Managing Trust Relationships in Peer 2 Peer Systems

Size: px
Start display at page:

Download "Managing Trust Relationships in Peer 2 Peer Systems"

Transcription

1 Managing Trust Rlationships in Pr 2 Pr Systms R.S.SINJU PG STUDENT, DEPARTMENT OF COMPUTER SCIENCE, PONJESLY COLLEGE OF ENGINEERING NAGERCOIL, TAMILNADU, INDIA C.FELSY ASST.PROF, DEPARTMENT OF COMPUTER SCIENCE, PONJESLY COLLEGE OF ENGINEERING, NAGERCOIL, TAMILNADU, INDIA Abstract: Pr-2-Pr systm xposs thm to malicious activity. Pr-2-Pr systm mans computr in th systm can act as both clint and srvr. In a Pr-2-Pr ntwork, th prs ar computr systms which ar connctd to ach othr via th intrnt. Fils can b shard dirctly btwn systms on th ntwork without th nd of a cntral srvr. Building trust rlationships among prs can dcras th attacks of malicious prs. A good pr uploads authntic fils and givs fair rcommndations. A malicious pr prforms both srvic and rcommndation-basd attacks. Uploading a virus infctd (or) an inauthntic fil is a srvic basd attack. Giving a mislading rcommndation intntionally is a rcommndation basd attack. Slf Organizing Trust Modl (SORT) dtcts th srvic basd attack and rcommndation basd attack. If on pr wants to upload/download fil from anothr pr mans pr will snd th qury to pr that intractd in th past for larn th trust information of othr prs. So, nighbouring nod will giv th rcommndation to pr. Basd on th rcommndation only Pr dcids whthr th nod is good (or) malicious. Find th nod is malicious nod mans pr will not intract with malicious nod. Isolat th malicious nod from th ntwork. Find th nod is good mans pr intract with good pr. Pr stors a sparat history of intractions for ach Acquaintanc. Kywords: Pr-to-pr systms, trust managmnt, rputation, scurity. I. INTRODUCTION Opn natur of pr-to-pr systms xposs thm to malicious activity. Building trust rlationships among prs can mitigat attacks of malicious prs. This papr prsnts distributd algorithms that nabl a pr to rason about trust worthinss of othr prs basd on past intractions and rcommndations. Prs crat thir own trust ntwork in thir proximity by using local information availabl and do not try to larn global trust information. Two contxts of trust, srvic, and rcommndation contxts ar dfind to masur trustworthinss in providing srvics and giving rcommndations. Intractions and rcommndations ar valuatd basd on importanc, rcntnss, and pr satisfaction paramtrs. Additionally, rcommndr s trustworthinss and confidnc about a rcommndation ar considrd whil valuating rcommndations. Simulation xprimnts on a fil sharing application show that th proposd modl can mitigat attacks on 16 diffrnt malicious bhavior modls. In th xprimnts, good prs wr abl to form trust rlationships in thir proximity and isolat malicious prs. Pr to Pr (P2P) systms rly on collaboration of prs to accomplish tasks. Eas of prforming malicious activity is a thrat for scurity of P2P systms. Crating long-trm trust rlationships among prs can provid a mor scur nvironmnt by rducing risk and uncrtainty in futur P2P intractions. Howvr, stablishing trust in an unknown ntity is difficult in such a malicious nvironmnt. Furthrmor, trust is a social concpt and hard to masur with numrical valus. Mtrics ar ndd to rprsnt trust in computational modls. Classifying prs as ithr trustworthy or untrustworthy is not sufficint in most cass. Mtrics should hav prcision so prs can b rankd according to trustworthinss. Intractions and fdbacks of prs provid information to masur trust among prs. Intractions with a pr provid crtain information about th pr but fdbacks might contain dcptiv Pag 29

2 information. This maks assssmnt of trustworthinss a challng. In th prsnc of an authority, a cntral srvr is a prfrrd way to stor and manag trust information..g., Bay. Th cntral srvr scurly stors trust information and dfins trust mtrics. Sinc thr is no cntral srvr in most P2P systms, prs organiz thmslvs to stor and manag trust information about ach othr [2], [3]. Managmnt of trust information is dpndnt to th structur of P2P ntwork. Managing trust is a problm of particular importanc in pr-to-pr nvironmnts whr on frquntly ncountrs unknown agnts. Existing mthods for trust managmnt that ar basd on rputation focus on th smantic propr- tis of th trust modl. Thy do not scal as thy ithr rly on a cntral databas or rquir maintaining global knowldg at ach agnt to provid data on arlir intractions. In this papr w prsnt an approach that addrsss th problm of rputation-basd trust managmnt at both th data managmnt and th smantic lvl. W mploy at both lvls scalabl data structurs and algorithms that rquir no cntral control and allow assssing trust by computing an agnts rputation from its formr intractions with othr agnts. Thr ar no wll dfind mthods for managing trust rlationships in p2p systms. Th DHT basd approachs ar only suitd for structurd p2p ntworks not for unstructurd p2p ntworks. Som of th xisting mthods introduc cntral authority in p2p ntworks which may collaps p2p natur. Evry agnt must kp rathr complx and vry larg data structurs that rprsnt a kind of global knowldg about th whol ntwork. This papr prsnts distributd algorithms that nabl a pr to rason about trustworthinss of othr prs basd on past intractions and rcommndations. Prs crat thir own trust ntwork in thir proximity by using local information availabl and do not try to larn global trust information. Two contxts of trust, srvic, and rcommndation contxts ar dfind to masur trustworthinss in providing srvics and giving rcommndations. Slf-Organizing Trust modl (SORT) that aims to dcras malicious activity in a P2P systm by stablishing trust rlations among prs in thir proximity. In SORT, prs ar assumd to b strangrs to ach othr at th bginning. A pr bcoms an acquaintanc of anothr pr aftr providing a srvic,.g., uploading a fil. If a pr has no acquaintanc, it chooss to trust strangrs. An acquaintanc is always prfrrd ovr a strangr if thy ar qually trustworthy. Using a srvic of a pr is an intraction, which is valuatd basd on wight (importanc) and rcntnss of th intraction, and satisfaction of th rqustr. An acquaintanc s fdback about a pr, r commndation, is valuatd basd on rcommndr s trust worthinss. It contains th rcommndr s own xprinc about th pr, information collctd from th rcommndr s acquaintancs, and th rcommndr s lvl of confidnc in th rcommndation. If th lvl of confidnc is low, th rcommndation has a low valu in valuation and affcts lss th trustworthinss of th rcommndr. SORT dfins thr trust mtrics. Rputation mtric is calculatd basd on rcommndations. It is important whn dciding about strangrs and nw acquaintancs. Rputation loss its importanc as xprinc with an acquaintanc incrass. Srvic trust and rcommndation trust ar primary mtrics to masur trustworthinss in th srvic and rcommndation contxts, rspctivly. Th srvic trust mtric is usd whn slcting srvic providrs. Th rcommndation trust mtric is important whn rqusting rcommndations. Whn calculating th rputation mtric, rcommndations ar valuatd basd on th rcommndation trust mtric. On pr is markd as trustd by SORT and if it is turnd OFF from ntwork, thr is a possibility to anothr malicious pr taks its position and act as trustd pr. This can b avoidd by Auto Updat Mchanism. II. RELATED WORK AND CONTRIBUTION Th simulation runs as cycls. Each cycl rprsnts a priod of tim. Downloading a fil is an intraction. A pr sharing fils is calld an uploadr. A pr downloading a fil is calld a downloadr. Th st of prs who downloadd a fil from a pr ar calld downloadrs of th pr. An ongoing download/ upload opration is calld a sssion. Simulation paramtrs ar gnratd basd on rsults of svral mpirical studis [6], [7] to mak obsrvations ralistic. A fil sarch rqust rachs up to 40 prcnt of th ntwork and rturns onlin uploadrs only. A fil is downloadd from on uploadr to simplify intgrity chcking. All prs ar assumd to hav antivirus softwar so thy can dtct infctd fils Four diffrnt cass ar studid to undrstand ffcts of trust calculation mthods undr attack conditions: No trust. Trust information is not usd for uploadr slction. An uploadr is slctd according to its bandwidth. This mthod is th bas cas to undrstand if trust is hlpful to mitigat attacks. Pag 30

