Secure Information Flow Based on Data Flow Analysis

Size: px
Start display at page:

Download "Secure Information Flow Based on Data Flow Analysis"

Transcription

1 SSN , Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege, Zunyi, Guizhou, 56300, China (Received December, 006, accepted 9 Apri 007 Abstract. The static anaysis of secure information fow has been studied for many years. The existing methods tend to be overy conservative or to be overy attention to ocation information eak. This paper uses data fow anaysis to dea with secure information fow. Two variabes of dynamic update security eves were introduced. The program is secure without any variabe of downgrade security eve at exit of a program. The anaysis can dea with more secure programs. The soundness of the anaysis is proved. Keywords: secure information fow, data fow anaysis, static anaysis, forma semantics. ntroduction The static anaysis of secure information fow has been studied for many years[]. The anaysis of secure information fow is that check whether the information fow of a given program is secure. Secure information fow ensures the noninterference, that is, observations of the initia and fina vaues of owsecurity variabes do not provide any information about the initia vaue of high-security variabes. Consider a program whose variabes are partitioned into two disjoint tupes H (secret and L (pubic. The program is secure if examinations of the initia and fina vaues of any L variabe do not give any information about the initia vaues of any H variabe. For exampe, the program H : = L is secure since the vaue of L is independent of initia vaue of H. Simiary, the program L : = 8 is secure, because the fina vaue of L is aways 8, regardess of the initia vaue of H. However, the program L: = H is not insecure since the vaue of H can be observed as the fina vaue of L. the fow of information from H to L is caed expicit. We ca this expicit eak from H to L. The program if H then L : = 0 ese L : = is insecure, despite each branch of the conditiona is secure, H is indirecty copied into L. the fow of information from H to L is caed impicit. We ca this impicit eak from H to L. A secure program may have some ocation information eak. For exampe, in each of four programs L: = H ; L : = 8 H : = L ; L: = H L: = H ; L: = L H if fase then L: = H end athough existing ocation information eak L: = H, the four program are a secure. The existing methods tend to be overy conservative, giving insecure answers to many secure programs, or to be overy attention to ocation information eak, existing ocation information eak does not Pubished by Word Academic Press, Word Academic Union

2 Journa of nformation and Computing Science, (007 4, pp impy there is information eak in a program. n this paper, the data fow anaysis is used to dea with secure information fow. The anaysis proposed in this paper is more precise than the existing syntactic approaches. However, since the anaysis is syntactic in nature, it cannot be as precise as the Joshi-Leino s and Sabefed-Sands semantic approaches [6,7] or, Darvas-Hahne-Sands theorem proving approach. [8] The rest of the paper is organized as foows: Section informay describes the probem of secure information fow using some simpe exampes. Section 3 presents the syntax and semantics of Whie anguage. Section 4 expains how to construct the fow graph and then shows data fow equations for detecting information eaks. Section 5 proves the soundness of the anaysis. Section 6 concudes. The Denning-Denning s origina method[9], the Mizuno-Schmidt s data fow anaysis[] and the Vopano-Smith s type-system a assert that above four programs are insecure. Doh-Shin s data fow anaysis caim that it can sove the probem of program and program, but in fact, it ony can sove the secure probem of program. Our anaysis in the paper certifies that above four programs are a secure[6].. Syntax and Semantics n this paper, we sha consider an imperative anguage core[0], Whie. n order to identify statements and tests in a Whie program, we give a unique abe to each of the assignments, skip statements, and tests. Syntax Domain: a AExp arithmetic expressions b BExp Booean expressions S Stmt statements x Var variabes Lab abes Abstract Syntax: S = [x:=a] [skip] S ;S if [b] then S ese S whie [b] do S Configurations and Transitions: A state is defined as a mapping from variabes to integers: State = Var Z A configuration of the semantics is either a pair S, or, where S Stmt and State. A termina configuration consists ony of a state. The transition of the semantics shows how the configuration is changed by one step of computation and is represented as one of the foowings: S, and S, S, For arithmetic and Booean expressions, a and b, we assume that the semantic functions are defined as foows: A : AExp State Z B : BExp State T where Z is the set of integers and T is the set of truth vaues. Structura Operationa Semantics: [ ass ] [ x: = a], [ x A a ] [ skip ] [ ], skip [ seq ] S, S, S ; S, S ; S, JC emai for subscription: pubishing@wau.org.uk

