis of functions Investigating an automated metod for te sensitivity analysis of functions Sibel EKER s.eker@student.tudelft.nl Jill SLINGER j..slinger@tudelft.nl Delft University of Tecnology 2628 BX, Delft, te Neterlands

More information

Linear Interpolating Splines

Linear Interpolating Splines Jim Lambers MAT 772 Fall Semester 2010-11 Lecture 17 Notes Tese notes correspond to Sections 112, 11, and 114 in te text Linear Interpolating Splines We ave seen tat ig-degree polynomial interpolation

More information

More on Functions and Their Graphs

More on Functions and Their Graphs More on Functions and Teir Graps Difference Quotient ( + ) ( ) f a f a is known as te difference quotient and is used exclusively wit functions. Te objective to keep in mind is to factor te appearing in

More information

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation

Fast Calculation of Thermodynamic Properties of Water and Steam in Process Modelling using Spline Interpolation P R E P R N T CPWS XV Berlin, September 8, 008 Fast Calculation of Termodynamic Properties of Water and Steam in Process Modelling using Spline nterpolation Mattias Kunick a, Hans-Joacim Kretzscmar a,

More information

Author's personal copy

Author's personal copy Autor's personal copy Information Processing Letters 09 (009) 868 875 Contents lists available at ScienceDirect Information Processing Letters www.elsevier.com/locate/ipl Elastic tresold-based admission

More information

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks

An Analytical Approach to Real-Time Misbehavior Detection in IEEE Based Wireless Networks Tis paper was presented as part of te main tecnical program at IEEE INFOCOM 20 An Analytical Approac to Real-Time Misbeavior Detection in IEEE 802. Based Wireless Networks Jin Tang, Yu Ceng Electrical

More information

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE

Extended Synchronization Signals for Eliminating PCI Confusion in Heterogeneous LTE 1 Extended Syncronization Signals for Eliminating PCI Confusion in Heterogeneous LTE Amed H. Zaran Department of Electronics and Electrical Communications Cairo University Egypt. azaran@eecu.cu.edu.eg

More information

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks

Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Network Coding-Aware Queue Management for Unicast Flows over Coded Wireless Networks Hulya Seferoglu, Atina Markopoulou EECS Dept, University of California, Irvine {seferog, atina}@uci.edu Abstract We

More information

CHAPTER 7: TRANSCENDENTAL FUNCTIONS

CHAPTER 7: TRANSCENDENTAL FUNCTIONS 7.0 Introduction and One to one Functions Contemporary Calculus 1 CHAPTER 7: TRANSCENDENTAL FUNCTIONS Introduction In te previous capters we saw ow to calculate and use te derivatives and integrals of

More information

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks

Network Coding to Enhance Standard Routing Protocols in Wireless Mesh Networks Downloaded from vbn.aau.dk on: April 7, 09 Aalborg Universitet etwork Coding to Enance Standard Routing Protocols in Wireless Mes etworks Palevani, Peyman; Roetter, Daniel Enrique Lucani; Fitzek, Frank;

More information

3.6 Directional Derivatives and the Gradient Vector

3.6 Directional Derivatives and the Gradient Vector 288 CHAPTER 3. FUNCTIONS OF SEVERAL VARIABLES 3.6 Directional Derivatives and te Gradient Vector 3.6.1 Functions of two Variables Directional Derivatives Let us first quickly review, one more time, te

More information

Redundancy Awareness in SQL Queries

Redundancy Awareness in SQL Queries Redundancy Awareness in QL Queries Bin ao and Antonio Badia omputer Engineering and omputer cience Department University of Louisville bin.cao,abadia @louisville.edu Abstract In tis paper, we study QL

More information

Density Estimation Over Data Stream

Density Estimation Over Data Stream Density Estimation Over Data Stream Aoying Zou Dept. of Computer Science, Fudan University 22 Handan Rd. Sangai, 2433, P.R. Cina ayzou@fudan.edu.cn Ziyuan Cai Dept. of Computer Science, Fudan University

More information

Section 2.3: Calculating Limits using the Limit Laws

Section 2.3: Calculating Limits using the Limit Laws Section 2.3: Calculating Limits using te Limit Laws In previous sections, we used graps and numerics to approimate te value of a it if it eists. Te problem wit tis owever is tat it does not always give