3 No rputation qury. An uploadr is slctd basd on trust information but prs do not rqust rcommndations from othr prs. Trust calculation is don basd on SORT quations but rputation (r) valu is always zro for a pr. This mthod will hlp us to assss if rcommndations ar hlpful. SORT. In SORT, prs ar assumd to b strangrs to ach othr at th bginning. A pr bcoms an acquaintanc of anothr pr aftr providing a srvic,.g., uploading a fil. If a pr has no acquaintanc, it chooss to trust strangrs. Flood rputation qury. SORT quations ar usd but a rputation qury is floodd to th whol ntwork. This mthod will hlp us to undrstand if gtting mor rcommndations is hlpful to mitigat attacks. In SORT, to valuat intractions and rcommndations bttr, importanc, rcntnss, and pr satisfaction paramtrs ar considrd. Rcommndr s trustworthinss and confidnc about rcommndation ar considrd whn valuating rcommndations. Additionally, srvic and rcommndation contxts ar sparatd. This nabld us to masur trustworthinss in a wid varity of attack scnarios. Most trust modls do not considr how intractions ar ratd and assum that a rating mchanism xists. In this study, w suggst an intraction rating mchanism on a fil sharing application and considr many ral-lif paramtrs to mak simulations mor ralistic. A good pr uploads authntic fils and givs fair rcommndations. A malicious pr (attackr) prforms both srvic and rcommndation-basd attacks. Four diffrnt attack bhaviors ar studid for malicious prs: naiv, discriminatory, hypocritical, and oscillatory bhaviours. A non-malicious ntwork consists of only good prs. A malicious ntwork contains both good and malicious prs. Th satisfaction paramtr is calculatd basd on following variabls: Th ratio of avrag bandwidth (AvBw) and agrd bandwidth (AgrBw) is a masur of rliability of an uploadr in trms of bandwidth. Th ratio of onlin (OnP) and offlin (OffP) priods rprsnts availability of an uploadr. A. Ntwork architctur NODE A NODEB(Offlin ) NODE D NODE C(malicious) SORT REPUTATION METRIC SERVICE TRUST METRIC RECOMMENDATION TRUST METRIC COMPETENCE BELIEF INTEGRITY BELIEF Pi 1.rcommn dation rq about Pj Pk DETECT MALICIOUS NODE(Rcommndation attack-50%,srvic basd attack-100%) AUTO UPDATE MECHANISM DETECT MALICIOUS NODE 3. S r v i c r q u s t 4. s r v i c 2.rcommnda tion about Pj Pj Fig a: Architctur Diagram Pag 31

4 Downloading a fil is an intraction. A pr sharing fils is calld an uploadr. A pr downloading a fil is calld a downloadr. Th st of prs who downloadd a fil from a pr ar calld downloadrs of th pr. An ongoing download/ upload opration is calld a sssion. A good pr uploads authntic fils and givs fair rcommndations. A malicious pr (attackr) prforms both srvic and rcommndation-basd attacks. Four diffrnt attack bhaviours ar studid for malicious prs: naiv, discriminatory, hypocritical, and oscillatory bhaviours. A non malicious ntwork consists of only good prs. A malicious ntwork contains both good and malicious prs. SORT dfins thr trust mtrics. Rputation mtric is calculatd basd on rcommndations. It is important whn dciding about strangrs and nw acquaintancs. Rputation loss its importanc as xprinc with an acquaintanc incrass. Srvic trust and rcommndation trust ar primary mtrics to masur trustworthinss in th srvic and rcommndation contxts, rspctivly. Th srvic trust mtric is usd whn slcting srvic providrs. Th rcommndation trust mtric is important whn rqusting rcommndations. Whn calculating th rputation mtric, rcommndations ar valuatd basd on th rcommndation trust mtric. Assum that pi wants to gt a particular srvic. pj is a strangr to pi and a probabl srvic providr. To larn pj s rputation, pi rqusts rcommndations from its acquaintancs. Assum that pk snds back a rcommndation to pi. Aftr collcting all rcommndations, pi calculats rij. Thn, pi valuats pk s rcommndation, stors rsults in RHik, and updats rtik. Assuming pj is trustworthy nough, pi gts th srvic from pj. Thn, pi valuats this intraction and stors th rsults in SHij, and updats stij. On pr is markd as trustd by SORT and if it is turnd off from ntwork,thr is a possibility to anothr malicious pr taks its position and act as trustd pr.this can b avoidd by th Auto updat mchanism. B. Algorithm Dsign and Implmntation Topology cration is crating a ntwork and maintaining communication among various nods in pr to pr ntwork which hlps us to shar th data. Crat diffrnt nods in propr nam, ip addrss and port numbr for data communication. Th nod is addd to giv th nam of th nod, ip addrss and port addrss of that nod. If th ntir nod adds succssfully to display th nod connction frams. Crating long-trm trust rlationships among prs can provid a mor scur nvironmnt by rducing risk and uncrtainty in futur P2P intractions. Howvr, stablishing trust in an unknown ntity is difficult in such a malicious nvironmnt. Furthrmor, trust is a social concpt and hard to masur with numrical valus. Mtrics ar ndd to Pag 32

5 rprsnt trust in computational modls. Classifying prs as ithr trustworthy or untrustworthy is not sufficint in most cass. Mtrics should hav prcision so prs can b rankd according to trustworthinss. Intractions and fdbacks of prs provid information to masur trust among prs. Intractions with a pr provid crtain information about th pr but fdbacks might contain dcptiv information. This maks assssmnt of trustworthinss a challng. Slf-Organizing Trust modl (SORT) that aims to dcras malicious activity in a P2P systm by stablishing trust rlations among prs. Each pr dvlops its own local viw of trust about th prs intractd in th past. In this way, good prs form dynamic trust groups in thir proximity and can isolat malicious prs. In SORT, prs ar assumd to b strangrs to ach othr at th bginning. A pr bcoms an acquaintanc of anothr pr aftr providing a srvic,.g., uploading a fil. If a pr has no acquaintanc, it chooss to trust strangrs. SORT dfins thr trust mtrics. Rputation mtric is calculatd basd on rcommndations. It is important whn dciding about strangrs and nw acquaintancs. Rputation loss its importanc as xprinc with an acquaintanc incrass. Srvic trust and rcommndation trust ar primary mtrics to masur trustworthinss in th srvic and rcommndation contxts, rspctivly. Th srvic trust mtric is usd whn slcting srvic providrs. Th rcommndation trust mtric is important whn rqusting rcommndations. Whn calculating th rputation mtric, rcommndations ar valuatd basd on th rcommndation trust mtric. Crating trust rlationship is basd upon two contxts of trust. Thy ar Srvic Contxt, Rcommndation Contxt. Th srvic trust mtric is usd whn slcting srvic providrs. Th rcommndation trust mtric is important whn rqusting rcommndations. Whn pi sarchs for a particular srvic, it gts list of srvic providrs. Considring a fil sharing application, pimay download a fil from ithr on or multipl uploadrs. With multipl uploadrs, chcking intgrity is a problm sinc any fil part downloadd from an uploadr might b inauthntic.. Assum that pi wants to gt a particular srvic. pj is a strangr to pi and a probabl srvic providr. To larn pj s rputation, pi rqusts rcommndations from its acquaintancs. Assum that pk snds back a rcommndation to pi. Aftr collcting all rcommndations, pi calculats rij. Thn, pi valuats pk s rcommndation, stors rsults in RHik, and updats rtik. Assuming pj is trustworthy nough, pi gts th srvic from pj. Thn, pi valuats this intraction and stors th rsults in SHij, and updats stij. III. PERFORMANCE ANALYSIS AND RESULTS A. Prformanc Analysis Fig b: Existing Systm(10% Malicious) Pag 33