3 54 J. Yao: Secure nformation Fow Based on Data Fow Anaysis [ ] [ ] [ ] [ seq ] S, S ; S, S, if if [b] then S ese S, S,, if B b = true if if [b] then S ese S, S,, if B b = fase wh whie [b] do S, S; whie [b] do S,, if B b = true [ ] 3. Secure nformation Fow Anaysis wh whie [b] do S,, if B b = fase n this section, we use the data fow anaysis to dea with secure information fow[3,]. We first define the suitabe fow graph of Whie programs, and then formuate data fow equations for the anaysis. 3.. The Fow Graph The fow graph is defined in the stye of Nieson-Nieson-Hankin s book[8]. n order to anaysis the secure information fow, we need expicity add to the fow graph an impicit fow from a test bock to each statement bock in the conditiona branch or in the whie-oop body, in addition to the norma contro fow. A fow graph consists of the set of eementary bocks and the set of (contro and impicitfows between bocks. More formay, the fow graph for a Whie statement S is defined to be a quintupe: fowgraph(s = (bock(s, fow(s, fow (S, init(s, fina(s where each of the functions are defined beow. Let Bocks be the set of eementary bocks of form [ x : = a],[ skip ] or [ ] function bocks finds the set of eementary bocks in a given statement: bocks : Stmt P( Bocks bocks ( if [ ] then S ([ : ] = = [ : = ] ([ ] = {[ ]} bocks x a x a bocks skip skip (, = bocks S S bocks S bocks S b ese S = [ ] bocks ( whie [ b ] do S = [ ] { b } bocks ( S bocks ( S { b } bocks( S b where Lab. Then the A fow graph aways has a singe, but it may have mutipe exits due to conditiona statements. Thus the function init returns the initia abe of a give statement: init : Stmt Lab ([ : ] ([ ] init x = a = init skip = init( S ; S = init( S init ( if [ ] b then S ese S = init ( whie [ ] b do S = The function fina returns the set of fina abes of a given statement: fina : Stmt P( Lab JC emai for contribution: editor@jic.org.uk

4 Journa of nformation and Computing Science, (007 4, pp ([ : = ] = {} ([ ] = {} fina x a fina skip fina S ; S = fina( S fina ( if [ b] then S ese S = fina ( S fina ( whie [ b ] do S = { } fina( S The function fow returns contro fows between bocks in a given statement: fow: Stmt P( Lab Lab ([ : ] ([ ] fow x = a = φ fow skip = φ { ( ( } {} { } ( ; = ( ( (, ( fow S S fow S fow S init S fina S fow ( if [ ] then S fow( S fow( S, init S,, init S b ese S = fow ( whie [ ] do S = fow( S, init S, fina S b The function fow defines the impicit fows in a given statement: fow : Stmt P( Lab Lab fow x = a = φ ([ : ] ([ ] fow skip = φ fow S ; S = fow ( S fow ( S fow ( if [ b ] then S ese S = { } { } { } fow ( S fow ( S, B bocks( S, B bocks( S fow ( whie [ do S = fow ( S, B bocks( S For exampe, consider the Power program: we have b ] 4 3 [ z: = ] ; whie[ x> 0 ] do [ z: = z y] ;[ x: = x ] = (,,,, fowgraph Power bocks S fow S fow S init S fina S = ( [ z: = ],[ x> 0 ],[ z: = z y] 3,[ x: = x ] 4, { },3,, 4,,{ },,,3,3,4,4,, 3.. The Anaysis Assume information ony have two security eves H and L. Each variabe x in a program is initiay bound to a security eve, which is denoted by underine, x. x denotes a L variabe x which security eve is upgrade after coping s H variabe to a L variabe x; x denotes a H variabe x which security eve is JC emai for subscription: pubishing@wau.org.uk