More information

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result

, 1 1, A complex fraction is a quotient of rational expressions (including their sums) that result RT. Complex Fractions Wen working wit algebraic expressions, sometimes we come across needing to simplify expressions like tese: xx 9 xx +, xx + xx + xx, yy xx + xx + +, aa Simplifying Complex Fractions

More information

ITERNET of Things (IoT) envisages a future in which a large

ITERNET of Things (IoT) envisages a future in which a large IEEE TANSACTIONS ON VEHICULA TECHNOLOGY, VOL. 66, NO. 10, OCTOBE 2017 9381 An Accurate Security Game for Low-esource IoT Devices Hicem Sedjelmaci, Member, IEEE, Sidi Moamed Senouci, Member, IEEE, and Tarik

More information

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science

A Cost Model for Distributed Shared Memory. Using Competitive Update. Jai-Hoon Kim Nitin H. Vaidya. Department of Computer Science A Cost Model for Distributed Sared Memory Using Competitive Update Jai-Hoon Kim Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, Texas, 77843-3112, USA E-mail: fjkim,vaidyag@cs.tamu.edu

More information

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks

An Algorithm for Loopless Deflection in Photonic Packet-Switched Networks An Algoritm for Loopless Deflection in Potonic Packet-Switced Networks Jason P. Jue Center for Advanced Telecommunications Systems and Services Te University of Texas at Dallas Ricardson, TX 75083-0688

More information

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor

A Novel QC-LDPC Code with Flexible Construction and Low Error Floor A Novel QC-LDPC Code wit Flexile Construction and Low Error Floor Hanxin WANG,2, Saoping CHEN,2,CuitaoZHU,2 and Kaiyou SU Department of Electronics and Information Engineering, Sout-Central University

More information

Tuning MAX MIN Ant System with off-line and on-line methods

Tuning MAX MIN Ant System with off-line and on-line methods Université Libre de Bruxelles Institut de Recerces Interdisciplinaires et de Développements en Intelligence Artificielle Tuning MAX MIN Ant System wit off-line and on-line metods Paola Pellegrini, Tomas

More information

Sensor Data Collection with Expected Reliability Guarantees

Sensor Data Collection with Expected Reliability Guarantees Sensor Data Collection wit Expected Reliability Guarantees Qi Han, Iosif Lazaridis, Sarad Merotra, Nalini Venkatasubramanian Department of Computer Science, University of California, Irvine, CA 9697 qan,iosif,sarad,nalini

More information

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION

PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION PYRAMID FILTERS BASED ON BILINEAR INTERPOLATION Martin Kraus Computer Grapics and Visualization Group, Tecnisce Universität Müncen, Germany krausma@in.tum.de Magnus Strengert Visualization and Interactive

More information

4.1 Tangent Lines. y 2 y 1 = y 2 y 1

4.1 Tangent Lines. y 2 y 1 = y 2 y 1 41 Tangent Lines Introduction Recall tat te slope of a line tells us ow fast te line rises or falls Given distinct points (x 1, y 1 ) and (x 2, y 2 ), te slope of te line troug tese two points is cange

More information

Minimizing Memory Access By Improving Register Usage Through High-level Transformations

Minimizing Memory Access By Improving Register Usage Through High-level Transformations Minimizing Memory Access By Improving Register Usage Troug Hig-level Transformations San Li Scool of Computer Engineering anyang Tecnological University anyang Avenue, SIGAPORE 639798 Email: p144102711@ntu.edu.sg

More information

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art

Multi-Objective Particle Swarm Optimizers: A Survey of the State-of-the-Art Multi-Objective Particle Swarm Optimizers: A Survey of te State-of-te-Art Margarita Reyes-Sierra and Carlos A. Coello Coello CINVESTAV-IPN (Evolutionary Computation Group) Electrical Engineering Department,

More information

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks

Mean Waiting Time Analysis in Finite Storage Queues for Wireless Cellular Networks Mean Waiting Time Analysis in Finite Storage ueues for Wireless ellular Networks J. YLARINOS, S. LOUVROS, K. IOANNOU, A. IOANNOU 3 A.GARMIS 2 and S.KOTSOOULOS Wireless Telecommunication Laboratory, Department

More information

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy.