6 Fig c: Proposd Systm (50% Malicious) Analysis on Individual Attackrs This sction xplains th rsults of xprimnts on individual attackrs. For ach typ of individual attackr, two sparat ntwork topologis ar cratd: on with 10 prcnt malicious and on with 50 prcnt malicious. Each ntwork topology is tstd with four trust calculation mthods. In th xprimnts, a hypocritical attackr bhavs malicious in 20 prcnt of all intractions. A discriminatory attackr slcts 10 prcnt of all prs as victims. An oscillatory attackr bhavs good for 1,000 cycls and malicious for 100 cycls. Srvic-basd attacks Tabl shows th prcntag of srvic-basd attacks prvntd by ach trust calculation mthod. Whn a malicious pr uploads an infctd/ inauthntic fil, it is rcordd as a srvic-basd attack. Numbr of attacks in No Trust mthod is considrd as th bas cas to undrstand how many attacks can happn without using trust information. Thn, numbr of attacks obsrvd for ach trust calculation mthod is compard with th bas cas to dtrmin th prcntag of attacks prvntd. In th tabl, NoRQ and FloodRQ dnot No rputation qury and Flood rputation qury mthods, rspctivly. Rcommndation-basd attacks In th simulations, whn a malicious pr givs a mislading rcommndation, it is rcordd as a rcommndation-basd attack. Fig. 2 shows th rat of rcommndation-basd attacks in th 10 prcnt malicious ntwork. Whn SORT is usd, prs form thir own trust ntwork with tim and do not rqust rcommndations from untrustworthy prs. Thrfor, SORT can ffctivly mitigat rcommndation-basd attacks with tim. In FloodRQ mthod, prs collct mor rcommndations from both acquaintancs and strangrs. Distribution of trust mtrics Prs with highr capabilitis (ntwork bandwidth, onlin priod, and numbr of shard fils) can finish mor intractions succssfully. Thus, thy gnrally hav bttr rputation and srvic trust valus. Rcommndation trust valus ar not dirctly rlatd to pr capabilitis sinc giving a rcommndation dos not rquir high capabilitis. Analysis on Individual Psudospoofrs This sction xplains th rsults of xprimnts on individual psudospoofrs. Psudospoofrs chang thir psudonyms aftr vry 1,000 cycls. Srvic-basd attacks Tabl shows th attack prvntion ratio for individual psudospoofrs. Th valus obtaind by comparing th bas cas with ach trust calculation mthod. Aftr vry psudonym chang, attackrs bcom strangrs to othrs. This bhavior has two ffcts: 1) Psudospoofrs clar thir bad history. Hnc a good pr may intract with thm whn it cannot find mor rliabl uploadrs, which incrass attacks. 2) Psudospoofrs bcom mor isolatd from good prs. Thy los thir ability to attract good prs with tim, which dcrass attacks. Pag 34

7 Rcommndation-basd attacks Comparing to nonpsudonym changing individual attackrs, rcommndation-basd attacks dcras du to th scond ffct. Attackrs bcom mor isolatd from good prs aftr vry psudonym chang and gt lss rcommndation rqusts. Thrfor, thir rcommndation-basd attacks sharply dcras aftr vry psudonym chang in a 10 prcnt malicious ntwork. This situation is slightly diffrnt in a 50 prcnt malicious ntwork. Th good prs nd to intract with mor strangrs sinc thy can hardly find ach othr. Hnc attackrs can distribut mor mislading rcommndations. Distribution of trust mtrics Sinc psudospoofrs clar thir old history in vry 1,000 cycls, thy cannot gain a high rputation among good prs. This situation is sam for srvic trust and rcommndation trust mtrics. Avrag rputation, srvic trust, and rcommndation trust valus of psudospoofrs rmain undr 0.01 valu in most simulations. Analysis on Collaborators Collaboration of attackrs gnrally maks attack prvntion hardr. This sction prsnts xprimntal rsults on collaborators. Collaborators form tams of siz 50 and launch attacks as tams. W first trid tams of siz 10 but this was not nough to bnfit from collaboration and rsults wr clos to individual attackrs. Hnc tam siz is incrasd to obsrv ffcts of collaboration bttr. Srvic-basd attacks Tabl shows th prcntag of attacks prvntd by ach mthod. Attacks of naïv collaborators can b prvntd by 60 prcnt or mor. Naiv collaborators ar idntifid by good prs aftr th first intraction so thy ar not askd for rcommndations. Rcommndation Basd Attacks In a 50 prcnt malicious ntwork, attacks of hypocritical and oscillatory collaborators can b containd on a lvl but cannot b dcrasd to an accptabl lvl. Thy can continu to dissminat mislading rcommndations du to thir larg numbr. Discriminatory collaborators can dissminat mor mislading rcommndations than othrs sinc thy ar trustd by 90 prcnt of all prs. Discriminatory collaborators constitut 50 prcnt of all pr population whil victims ar 10 prcnt of all population. Trust Mtric Good prs can maintain highr rputation than hypocritical collaborators in th 10 prcnt malicious ntwork. In 50 prcnt malicious ntwork stup, collaborators gain highr rputation valus and dcras rputation of good pr. Analysis on Collaborating Pdsudospoofrs This sction prsnts th rsults of xprimnts on collaborating psudospoofrs. Collaborating psudospoofrs ar assumd to chang thir psudonyms in vry 1,000 cycls using an xtrnal synchronization mthod. Srvic-basd attacks Tabl shows th prcntag of attacks prvntd by ach trust calculation mthod. Th rsults vrify our obsrvations. In naiv and discriminatory bhaviors, changing psudonym causs th first ffct: collaborators clar bad history and gt mor attack opportunitis. Thrfor, attack prvntion ratio drops for ths collaborators. Rcommndation-basd attacks As in individual psudospoofrs, collaborating psudospoofrs ar isolatd mor from good prs aftr vry psudonym chang. Thy gt lss rcommndation rqusts and thus thy can do narly zro rcommndation-basd attacks in 10 prcnt malicious ntwork. Trust mtrics Lik individual psudospoofrs, collaborating psudospoofrs cannot gain high rputation, srvic trust, or rcommndation trust valus sinc thy los rputation aftr vry psudonym chang. Du to thir low rcommndation Pag 35

8 trust valus, collaborators ar not askd for rcommndations by good prs. Thrfor, thy can distribut small numbr of mislading rcommndations. B. Rsults Fig d: Mssag Communication Th data can b communicatd ffctivly without any malicious activity.th Slf Organizing Trust Modl finds th malicious nod by itslf with srvic and rcommndation contxt.so that th communication is mad mor ffctiv without th attack of malicious nod in th ntwork.stting B as 'malicious Nod'.Snd data from 'a' to 'c'.hr th mssag is only Rcivd to 'b'. Sinc 'B' is malicious.this path is addd as invalid. Now I am going to snd mssag from 'D' to B.Hr th mssag rcivd to 'B' Sinc th intrmdiat nod 'C' is not malicious. Th path is addd as valid. IV. CONCLUSION SORT mitigatd both srvic and rcommndation-basd attacks in most xprimnts. Howvr, in xtrmly malicious nvironmnts such as a 50 prcnt malicious ntwork, collaborators can continu to dissminat larg amount of mislading rcommndations. Anothr issu about SORT is maintaining trust all ovr th ntwork. Ths issus might b studid as a futur work to xtnd th trust modl. Using trust information dos not solv all scurity problms in P2P systms but can nhanc scurity and ffctivnss of systms. REFERENCES [1] AhmtBurakCan and Bharat(2013), A Slf-Organizing Trust Modl for Pr-to-Pr Systms IEEE Trans.Dpndabl and Scur Computing,vol 10,No.1. [2] Abrr.K and Dspotovic.Z(2001), Managing Trust in a Pr-2-Pr Information Systm Proc. 10th Intl Conf. Information and Knowldg Managmnt (CIKM). [3] Kamvar.S, Schlossr.M, and Garcia-Molina.H,(2003) Th (Eigntrust) Algorithm for Rputation Managmnt in P2P Ntworks Proc. 12th World Wid Wb Conf. (WWW). [4] SlcukA.A,Uzun.E, and Parint.M.R(2004), A Rputation-Basd Trust Managmnt Systm for P2P Ntworks Proc. IEEE/ACM Fourth Int l Symp. Clustr Computing and th Grid (CCGRID). [5] Zhou. R, Hwang. K, and Cai. M(2008), Gossiptrust for Fast Rputation Aggrgation in Pr-to-Pr Ntworks IEEE Trans. Knowldg and Data Eng., vol. 20, no. 9. [6] Abdul-Rahman. A and Hails.S(2008), Supporting Trust in Virtual Communitis Proc. 33rd Hawaii Int l Conf. Systm Scincs (HICSS). [7] Yu. B and Singh.M(2000), A Social Mchanism of Rputation Managmnt in Elctronic Communitis Proc. Cooprativ Information Agnts (CIA). Pag 36