5 56 J. Yao: Secure nformation Fow Based on Data Fow Anaysis downgrade after coping L variabe to a H variabe x. x denotes a impicit H variabe when x is a H variabe in test bocks. The anaysis is defined as foow: where where where ( { } gen : B ocks P x, x, x : L L ([ : = ] = { },{ } gen x a x x,φ { < } { x z FV ( a, z : =, x, x < y } { x y { x}, x: = y, x < y} { x } = { x x = H; y FV( a, y = L, y { x }} ([ : ] genl x = a = ( φφφ,, if never execute [ x : = a] genl ([ skip] = ( φ, φφ, genl ([ b] = ( φφ,,{ x } { x } = x y FV( a, y { x }, x y y z { x} = x x FV( b, x = H, x { x } { x y FV( a, y: = x, x = H} kil : Bocks P( { x },{ x },{ x } : nformation Low Equations: L = : L ([ : = ] = { },{ } ki x a x x,φ x = { x y FV( a, y = H y x } ([ : = ] = ( φφφ,, if never execute [ : = ] kil ([ skip] = ( φ, φφ, kil ([ b] = ( φ, φφ, { x } = x y FV( a, y = L ( y H L ki x a x a ( φφφ,, if ( = init S L ( = x x x, otherwise ( { (,, { } ( fow( S fow ( S ( } ({ x} \{ x} { x} ki gen ( L = x \ x x, x \ x x, exit Exampe.Consider the foowing program: ki gen ki gen JC emai for contribution: editor@jic.org.uk

6 Journa of nformation and Computing Science, (007 4, pp [ ] [ ] x: = y ; x: = z, where y = H and x=z=l. L ( = ( φ, φφ, ( φ φ ( φ φ L x,, exit ( = { } = { } L x,, Lexit ( = ( φ, φφ, x is kied at the exit of bock, at the termination of the program, x=z=l is not reation with y= H. Thus the program is secure. Exampe.Consider the foowing program: [ ] [ ] y: = x ; x: = y, where y = H and x=l. L Lexit L Lexit ( = ( φ, φφ, ( φ ( φ ( φ ( = φ, { x }, = φ { x } ( = φ, { x },,, at the termination of the program, x=l is not reation with y= H. Thus the program is secure. Exampe 3.Consider the foowing program: [ ] [ ] x : = y ; x: = x y, where x = L and y: = H. L ( = ( φ, φφ, ( φ φ ( φ φ L x,, exit ( = { } = { } L x,, Lexit ( = ( φ, φφ, at the termination of the program, x=l is not reation with y= H. Thus the program is secure. Exampe 4.Consider the foowing program: [ ] [ ] if fase then x : = y end, where x=l and y = H L Lexit L Lexit ( = ( φ, φφ, ( = ( φ, φφ, ( = ( φ, φφ, ( = ( φ, φφ, at the termination of the program, x=l is not reation with y= H. Thus the program is secure. 4. The Soundness as Noninterference n this section, we prove that the anaysis is sound by proving our anaysis noninterference property[]. Theorem. Given a Whie program S, for each bock B bocks( S, we et JC emai for subscription: pubishing@wau.org.uk