Mean Shifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Mean Sifting Gradient Vector Flow: An Improved External Force Field for Active Surfaces in Widefield Microscopy. Margret Keuper Cair of Pattern Recognition and Image Processing Computer Science Department

More information

1.4 RATIONAL EXPRESSIONS

1.4 RATIONAL EXPRESSIONS 6 CHAPTER Fundamentals.4 RATIONAL EXPRESSIONS Te Domain of an Algebraic Epression Simplifying Rational Epressions Multiplying and Dividing Rational Epressions Adding and Subtracting Rational Epressions

More information

Numerical Derivatives

Numerical Derivatives Lab 15 Numerical Derivatives Lab Objective: Understand and implement finite difference approximations of te derivative in single and multiple dimensions. Evaluate te accuracy of tese approximations. Ten

More information

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes

Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganographic Schemes Feature-Based Steganalysis for JPEG Images and its Implications for Future Design of Steganograpic Scemes Jessica Fridric Dept. of Electrical Engineering, SUNY Bingamton, Bingamton, NY 3902-6000, USA fridric@bingamton.edu

More information

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University

SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS. Hewlett-Packard Company East Mission Avenue. Bogazici University SLOTTED-RING LOCAL AREA NETWORKS WITH MULTIPLE PRIORITY STATIONS Sanuj V. Sarin 1, Hakan Delic 2 and Jung H. Kim 3 1 Hewlett-Packard Company 24001 East Mission Avenue Spokane, Wasington 99109, USA 2 Signal

More information

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the

Packet Switching Networks. Jonathan S. Turner. Computer and Communications Research Center. the result of user connections that pass through the Fluid Flow Loading Analysis of Packet Switcing Networks Jonatan S. Turner Computer and Communications Researc Center Wasington University, St. Louis, MO 63130 Abstract Recent researc in switcing as concentrated

More information

An experimental framework to investigate context-aware schemes for content delivery

An experimental framework to investigate context-aware schemes for content delivery An experimental framework to investigate context-aware scemes for content delivery Pietro Lungaro +, Cristobal Viedma +, Zary Segall + and Pavan Kumar + Mobile Service Lab, Royal Institute of Tecnology

More information

12.2 TECHNIQUES FOR EVALUATING LIMITS

12.2 TECHNIQUES FOR EVALUATING LIMITS Section Tecniques for Evaluating Limits 86 TECHNIQUES FOR EVALUATING LIMITS Wat ou sould learn Use te dividing out tecnique to evaluate its of functions Use te rationalizing tecnique to evaluate its of

More information

An Anchor Chain Scheme for IP Mobility Management

An Anchor Chain Scheme for IP Mobility Management An Ancor Cain Sceme for IP Mobility Management Yigal Bejerano and Israel Cidon Department of Electrical Engineering Tecnion - Israel Institute of Tecnology Haifa 32000, Israel E-mail: bej@tx.tecnion.ac.il.

More information

4.2 The Derivative. f(x + h) f(x) lim

4.2 The Derivative. f(x + h) f(x) lim 4.2 Te Derivative Introduction In te previous section, it was sown tat if a function f as a nonvertical tangent line at a point (x, f(x)), ten its slope is given by te it f(x + ) f(x). (*) Tis is potentially

More information

Multi-View Clustering with Constraint Propagation for Learning with an Incomplete Mapping Between Views

Multi-View Clustering with Constraint Propagation for Learning with an Incomplete Mapping Between Views Multi-View Clustering wit Constraint Propagation for Learning wit an Incomplete Mapping Between Views Eric Eaton Bryn Mawr College Computer Science Department Bryn Mawr, PA 19010 eeaton@brynmawr.edu Marie

More information

Vector Processing Contours

Vector Processing Contours Vector Processing Contours Andrey Kirsanov Department of Automation and Control Processes MAMI Moscow State Tecnical University Moscow, Russia AndKirsanov@yandex.ru A.Vavilin and K-H. Jo Department of

More information

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry

Our Calibrated Model has No Predictive Value: An Example from the Petroleum Industry Our Calibrated Model as No Predictive Value: An Example from te Petroleum Industry J.N. Carter a, P.J. Ballester a, Z. Tavassoli a and P.R. King a a Department of Eart Sciences and Engineering, Imperial