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S

i e ai E ig e v / gh E la ES h E A X h ES va / A SX il E A X a S isto C o C or Co r op ra p a py ag yr g ri g g gh ht S S S V V K r V K r M K v M r v M rn v MW n W S r W Sa r W K af r: W K f : a H a M r T H r M rn w T H r Mo ns w T i o S ww c ig on a w c g nd af ww

More information

An Agent-Based Architecture for Service Discovery and Negotiation in Wireless Networks

An Agent-Based Architecture for Service Discovery and Negotiation in Wireless Networks An Agnt-Basd Architctur for Srvic Discovry and Ngotiation in Wirlss Ntworks Abstract Erich Birchr and Torstn Braun Univrsity of Brn, Nubrückstrass 10, 3012 Brn, Switzrland Email: braun@iam.unib.ch This

More information

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline

The Network Layer: Routing Algorithms. The Network Layer: Routing & Addressing Outline PS 6 Ntwork Programming Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du http://www.cs.clmson.du/~mwigl/courss/cpsc6 Th Ntwork Layr: Routing & ddrssing

More information

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer: Routing Algorithms. Routing Algorithms Taxonomy PS Intrntworking Th Ntwork Layr: Routing & ddrssing Outlin Th Ntwork Layr: Routing lgorithms Michl Wigl partmnt of omputr Scinc lmson Univrsity mwigl@cs.clmson.du Novmbr, Ntwork layr functions Routr architctur

More information

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point.

Systems in Three Variables. No solution No point lies in all three planes. One solution The planes intersect at one point. 3-5 Systms in Thr Variabls TEKS FOCUS VOCABULARY TEKS (3)(B) Solv systms of thr linar quations in thr variabls by using Gaussian limination, tchnology with matrics, and substitution. Rprsntation a way

More information

TCP Congestion Control. Congestion Avoidance

TCP Congestion Control. Congestion Avoidance TCP Congstion Control TCP sourcs chang th snding rat by modifying th window siz: Window = min {Advrtisd window, Congstion Window} Rcivr Transmittr ( cwnd ) In othr words, snd at th rat of th slowst componnt:

More information

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e

LAB1: DMVPN Theory. DMVPN Theory. Disclaimer. Pag e LAB1: DMVPN Thory Disclaimr This Configuration Guid is dsignd to assist mmbrs to nhanc thir skills in rspctiv tchnology ara. Whil vry ffort has bn mad to nsur that all matrial is as complt and accurat

More information

Lesson Focus: Finding Equivalent Fractions

Lesson Focus: Finding Equivalent Fractions Lsson Plans: Wk of 1-26-15 M o n Bindrs: /Math;; complt on own, thn chck togthr Basic Fact Practic Topic #10 Lsson #5 Lsson Focus: Finding Equivalnt Fractions *Intractiv Larning/Guidd Practic-togthr in

More information

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight

A New Algorithm for Solving Shortest Path Problem on a Network with Imprecise Edge Weight Availabl at http://pvamudu/aam Appl Appl Math ISSN: 193-9466 Vol 6, Issu (Dcmbr 011), pp 60 619 Applications and Applid Mathmatics: An Intrnational Journal (AAM) A Nw Algorithm for Solving Shortst Path

More information

Problem Set 1 (Due: Friday, Sept. 29, 2017)

Problem Set 1 (Due: Friday, Sept. 29, 2017) Elctrical and Computr Enginring Mmorial Univrsity of Nwfoundland ENGI 9876 - Advancd Data Ntworks Fall 2017 Problm St 1 (Du: Friday, Spt. 29, 2017) Qustion 1 Considr a communications path through a packt

More information

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol.

Analysis of Influence AS Path Prepending to the Instability of BGP Routing Protocol. ISSN : 2355-9365 -Procding of Enginring : Vol.5, No.1 Mart 2018 Pag 1112 Analysis of Influnc AS Path Prpnding to th Instability of BGP Routing Protocol. Hirwandi Agusnam 1, Rndy Munadi 2, Istikmal 3 1,2,3,

More information

CSE 272 Assignment 1

CSE 272 Assignment 1 CSE 7 Assignmnt 1 Kui-Chun Hsu Task 1: Comput th irradianc at A analytically (point light) For point light, first th nrgy rachd A was calculatd, thn th nrgy was rducd by a factor according to th angl btwn

More information

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O.

Workbook for Designing Distributed Control Applications using Rockwell Automation s HOLOBLOC Prototyping Software John Fischer and Thomas O. Workbook for Dsigning Distributd Control Applications using Rockwll Automation s HOLOBLOC Prototyping Softwar John Fischr and Thomas O. Bouchr Working Papr No. 05-017 Introduction A nw paradigm for crating

More information

Performance Analysis of IEEE MAC Protocol with Different ACK Polices

Performance Analysis of IEEE MAC Protocol with Different ACK Polices Prformanc Analysis of IEEE 82.15.3 MAC Protocol with Diffrnt Polics S. Mhta and K.S. Kwak Wirlss Communications Rsarch Cntr, Inha Univrsity, Kora suryanand.m@gmail.com Abstract. h wirlss prsonal ara ntwork

More information

Nimsoft Monitor. ldap_response Guide. v1.3 series

Nimsoft Monitor. ldap_response Guide. v1.3 series Nimsoft Monitor ldap_rspons Guid v1.3 sris Lgal Notics Copyright 2012, Nimsoft Corporation Warranty Th matrial containd in this documnt is providd "as is," and is subjct to bing changd, without notic,

More information

RFC Java Class Library (BC-FES-AIT)

RFC Java Class Library (BC-FES-AIT) RFC Java Class Library (BC-FES-AIT) HELP.BCFESDEG Rlas 4.6C SAP AG Copyright Copyright 2001 SAP AG. All Rcht vorbhaltn. Witrgab und Vrvilfältigung disr Publikation odr von Tiln daraus sind, zu wlchm Zwck

More information

Understanding Patterns of TCP Connection Usage with Statistical Clustering

Understanding Patterns of TCP Connection Usage with Statistical Clustering Th UNIVERSITY of NORTH CAROLINA at CHAPEL HILL Undrstanding Pattrns of TCP Connction Usag with Statistical Clustring Félix Hrnándz-Campos Kvin Jffay Don Smith Dpartmnt of Computr Scinc Andrw Nobl Dpartmnt

More information

Reimbursement Requests in WORKS

Reimbursement Requests in WORKS Rimbursmnt Rqusts in WORKS Important points about Rimbursmnts in Works Rimbursmnt Rqust is th procss by which UD mploys will b rimbursd for businss xpnss paid using prsonal funds. Rimbursmnt Rqust can

More information

Terrain Mapping and Analysis

Terrain Mapping and Analysis Trrain Mapping and Analysis Data for Trrain Mapping and Analysis Digital Trrain Modl (DEM) DEM rprsnts an array of lvation points. Th quality of DEM influncs th accuracy of trrain masurs such as slop and

More information

Spectral sensitivity and color formats

Spectral sensitivity and color formats FirWir camras Spctral snsitivity and color formats At th "input" of a camra, w hav a CCD chip. It transforms photons into lctrons. Th spctral snsitivity of this transformation is an important charactristic

More information

Register Allocation. Register Allocation

Register Allocation. Register Allocation Rgistr Allocation Jingk Li Portlan Stat Univrsity Jingk Li (Portlan Stat Univrsity) CS322 Rgistr Allocation 1 / 28 Rgistr Allocation Assign an unboun numbr of tmporaris to a fix numbr of rgistrs. Exampl:

More information

About Notes And Symbols

About Notes And Symbols About Nots And Symbols by Batric Wildr Contnts Sht 1 Sht 2 Sht 3 Sht 4 Sht 5 Sht 6 Sht 7 Sht 8 Sht 9 Sht 10 Sht 11 Sht 12 Sht 13 Sht 14 Sht 15 Sht 16 Sht 17 Sht 18 Sht 19 Sht 20 Sht 21 Sht 22 Sht 23 Sht

More information

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012

XML Publisher with connected query: A Primer. Session #30459 March 19, 2012 XML Publishr with connctd qury: A Primr Sssion #30459 March 19, 2012 Agnda/ Contnts Introduction Ovrviw of XMLP Gtting Startd Bst practics for building a basic XMLP rport Connctd Qury Basics Building a

More information

Evolutionary Clustering and Analysis of Bibliographic Networks

Evolutionary Clustering and Analysis of Bibliographic Networks Evolutionary Clustring and Analysis of Bibliographic Ntworks Manish Gupta Univrsity of Illinois at Urbana-Champaign gupta58@illinois.du Charu C. Aggarwal IBM T. J. Watson Rsarch Cntr charu@us.ibm.com Jiawi

More information

Review and analysis of Cloud Computing Quality of Experience

Review and analysis of Cloud Computing Quality of Experience Rviw and analysis of Cloud Computing Quality of Exprinc Fash Safdari 1, Victor Chang 1 1 School of Computing, Crativ Tchnologis and Enginring, Lds Mtropolitan Univrsity, Hadinly, Lds LS6 3QR {F.Safdari;

More information

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues

Objectives. Two Ways to Implement Lists. Lists. Chapter 24 Implementing Lists, Stacks, Queues, and Priority Queues Chaptr 24 Implmnting Lists, Stacks, Quus, and Priority Quus CS2: Data Structurs and Algorithms Colorado Stat Univrsity Original slids by Danil Liang Modifid slids by Chris Wilcox Objctivs q To dsign common

More information

Extending z/tpf using IBM API Management (APIM)

Extending z/tpf using IBM API Management (APIM) Extnding using API Managmnt (APIM) Mark Gambino, TPF Dvlopmnt Lab March 23, 2015 TPFUG Dallas, TX Th Big Pictur Goal Mobil Applications Cloud APIs Cloud-basd Srvics On-Prmis Entrpris APIs E n t r p r I

More information

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction

Efficient Obstacle-Avoiding Rectilinear Steiner Tree Construction Efficint Obstacl-Avoiding Rctilinar Stinr Tr Construction Chung-Wi Lin, Szu-Yu Chn, Chi-Fng Li, Yao-Wn Chang, and Chia-Lin Yang Graduat Institut of Elctronics Enginring Dpartmnt of Elctrical Enginring

More information

Oracle Data Relationship Management Suite User's Guide. Release

Oracle Data Relationship Management Suite User's Guide. Release Oracl Data Rlationship Managmnt Suit Usr's Guid Rlas 11.1.2.4.346 E75912-02 Jun 2018 Oracl Data Rlationship Managmnt Suit Usr's Guid, Rlas 11.1.2.4.346 E75912-02 Copyright 1999, 2018, Oracl and/or its

More information

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network

Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network Prformanc Analysis of Improvd ODMRP with Motion Dtction (IOMD) in Mobil Ad Hoc Ntwork S. Vasundra, Prof. A. Damodaram Dr. B. Sathyanarayana Associat Profssor, Profssor of CSE and Profssor & Chairman BOS,

More information

Linked Data meet Sensor Networks

Linked Data meet Sensor Networks Digital Entrpris Rsarch Institut www.dri.i Linkd Data mt Snsor Ntworks Myriam Lggiri DERI NUI Galway, Irland Copyright 2008 Digital Entrpris Rsarch Institut. All rights rsrvd. Linkd Data mt Snsor Ntworks

More information

Vignette to package samplingdatacrt

Vignette to package samplingdatacrt Vigntt to packag samplingdatacrt Diana Trutschl Contnts 1 Introduction 1 11 Objctiv 1 1 Diffrnt study typs 1 Multivariat normal distributd data for multilvl data 1 Fixd ffcts part Random part 9 3 Manual

More information

" dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d

 dx v(x) $ % You may also have seen this written in shorthand form as. & ' v(x) + u(x) '# % ! d Calculus II MAT 146 Mthods of Intgration: Intgration by Parts Just as th mthod of substitution is an intgration tchniqu that rvrss th drivativ procss calld th chain rul, Intgration by parts is a mthod

More information

A Brief Summary of Draw Tools in MS Word with Examples! ( Page 1 )

A Brief Summary of Draw Tools in MS Word with Examples! ( Page 1 ) A Brif Summary of Draw Tools in MS Word with Exampls! ( Pag 1 ) Click Viw command at top of pag thn Click Toolbars thn Click Drawing! A chckmark appars in front of Drawing! A toolbar appars at bottom of

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

Multihop MIMO Relay Networks with ARQ

Multihop MIMO Relay Networks with ARQ Multihop MIMO Rlay Ntworks with ARQ Yao Xi Dniz Gündüz Andra Goldsmith Dpartmnt of Elctrical Enginring Stanford Univrsity Stanford CA Dpartmnt of Elctrical Enginring Princton Univrsity Princton NJ Email:

More information

Principles of Programming Languages Topic: Formal Languages II

Principles of Programming Languages Topic: Formal Languages II Principls of Programming Languags Topic: Formal Languags II CS 34,LS, LTM, BR: Formal Languags II Rviw A grammar can b ambiguous i.. mor than on pars tr for sam string of trminals in a PL w want to bas

More information

EXTENSION OF RCC TOPOLOGICAL RELATIONS FOR 3D COMPLEX OBJECTS COMPONENTS EXTRACTED FROM 3D LIDAR POINT CLOUDS

EXTENSION OF RCC TOPOLOGICAL RELATIONS FOR 3D COMPLEX OBJECTS COMPONENTS EXTRACTED FROM 3D LIDAR POINT CLOUDS Th Intrnational rchivs of th Photogrammtry, mot Snsing and Spatial Information Scincs, Volum XLI-, 016 XXIII ISPS Congrss, 1 19 July 016, Pragu, Czch public EXTENSION OF CC TOPOLOGICL ELTIONS FO D COMPLEX

More information

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works.

Greedy Algorithms. Interval Scheduling. Greedy Algorithm. Optimality. Greedy Algorithm (cntd) Greed is good. Greed is right. Greed works. Algorithm Grdy Algorithm 5- Grdy Algorithm Grd i good. Grd i right. Grd work. Wall Strt Data Structur and Algorithm Andri Bulatov Algorithm Grdy Algorithm 5- Algorithm Grdy Algorithm 5- Intrval Schduling

More information

2 Mega Pixel. HD-SDI Bullet Camera. User Manual

2 Mega Pixel. HD-SDI Bullet Camera. User Manual 2 Mga Pixl HD-SDI Bullt Camra Usr Manual Thank you for purchasing our product. This manual is only applicabl to SDI bullt camras. Thr may b svral tchnically incorrct placs or printing rrors in this manual.