More information

A UPnP-based Decentralized Service Discovery Improved Algorithm

A UPnP-based Decentralized Service Discovery Improved Algorithm Indonesian Journal of Electrical Engineering and Informatics (IJEEI) Vol.1, No.1, Marc 2013, pp. 21~26 ISSN: 2089-3272 21 A UPnP-based Decentralized Service Discovery Improved Algoritm Yu Si-cai*, Wu Yan-zi,

More information

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng

An Effective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Chiming Huang and Rei-Heng Cheng An ffective Sensor Deployment Strategy by Linear Density Control in Wireless Sensor Networks Ciming Huang and ei-heng Ceng 5 De c e mbe r0 International Journal of Advanced Information Tecnologies (IJAIT),

More information

The Euler and trapezoidal stencils to solve d d x y x = f x, y x

The Euler and trapezoidal stencils to solve d d x y x = f x, y x restart; Te Euler and trapezoidal stencils to solve d d x y x = y x Te purpose of tis workseet is to derive te tree simplest numerical stencils to solve te first order d equation y x d x = y x, and study

More information

BRICK: A Novel Exact Active Statistics Counter Architecture

BRICK: A Novel Exact Active Statistics Counter Architecture BRICK: A ovel Exact Active Statistics Counter Arcitecture an Hua Bill Lin Jun (Jim) Xu Haiquan (Cuck) Zao College of Computing, Georgia Tec Dept of ECE, UCSD ABSTRACT In tis paper, we present an exact

More information

Asynchronous Power Flow on Graphic Processing Units

Asynchronous Power Flow on Graphic Processing Units 1 Asyncronous Power Flow on Grapic Processing Units Manuel Marin, Student Member, IEEE, David Defour, and Federico Milano, Senior Member, IEEE Abstract Asyncronous iterations can be used to implement fixed-point

More information

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks

Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Traffic Pattern-based Adaptive Routing for Intra-group Communication in Dragonfly Networks Peyman Faizian, Md Safayat Raman, Md Atiqul Molla, Xin Yuan Department of Computer Science Florida State University

More information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information

Unsupervised Learning for Hierarchical Clustering Using Statistical Information Unsupervised Learning for Hierarcical Clustering Using Statistical Information Masaru Okamoto, Nan Bu, and Tosio Tsuji Department of Artificial Complex System Engineering Hirosima University Kagamiyama

More information

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS

MULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS ULTIPLE TOKEN DISTRIBUTED LOOP LOCAL AREA NETWORKS: ANALYSIS Nimmagadda Calamaia æ Dept. of CSE JNTU College of Engineering Kakinada, India 533 003. calm@cse.iitkgp.ernet.in Badrinat Ramamurty y Dept.

More information

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs

Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Parallel Simulation of Equation-Based Models on CUDA-Enabled GPUs Per Ostlund Department of Computer and Information Science Linkoping University SE-58183 Linkoping, Sweden per.ostlund@liu.se Kristian

More information

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS

ANTENNA SPHERICAL COORDINATE SYSTEMS AND THEIR APPLICATION IN COMBINING RESULTS FROM DIFFERENT ANTENNA ORIENTATIONS NTNN SPHRICL COORDINT SSTMS ND THIR PPLICTION IN COMBINING RSULTS FROM DIFFRNT NTNN ORINTTIONS llen C. Newell, Greg Hindman Nearfield Systems Incorporated 133. 223 rd St. Bldg. 524 Carson, C 9745 US BSTRCT

More information

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes

Coarticulation: An Approach for Generating Concurrent Plans in Markov Decision Processes Coarticulation: An Approac for Generating Concurrent Plans in Markov Decision Processes Kasayar Roanimanes kas@cs.umass.edu Sridar Maadevan maadeva@cs.umass.edu Department of Computer Science, University

More information

Integrating Multimedia Applications in Hard Real-Time Systems

Integrating Multimedia Applications in Hard Real-Time Systems Integrating Multimedia Applications in Hard Real-Time Systems Luca Abeni and Giorgio Buttazzo Scuola Superiore S. Anna, Pisa luca@arti.sssup.it, giorgio@sssup.it Abstract Tis paper focuses on te problem

More information

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks

Dynamic Channel Assignment and Reassignment for Exploiting Channel Reuse Opportunities in Ad Hoc Wireless Networks Dynamic Cannel Assignment and Reassignment for Exploiting Cannel Reuse Opportunities in Ad Hoc Wireless Networks Ci-Yung Cang *, Po-Ci Huang *, Cao-Tsun Cang +, and Yu-Syan Cen ++ * Department of Computer