More information

The semantic WEB Roles of XML & RDF

The semantic WEB Roles of XML & RDF Th smantic WEB Rols of XML & RDF STEFAN DECKER AND SERGEY MELNIK FRANK VAN HARMELEN, DIETER FENSEL, AND MICHEL KLEIN JEEN BROEKSTRA MICHAEL ERDMANN IAN HORROCKS Prsntd by: Iniyai Thiruvalluvan CSCI586

More information

Group 2 Mega Crystals Usability Test Report

Group 2 Mega Crystals Usability Test Report Group 2 Mga Crystals Usability Tst Rport Rport Writtn By Katrina Ellis Tam Mmbrs Usr Exprinc Consultants Katrina Ellis Zhitao Qiu HU4628 Julia Wiss Sarah Ingold Jams Staplton CS4760 Kris Gauthir (Android)

More information

XML security in certificate management

XML security in certificate management XML scurity in crtificat managmnt Joan Lu, Nathan Cripps and Chn Hua* School of Computing and Enginring, Univrsity of Huddrsfild, UK J.lu@hud.ac.uk *Institut of Tchnology, Xi'an, Shaanxi, P. R. China Abstract

More information

Recorder Variables. Defining Variables

Recorder Variables. Defining Variables Rcordr Variabls Dfining Variabls Simpl Typs Complx Typs List of Rsrvd Words Using Variabls Stting Action Paramtrs Parsing Lists and Tabls Gtting Valu from Lists and Tabls Using Indxs with Lists Using Indxs

More information

2018 How to Apply. Application Guide. BrandAdvantage

2018 How to Apply. Application Guide. BrandAdvantage 2018 How to Apply Application Guid BrandAdvantag Contnts Accssing th Grant Sit... 3 Wlcom pag... 3 Logging in To Pub Charity... 4 Rgistration for Nw Applicants ( rgistr now )... 5 Organisation Rgistration...

More information

FSP Synthesis of an off-set five bar-slider mechanism with variable topology

FSP Synthesis of an off-set five bar-slider mechanism with variable topology FSP Synthsis of an off-st fiv bar-slidr mchanism with variabl topology Umsh. M. Daivagna 1*, Shrinivas. S. Balli 2 1 Dpartmnt of Mchanical Enginring, S.T.J.Institut of Tchnology, Ranbnnur, India 2 Dpt.

More information

An Optimized Bandwidth Allocation in Broadband Digital Economy

An Optimized Bandwidth Allocation in Broadband Digital Economy 6 8th Intrnational Symposium on Tlcommunications (IST'6) An Optimizd Bandwidth Allocation in Broadband Digital Economy Lila Mansourifar Rsarch Institut for ICT ( ITRC ) Thran, Iran Mansourifar@itrc.ac.ir

More information

8.3 INTEGRATION BY PARTS

8.3 INTEGRATION BY PARTS 8.3 Intgration By Parts Contmporary Calculus 8.3 INTEGRATION BY PARTS Intgration by parts is an intgration mthod which nabls us to find antidrivativs of som nw functions such as ln(x) and arctan(x) as

More information

The Size of the 3D Visibility Skeleton: Analysis and Application

The Size of the 3D Visibility Skeleton: Analysis and Application Th Siz of th 3D Visibility Sklton: Analysis and Application Ph.D. thsis proposal Linqiao Zhang lzhang15@cs.mcgill.ca School of Computr Scinc, McGill Univrsity March 20, 2008 thsis proposal: Th Siz of th

More information

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias

Robust and Fault Tolerant Clock Synchronization Nikolaus Kerö, Oregano Systems Aneeq Mahmood, ZISS Thomas Kernen, Cisco Felix Ring, ZISS Tobias Robust and Fault Tolrant Clock Synchronization Nikolaus Krö, Organo Systms Anq Mahmood, ZISS Thomas Krnn, Cisco Flix Ring, ZISS Tobias Müllr, Organo Systms Thomas Biglr, ZISS Rational Common notion of

More information

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1

To Do. Mesh Data Structures. Mesh Data Structures. Motivation. Outline. Advanced Computer Graphics (Fall 2010) Desirable Characteristics 1 Advancd Computr Graphics (Fall 200) CS 283, Lctur 5: Msh Data Structurs Ravi Ramamoorthi http://inst.cs.brkly.du/~cs283/fa0 To Do Assignmnt, Du Oct 7. Start rading and working on it now. Som parts you

More information

Parser Self-Training for Syntax-Based Machine Translation

Parser Self-Training for Syntax-Based Machine Translation arsr Slf-Training for Syntax-Basd Machin Translation Makoto Morishita, Koichi Akab, Yuto Hatakoshi Graham ubig, Koichiro Yoshino, Satoshi akamrua Graduat School of Information Scinc ara Institut of Scinc

More information

AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES

AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES AN EVALUATION MODEL FOR THE CHAINS OF DISTRIBUTED MULTIMEDIA INDEXING TOOLS RESPECTING USER PREFERENCES 1 Bassm HAIDAR, 2 Bilal CHEBARO, 3 Hassan WEHBI 1 Asstt Prof., Dpartmnt of Computr Scincs, Faculty

More information

Fequent Pattern Recognization From Stream Data Using Compact Data Structure

Fequent Pattern Recognization From Stream Data Using Compact Data Structure Fqunt Pattrn Rcognization From Stram Data Using Compact Data Structur Fabin M Christian 1, Narndra C.Chauhan 2, Nilsh B. Prajapati 3 1 PG Scholar, CE Dpartmnt, BVM Engg. Collg, V.V.Nagar, fabin.christian@gmail.com

More information

Type & Media Page 1. January 2014 Libby Clarke

Type & Media Page 1. January 2014 Libby Clarke Nam: 1 In ordr to hlp you s your progrss at th nd of this ntir xrcis, you nd to provid som vidnc of your starting point. To start, draw th a on th lft into th box to th right, dpicting th sam siz and placmnt.

More information

Misbehavior in Nash Bargaining Solution Allocation

Misbehavior in Nash Bargaining Solution Allocation Misbhavior in Nash Bargaining Solution Allocation Ilya Nikolavskiy, Andry Lukyannko, Andri Gurtov Aalto Univrsity, Finland, firstnam.lastnam@aalto.fi Hlsinki Institut for Information Tchnology, Finland,

More information

Clustering Algorithms

Clustering Algorithms Clustring Algoritms Hirarcical Clustring k -Mans Algoritms CURE Algoritm 1 Mtods of Clustring Hirarcical (Agglomrativ): Initially, ac point in clustr by itslf. Rpatdly combin t two narst clustrs into on.

More information

The Design and Evaluation of a Scalable Wireless MAC Protocol

The Design and Evaluation of a Scalable Wireless MAC Protocol Th Dsign and Evaluation of a Scalabl Wirlss MAC Protocol Tchnical Rport UIUCDCS-R--793 Chun-chng Chn, Eunsoo So, and Haiyun Luo Dpt. of Computr Scinc Univ. of Illinois at Urbana-Champaign Urbana, IL 181-3

More information

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J'''

DO NOW Geometry Regents Lomac Date. due. Similar by Transformation 6.1 J'' J''' J''' DO NOW Gomtry Rgnts Lomac 2014-2015 Dat. du. Similar by Transformation 6.1 (DN) Nam th thr rigid transformations and sktch an xampl that illustrats ach on. Nam Pr LO: I can dscrib a similarity transformation,

More information

Dynamic Light Trail Routing and Protection Issues in WDM Optical Networks

Dynamic Light Trail Routing and Protection Issues in WDM Optical Networks This full txt papr was pr rviwd at th dirction of IEEE Communications Socity subjct mattr xprts for publication in th IEEE GLOBECOM 2005 procdings. Dynamic Light Trail Routing and Protction Issus in WDM

More information

Dynamic modelling of multi-physical domain system by bond graph approach and its control using flatness based controller with MATLAB Simulink

Dynamic modelling of multi-physical domain system by bond graph approach and its control using flatness based controller with MATLAB Simulink Dnamic modlling of multi-phsical domain sstm b bond graph approach and its control using flatnss basd controllr with MATLAB Simulink Sauma Ranjan Sahoo Rsarch Scholar Robotics Lab Dr. Shital S. Chiddarwar

More information

Reducin} Migratin} secxn:laries

Reducin} Migratin} secxn:laries Rducing Migrating Scondaris Earl Wallr and Ml Parc INLEX, Inc. P.O. Box 1349 Montry, CA. 93942 If you ar lik us, you hav rad a lot rcntly about IMAGE and its 'myths', and you know that thr can b prformanc

More information

Interfacing the DP8420A 21A 22A to the AN-538

Interfacing the DP8420A 21A 22A to the AN-538 Intrfacing th DP8420A 21A 22A to th 68000 008 010 INTRODUCTION This application not xplains intrfacing th DP8420A 21A 22A DRAM controllr to th 68000 Thr diffrnt dsigns ar shown and xplaind It is assumd

More information

KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION

KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION KENDRIYA VIDYALAYA SANGATHAN, CHENNAI REGION CLASS XII COMMON PRE-BOARD EXAMINATION 03-4 Sub : Informatics Practics (065) Tim allowd : 3 hours Maximum Marks : 70 Instruction : (i) All qustions ar compulsory

More information

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1

To Do. Advanced Computer Graphics. Motivation. Mesh Data Structures. Outline. Mesh Data Structures. Desirable Characteristics 1 Advancd Computr Graphics CSE 63 [Spring 207], Lctur 7 Ravi Ramamoorthi http://www.cs.ucsd.du/~ravir To Do Assignmnt, Du Apr 28 Any last minut issus or difficultis? Starting Gomtry Procssing Assignmnt 2

More information

Midterm 2 - Solutions 1

Midterm 2 - Solutions 1 COS 26 Gnral Computr Scinc Spring 999 Midtrm 2 - Solutions. Writ a C function int count(char s[ ]) that taks as input a \ trminatd string and outputs th numbr of charactrs in th string (not including th

More information

GSM on the Net. Background. System concept. Olle Granberg

GSM on the Net. Background. System concept. Olle Granberg GSM on th Nt Oll Granbrg GSM on th Nt introducs an ntirly nw concpt for businss communications, offring voic, data and multimdia srvics ovr corporat intrants. Th voic srvic can b ithr fixd or mobil (in

More information

Formal Foundation, Approach, and Smart Tool for Software Models Comparison

Formal Foundation, Approach, and Smart Tool for Software Models Comparison Formal Foundation, Approach, and Smart Tool for Softwar Modls Comparison Olna V. Chbanyuk, Abdl-Badh M. Salm Softwar Enginring Dpartmnt, National Aviation Univrsity, Kyiv, Ukrain Computr Scinc, Faculty

More information

: Mesh Processing. Chapter 6

: Mesh Processing. Chapter 6 600.657: Msh Procssing Chaptr 6 Quad-Dominant Rmshing Goal: Gnrat a rmshing of th surfac that consists mostly of quads whos dgs align with th principal curvatur dirctions. [Marinov t al. 04] [Alliz t al.

More information

Reliability Coordinator Base Schedule Aggregation Portal (RC BSAP) Interface Specification for RC BSAP Services

Reliability Coordinator Base Schedule Aggregation Portal (RC BSAP) Interface Specification for RC BSAP Services Rliability Coordinator Bas Schdul Aggrgation Portal (RC BSAP) Intrfac Spcification for RC BSAP Srvics (Businss Ruls v 10.x(Spring 2019) or latr) Vrsion: 1.1 vmbr 6, 2018 Rvision History Dat Vrsion By Dscription

More information

NASPI Work Group meeting April 24-26, 2018 Albuquerque, NM

NASPI Work Group meeting April 24-26, 2018 Albuquerque, NM NASPI Work Group mting April 24-26, 2018 Albuqurqu, NM Pavl Kovalnko Viktor Litvinov from Data to Action Prmium Information Srvics from Data to Action Dsign, Dvlop and Dploy - digital transformation solutions

More information

Fuzzy Intersection and Difference Model for Topological Relations

Fuzzy Intersection and Difference Model for Topological Relations IFS-EUSFLT 009 Fuzzy Intrsction and Diffrnc Modl for Topological Rlations hd LOODY Flornc SEDES Jordi INGLD 3 Univrsité Paul Sabatir (UPS) Toulous, 8 Rout d Narbonn, F-306-CEDEX 9, Franc Institut d Rchrchn

More information

Energy-Efficient Method to Improve TCP Performance for MANETs

Energy-Efficient Method to Improve TCP Performance for MANETs nrgy-fficint Mthod to Improv TCP Prformanc for MANTs Chaoyu Xiong, Jagol Yim, Jason Ligh and Tadao Murata Computr Scinc Dpartmnt, Univrsity of Illinois at Chicago Chicago, IL 60607, USA ABSTRACT Th currnt

More information

Throughput Parameter Optimization of Adaptive ARQ/HARQ Scheme

Throughput Parameter Optimization of Adaptive ARQ/HARQ Scheme 89 Throughput Paramtr Optimization of Adaptiv ARQ/HARQ Schm Ján Poctavk, Kvtoslava Kotuliaková, Jaroslav Polc, Michal Osadský, Sandra Ondrušová Dpt. of Tlcommunications, Slovak Univrsity of Tchnology Bratislava,

More information

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select

Bit-array (4096kbit) Logic. Reconfigurable. Column-select. Row-select Low-Powr Dsign of Pag-Basd Intllignt Mmory Mark Oskin, Frdric T. Chong, Aamir Farooqui, Timothy Shrwood, and Justin Hnsly Univrsity of California at Davis Abstract Advancs in DRAM tchnology hav ld many

More information

A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS

A WIRELESS MESH NETWORKS WITH RELIABLE AND RESILIENT ROUTING BY CROSS-LAYER METRICS Availabl Onlin at www.ijcsmc.com Intrnational Journal of Computr Scinc and Mobil Computing A Monthly Journal of Computr Scinc and Information Tchnology IJCSMC, Vol. 3, Issu. 3, March 2014, pg.253 262 RESEARCH

More information

Driver for netgear wn111v2 wireless usb adapter Get file - Driver for netgear wn111v2 wireless usb adapter

Driver for netgear wn111v2 wireless usb adapter Get file - Driver for netgear wn111v2 wireless usb adapter Drivr for ntgar wn111v2 wirlss usb adaptr. Fr FILE Download My IE dosn t work. Drivr for ntgar wn111v2 wirlss usb adaptr Gt fil - Drivr for ntgar wn111v2 wirlss usb adaptr But somtims thy grow back. RAR

More information

Ontology and Context. Isabel Cafezeiro Departamento de Ciência da Computação Universidade Federal Fluminense Niterói - RJ, Brazil

Ontology and Context. Isabel Cafezeiro Departamento de Ciência da Computação Universidade Federal Fluminense Niterói - RJ, Brazil Ontology and Contxt Isabl Cafziro Dpartamnto d Ciência da Computação Univrsidad Fdral Fluminns Nitrói - RJ, Brazil isabl@dcc.ic.uff.br dward Hrmann Hauslr, Alxandr Radmakr Dpartamnto d Informática Pontifícia

More information

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU

An Auto-tuned Method for Solving Large Tridiagonal Systems on the GPU An Auto-tund Mthod for Solving Larg Tridiagonal Systms on th GPU Andrw Davidson Univrsity of California, Davis aaldavidson@ucdavis.du Yao Zhang Univrsity of California, Davis yaozhang@ucdavis.du John D.