More information

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms

Announcements. Lilian s office hours rescheduled: Fri 2-4pm HW2 out tomorrow, due Thursday, 7/7. CSE373: Data Structures & Algorithms Announcements Lilian s office ours resceduled: Fri 2-4pm HW2 out tomorrow, due Tursday, 7/7 CSE373: Data Structures & Algoritms Deletion in BST 2 5 5 2 9 20 7 0 7 30 Wy migt deletion be arder tan insertion?

More information

E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks

E2E KEEP: End to End Key Exchange and Encryption Protocol for Accelerated Satellite Networks Int. J. Communications, Network and ystem ciences, 2012, 5, 228-237 ttp://dx.doi.org/10.4236/ijcns.2012.54030 ublised Online April 2012 (ttp://www.ci.org/journal/ijcns) E2E KEE: End to End Key Excange

More information

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS

HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS HASH ALGORITHMS: A DESIGN FOR PARALLEL CALCULATIONS N.G.Bardis Researc Associate Hellenic Ministry of te Interior, Public Administration and Decentralization 8, Dragatsaniou str., Klatmonos S. 0559, Greece

More information

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method

Two Modifications of Weight Calculation of the Non-Local Means Denoising Method Engineering, 2013, 5, 522-526 ttp://dx.doi.org/10.4236/eng.2013.510b107 Publised Online October 2013 (ttp://www.scirp.org/journal/eng) Two Modifications of Weigt Calculation of te Non-Local Means Denoising

More information

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method

Comparison of the Efficiency of the Various Algorithms in Stratified Sampling when the Initial Solutions are Determined with Geometric Method International Journal of Statistics and Applications 0, (): -0 DOI: 0.9/j.statistics.000.0 Comparison of te Efficiency of te Various Algoritms in Stratified Sampling wen te Initial Solutions are Determined

More information

Fourth-order NMO velocity for P-waves in layered orthorhombic media vs. offset-azimuth

Fourth-order NMO velocity for P-waves in layered orthorhombic media vs. offset-azimuth Fourt-order NMO velocity for P-waves in layered orrombic media vs. set-azimut Zvi Koren* and Igor Ravve Paradigm Geopysical Summary We derive te fourt-order NMO velocity of compressional waves for a multi-layer

More information

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector.

Materials: Whiteboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Adam Clinc Lesson: Deriving te Derivative Grade Level: 12 t grade, Calculus I class Materials: Witeboard, TI-Nspire classroom set, quadratic tangents program, and a computer projector. Goals/Objectives:

More information

Communicator for Mac Quick Start Guide

Communicator for Mac Quick Start Guide Communicator for Mac Quick Start Guide 503-968-8908 sterling.net training@sterling.net Pone Support 503.968.8908, option 2 pone-support@sterling.net For te most effective support, please provide your main

More information

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method

Alternating Direction Implicit Methods for FDTD Using the Dey-Mittra Embedded Boundary Method Te Open Plasma Pysics Journal, 2010, 3, 29-35 29 Open Access Alternating Direction Implicit Metods for FDTD Using te Dey-Mittra Embedded Boundary Metod T.M. Austin *, J.R. Cary, D.N. Smite C. Nieter Tec-X

More information

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems

A Statistical Approach for Target Counting in Sensor-Based Surveillance Systems Proceedings IEEE INFOCOM A Statistical Approac for Target Counting in Sensor-Based Surveillance Systems Dengyuan Wu, Decang Cen,aiXing, Xiuzen Ceng Department of Computer Science, Te George Wasington University,

More information

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM

THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM THE POSSIBILITY OF ESTIMATING THE VOLUME OF A SQUARE FRUSTRUM USING THE KNOWN VOLUME OF A CONICAL FRUSTRUM SAMUEL OLU OLAGUNJU Adeyemi College of Education NIGERIA Email: lagsam04@aceondo.edu.ng ABSTRACT

More information

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING

UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING UNSUPERVISED HIERARCHICAL IMAGE SEGMENTATION BASED ON THE TS-MRF MODEL AND FAST MEAN-SHIFT CLUSTERING Raffaele Gaetano, Giuseppe Scarpa, Giovanni Poggi, and Josiane Zerubia Dip. Ing. Elettronica e Telecomunicazioni,