More information

running at 133 MHz bus. A Pentium III 1.26GHz with 512K cache running at 133 MHz bus is an available option. Fits Your Needs

running at 133 MHz bus. A Pentium III 1.26GHz with 512K cache running at 133 MHz bus is an available option. Fits Your Needs 3715 Industrial PCs 15.0" LCD Flat Panl Display DS-371500(E) Xycom Automation's nwst gnration of Industrial PCs is dsignd and tstd for th tough nvironmnts rquird for plant floor us. Our standard PC configurations

More information

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison

Installation Saving. Enhanced Physical Durability Enhanced Performance Warranty The IRR Comparison Contnts Tchnology Nwly Dvlopd Cllo Tchnology Cllo Tchnology : Improvd Absorption of Light Doubl-sidd Cll Structur Cllo Tchnology : Lss Powr Gnration Loss Extrmly Low LID Clls 3 3 4 4 4 Advantag Installation

More information

I - Pre Board Examination

I - Pre Board Examination Cod No: S-080 () Total Pags: 06 KENDRIYA VIDYALAYA SANGATHAN,GUWHATI REGION I - Pr Board Examination - 04-5 Subjct Informatics Practics (Thory) Class - XII Tim: 3 hours Maximum Marks : 70 Instruction :

More information

Student, MCA, P.E.S s Modern College of Engineering Pune, Maharashtra, India

Student, MCA, P.E.S s Modern College of Engineering Pune, Maharashtra, India 2018 IJSRSET Volum 4 Issu 8 Print ISSN: 2395-1990 Onlin ISSN : 2394-4099 Thmd Sction : Enginring and Tchnology Rviw on Vrsion Control with Git Pranjal Govkar 1, Dr. Shivani Budhkar 2 1 Studnt, MCA, P.E.S

More information

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO

Presentation for use with the textbook, Algorithm Design and Applications, by M. T. Goodrich and R. Tamassia, Wiley, Directed Graphs BOS SFO Prsntation for us with th txtbook, Algorithm Dsign and Applications, by M. T. Goodrich and R. Tamassia, Wily, 2015 Dirctd Graphs BOS ORD JFK SFO LAX DFW MIA 2015 Goodrich and Tamassia Dirctd Graphs 1 Digraphs

More information

Attitude Of Teachers Towards Use Of Mathematics Laboratory In Teaching Learning Process In High Schools

Attitude Of Teachers Towards Use Of Mathematics Laboratory In Teaching Learning Process In High Schools Attitud Of Tachrs Towards Us Of Mathmatics Laboratory In Taching Larning Procss In High Schools Dr. Sangita R. Bihad Assistant Profssor, Shri Shivaji Collg of Education, Amravati Abstract: This papr xamind

More information

Can we fix Homelessness in Scotland? Aye. we can. Scottish Homelessness Involvement & Empowerment Network SHIEN

Can we fix Homelessness in Scotland? Aye. we can. Scottish Homelessness Involvement & Empowerment Network SHIEN Can w fix Homlssnss in Scotland? Ay w can w o h r a h s c n i r p x r 2017 t c b m r i c d D h t i w l p o.p.. SHIEN Scottish Homlssnss Involvmnt & Empowrmnt Ntwork Glasgow Homlssnss Ntwork Unit 16a, Adlphi

More information

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux

A Loadable Task Execution Recorder for Hierarchical Scheduling in Linux A Loadabl Task Excution Rcordr for Hirarchical Schduling in Linux Mikal Åsbrg and Thomas Nolt MRTC/Mälardaln Univrsity PO Box 883, SE-721 23, Västrås, Swdn {mikalasbrg,thomasnolt@mdhs Shinpi Kato Carngi

More information

Dynamic Spatial Partitioning for Real-Time Visibility Determination

Dynamic Spatial Partitioning for Real-Time Visibility Determination Dynamic Spatial Partitioning for Ral-Tim Visibility Dtrmination Joshua Shagam Josph J. Pfiffr, Jr. Nw Mxico Stat Univrsity Abstract Th static spatial partitioning mchanisms usd in currnt intractiv systms,

More information

Utilization of Rough Neutrosophic Sets In Medical Diagnosis

Utilization of Rough Neutrosophic Sets In Medical Diagnosis ntrnational Journal of Enginring Scinc nvntion (JES) SS (Onlin): 39 6734, SS (rint): 39 676 Volum 7 ssu 3 Vr. V March 08 0-05 Utilization of ough utrosophic Sts n Mdical Diagnosis. Edward Samul nd.armadhagnanam

More information

TRIANGULATION OF NURBS SURFACES. Jamshid Samareh-Abolhassani. 1 Abstract

TRIANGULATION OF NURBS SURFACES. Jamshid Samareh-Abolhassani. 1 Abstract TRIANGULATION OF NURBS SURFACES Jamshid Samarh-Abolhassani 1 Abstract A tchniqu is prsntd for triangulation of NURBS surfacs. This tchniqu is built upon an advancing front tchniqu combind with grid point

More information

CC-RANSAC: Fitting Planes in the Presence of Multiple Surfaces in Range Data

CC-RANSAC: Fitting Planes in the Presence of Multiple Surfaces in Range Data CC-RANSAC: Fitting Plans in th Prsnc of Multipl Surfacs in Rang Data Orazio Gallo, Robrto Manduchi Univrsity of California, Santa Cruz Abbas Rafii Cansta, Inc. Abstract Rang snsors, in particular tim-of-flight

More information

Using Traces for TCP/IP Throughput Performance Problems

Using Traces for TCP/IP Throughput Performance Problems Using Tracs for TCP/IP Throughput Prformanc Problms Using Tracs for TCPIP Throughput Prformanc Problms.PRZ - 05-10-07-10:22 - Pag 1 How do w dtrmin if w hav a throughput prformanc problm? Ways in z/os

More information

Adaptive subband selection in OFDM-based cognitive radios for better system coexistence

Adaptive subband selection in OFDM-based cognitive radios for better system coexistence Univrsity of Wollongong Rsarch Onlin Faculty of Informatics - Paprs (Archiv) Faculty of Enginring and Information Scincs 28 Adaptiv subband slction in OFDM-basd cognitiv radios for bttr systm coxistnc

More information

Summary: Semantic Analysis

Summary: Semantic Analysis Summary: Smantic Analysis Chck rrors not dtctd by lxical or syntax analysis Intrmdiat Cod Scop rrors: Variabls not dfind Multipl dclarations Typ rrors: Assignmnt of valus of diffrnt typs Invocation of

More information

Update-Aware Accurate XML Element Retrieval

Update-Aware Accurate XML Element Retrieval Updat-Awar Accurat XML Elmnt Rtrival Atsushi Kyaki, Jun Miyazaki Graduat School of Information Scinc Nara Institut of Scinc and Tchnology 8916-5 Takayama, Ikoma Nara 630-0192, Japan {atsushi-k, miyazaki}@is.naist.jp

More information

CS364B: Frontiers in Mechanism Design Lecture #10: Coverage Valuations and Convex Rounding

CS364B: Frontiers in Mechanism Design Lecture #10: Coverage Valuations and Convex Rounding CS364B: Frontirs in Mchanism Dsign Lctur #10: Covrag Valuations and Convx Rounding Tim Roughgardn Fbruary 5, 2014 1 Covrag Valuations Rcall th stting of submodular biddr valuations, introducd in Lctur

More information

Base Schedule Aggregation Portal (BSAP) Interface Specification for BSAP Services

Base Schedule Aggregation Portal (BSAP) Interface Specification for BSAP Services Bas Schdul Aggrgation Portal (BSAP) Intrfac Spcification for BSAP Srvics (Businss Ruls v 9.x(Fall 2017) or latr) Vrsion: 1.3 Dcmbr 19, 2017 Rvision History Dat Vrsion By Dscription 12/19/2017 1.3 WT Additional

More information

Probabilistic inference

Probabilistic inference robabilistic infrnc Suppos th agnt has to mak a dcision about th valu of an unobsrvd qury variabl X givn som obsrvd vidnc E = artially obsrvabl, stochastic, pisodic nvironmnt Eampls: X = {spam, not spam},

More information

Dual-mode Operation of the Finger-type Manipulator Based on Distributed Actuation Mechanism

Dual-mode Operation of the Finger-type Manipulator Based on Distributed Actuation Mechanism 11 th World Congrss on Structural and Multidisciplinary Optimisation 07 th -1 th, Jun 015, Sydny Australia Dual-mod Opration of th Fingr-typ Manipulator Basd on Distributd Actuation Mchanism Jong Ho Kim

More information

JMFMoD: A New System for Media on Demand Presentations on Education

JMFMoD: A New System for Media on Demand Presentations on Education JMFMoD: A Nw Systm for Mdia on Dmand Prsntations on Education Authors: Ángla Blda, Univrsidad Politécnica d Valncia, Camino d Vra s/n, Valncia, Spain, anblor@doctor.upv.s Juan José Crmño, Univrsidad Politécnica

More information