More information

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP

16th European Signal Processing Conference (EUSIPCO 2008), Lausanne, Switzerland, August 25-29, 2008, copyright by EURASIP 16t European Signal Processing Conference (EUSIPCO 008), Lausanne, Switzerland, August 5-9, 008, copyrigt by EURASIP ADAPTIVE WINDOW FOR LOCAL POLYNOMIAL REGRESSION FROM NOISY NONUNIFORM SAMPLES A. Sreenivasa

More information

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION

Brief Contributions. A Hybrid Flash File System Based on NOR and NAND Flash Memories for Embedded Devices 1 INTRODUCTION 1002 IEEE TRANSACTIONS ON COMPUTERS, VOL. 57, NO. 7, JULY 2008 Brief Contributions A Hybrid Flas File System Based on NOR and NAND Flas Memories for Embedded Devices Cul Lee, Student Member, IEEE, Sung

More information

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically

2 The Derivative. 2.0 Introduction to Derivatives. Slopes of Tangent Lines: Graphically 2 Te Derivative Te two previous capters ave laid te foundation for te study of calculus. Tey provided a review of some material you will need and started to empasize te various ways we will view and use

More information

Fairness and Load Balancing in Wireless LANs Using Association Control

Fairness and Load Balancing in Wireless LANs Using Association Control Fairness and oad Balancing in Wireless ANs Using Association Control Yigal Bejerano, i (Erran) i Bell abs, ucent Tecnologies, NJ USA Seung-Jae Han Yonsei University, Seoul, Korea Abstract: Te traffic load

More information

Inference Based on SVARs Identified with Sign and Zero Restrictions: Theory and Applications

Inference Based on SVARs Identified with Sign and Zero Restrictions: Theory and Applications Inference Based on SVARs Identified wit Sign and Zero Restrictions: Teory and Applications Jonas E. Arias Federal Reserve Board Juan F. Rubio-Ramírez Emory University, BBVA Researc, and Federal Reserve

More information

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks

An Evaluation of Alternative Continuous Media Replication Techniques in Wireless Peer-to-Peer Networks An Evaluation of Alternative Continuous Media eplication Tecniques in Wireless Peer-to-Peer Networks Saram Gandearizade and Tooraj Helmi Department of Computer Science University of Soutern California

More information

Tilings of rectangles with T-tetrominoes

Tilings of rectangles with T-tetrominoes Tilings of rectangles wit T-tetrominoes Micael Korn and Igor Pak Department of Matematics Massacusetts Institute of Tecnology Cambridge, MA, 2139 mikekorn@mit.edu, pak@mat.mit.edu August 26, 23 Abstract

More information

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL

RECONSTRUCTING OF A GIVEN PIXEL S THREE- DIMENSIONAL COORDINATES GIVEN BY A PERSPECTIVE DIGITAL AERIAL PHOTOS BY APPLYING DIGITAL TERRAIN MODEL IV. Évfolyam 3. szám - 2009. szeptember Horvát Zoltán orvat.zoltan@zmne.u REONSTRUTING OF GIVEN PIXEL S THREE- DIMENSIONL OORDINTES GIVEN Y PERSPETIVE DIGITL ERIL PHOTOS Y PPLYING DIGITL TERRIN MODEL bsztrakt/bstract

More information

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION

MAP MOSAICKING WITH DISSIMILAR PROJECTIONS, SPATIAL RESOLUTIONS, DATA TYPES AND NUMBER OF BANDS 1. INTRODUCTION MP MOSICKING WITH DISSIMILR PROJECTIONS, SPTIL RESOLUTIONS, DT TYPES ND NUMBER OF BNDS Tyler J. lumbaug and Peter Bajcsy National Center for Supercomputing pplications 605 East Springfield venue, Campaign,

More information

Piecewise Polynomial Interpolation, cont d

Piecewise Polynomial Interpolation, cont d Jim Lambers MAT 460/560 Fall Semester 2009-0 Lecture 2 Notes Tese notes correspond to Section 4 in te text Piecewise Polynomial Interpolation, cont d Constructing Cubic Splines, cont d Having determined

More information

Limits and Continuity

Limits and Continuity CHAPTER Limits and Continuit. Rates of Cange and Limits. Limits Involving Infinit.3 Continuit.4 Rates of Cange and Tangent Lines An Economic Injur Level (EIL) is a measurement of te fewest number of insect

More information

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises

SEATTLE: A Scalable Ethernet Architecture for Large Enterprises TRC00349 ACM (Typeset by SPi, Manila, Pilippines) 1 of 35 February 23, 2011 14:31 SEATTLE: A Scalable Eternet Arcitecture for Large Enterprises 1 CHANGHOON KIM, Microsoft MATTHEW CAESAR, University of

More information

Application of a Key Value Paradigm to Logic Factoring

Application of a Key Value Paradigm to Logic Factoring INVITED PAPER Application of a Key Value Paradigm to Logic Factoring Te autor first revisits a classic algoritm for algebraic factoring to establis a stronger connection to te functional intent rater tan

More information

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21,

Proceedings of the 8th WSEAS International Conference on Neural Networks, Vancouver, British Columbia, Canada, June 19-21, Proceedings of te 8t WSEAS International Conference on Neural Networks, Vancouver, Britis Columbia, Canada, June 9-2, 2007 3 Neural Network Structures wit Constant Weigts to Implement Dis-Jointly Removed

More information

Minimizing the Embedding Impact in Steganography

Minimizing the Embedding Impact in Steganography Minimizing te Embedding Impact in Steganograpy Jessica Fridric SUNY Bingamton Department of ECE Bingamton, NY 3902-6000 00 607 777 677 fridric@bingamton.edu ABSTRACT In tis paper, we study te trade-off

More information

Computing geodesic paths on manifolds

Computing geodesic paths on manifolds Proc. Natl. Acad. Sci. USA Vol. 95, pp. 8431 8435, July 1998 Applied Matematics Computing geodesic pats on manifolds R. Kimmel* and J. A. Setian Department of Matematics and Lawrence Berkeley National

More information

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik

Generalizing Timing Predictions to Set-Associative Caches. Frank Mueller. Humboldt-Universitat zu Berlin. Institut fur Informatik Generalizing Timing Predictions to Set-Associative Caces Frank Mueller Humboldt-Universitat zu Berlin Institut fur Informatik 10099 Berlin (Germany) e-mail: mueller@informatik.u-berlin.de pone: (+49) (30)

More information

Section 1.2 The Slope of a Tangent

Section 1.2 The Slope of a Tangent Section 1.2 Te Slope of a Tangent You are familiar wit te concept of a tangent to a curve. Wat geometric interpretation can be given to a tangent to te grap of a function at a point? A tangent is te straigt

More information

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2

Software Fault Prediction using Machine Learning Algorithm Pooja Garg 1 Mr. Bhushan Dua 2 IJSRD - International Journal for Scientific Researc & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 Software Fault Prediction using Macine Learning Algoritm Pooja Garg 1 Mr. Busan Dua 2

More information

Energy efficient temporal load aware resource allocation in cloud computing datacenters

Energy efficient temporal load aware resource allocation in cloud computing datacenters Vakilinia Journal of Cloud Computing: Advances, Systems and Applications (2018) 7:2 DOI 10.1186/s13677-017-0103-2 Journal of Cloud Computing: Advances, Systems and Applications RESEARCH Energy efficient

More information

Image Registration via Particle Movement

Image Registration via Particle Movement Image Registration via Particle Movement Zao Yi and Justin Wan Abstract Toug fluid model offers a good approac to nonrigid registration wit large deformations, it suffers from te blurring artifacts introduced

More information

Experimental Studies on SMT-based Debugging

Experimental Studies on SMT-based Debugging Experimental Studies on SMT-based Debugging Andre Sülflow Görscwin Fey Rolf Drecsler Institute of Computer Science University of Bremen 28359 Bremen, Germany {suelflow,fey,drecsle}@informatik.uni-bremen.de

More information

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets

A Bidirectional Subsethood Based Similarity Measure for Fuzzy Sets A Bidirectional Subsetood Based Similarity Measure for Fuzzy Sets Saily Kabir Cristian Wagner Timoty C. Havens and Derek T. Anderson Intelligent Modelling and Analysis (IMA) Group and Lab for Uncertainty

More information