7 58 J. Yao: Secure nformation Fow Based on Data Fow Anaysis ( ( = { },{ }, L x x x ( = { },{ }, L x x x exit exit exit exit N( is the set of a variabes having L vaues at the of bock having L vaues at the of bock and ( ( B. ( = {, = } \{ } \{ } { } X ( = { x x Var, x = L} \{ x } { x } N x x Var x L x x x if S, S, and then there exists N init S ( such that S, S, and, and N init S ( B, X ( is the set of a variabes ( N init S if S, and then there exists such that S, and N init S ( Proof: The proof is by induction on the shape of the inference tree used to estabish S,, respectivey. The case [ ass ]. Then [ : ], x = a x A a, and we have { x } = { x } \{ x } { x } exit ki gen = { x } \{ x } { x y FV ( a, y { x }, x < y } ki { x z FV ( a, z : = y, z { x }, x < y } { x y x, x: = y, x < y} { x } = { x } \{ x } { x } exit ki gen = { x } \{ x } x x = H ; y FV ( a, y = L, y { x } Since information fow is secure, this is { x Therefore, we have and thus ki } exit = φ, then { x } = φ. Thus we get gen,, y FV a y x y = L z FV a y x y = L { x } = φ = { } gen X N x N A a = A a ( impies because the vaue of a is ony affected by the L variabes occurring in it. Taking = x A a we have that ( x = ( x and thus ( x ( ( x X as required. S, S, JC emai for contribution: editor@jic.org.uk

8 Journa of nformation and Computing Science, (007 4, pp The case [ skip ]. Then [ ], and we take to be. skip, we have = N X The case [ seq ]. Then by the induction hypothesis, because ( x ( ( x N init S ( x ( x, Since init ( S ; S init ( S init S ; S = init S N init S ( = and ( ( concude: ( x N( init( S ; S ( x impies ( x and where The case [ seq ]. Simiar to The cass [ ] The case [ Hence, we have Hence, we have ]. Then seq. x. N( init( S ; S if b then S ese S,, because if [ ] S N x x Var x L x x x ( [ ] b =, = \ \ then S and S init if init = {, = } \{ } \ S { } \{ } { } N x x Var x L x x x b x { x ( b } = { x y FV( b, y: = x, x = H} N init [ ] init S The case [ if ]. Simiar to The cass [ if ]. The case [ wh ]. Simiar to The cass [ if ]. N ( if b then S ese S ( x N( init( S ( x impies, we can immediatey This competes the proof. Finay, we have an important coroary which states that noninterference is preserved throughout the execution of the entire program. Coroary : Under the same assumption as Theorem. then ( (not yet terminated programs ( (terminated programs 5. Concusion if S, S, and then there exists N init S ( such that S, S, and, and N init S ( ( N init S if S, and then there exists such that S, and for some fina S. N ( This paper uses data fow anaysis to dea with secure information fow. The anaysis proposed in this paper is more precise than the existing syntactic approaches. The anaysis is proved to be sound by proving JC emai for subscription: pubishing@wau.org.uk

9 60 J. Yao: Secure nformation Fow Based on Data Fow Anaysis our anaysis noninterference property. 6. References [] A. Sabefed and A. C. Myers. Language-based information-fow security. EEE J. Seected Areas in Communication, 003, (. [] Dennis Vopano, Geoffrey Smith. A Type-Based Approach to Program Security. Proceeding of TAPSOFT 97, cooquium on Forma Approaches in Software Engineering, Lie France, 4-8 Apri, 997. [3] Dennis Vopano, Geoffrey Smith, Cynthia rvine. A Sound Type System for Secure Fow Anaysis. Journa of computer security. 996, 9. [4] M. Mizuno and D. A. Schmidt. A security fow contro agorithm and its denotationa semantics correctness proof. Forma Aspects of Computing, 99, 4: [5] Kyung-Goo Doh and Seung Cheo Shin. Data Fow Anaysis of Secure nformation-fow. ACM SGPLAN Notices. 00, 37(8. [6] R. Joshi and K. R. M. Leino. A semantic approach to secure information fow. Science of Computer Programming, 000, 37: [7] A.Sabefed and D. Sands. A per mode of secure information fow in sequentia programs. Higher-Order and Symboic Computations, 00, 4: [8] A. Darvas, R.Hahne and D. Sands. A Theorem Proving Approach Anaysis of Secure nformation Fow. Technica Report, no [9] D. Denning, P. Denning. Certification of Programs for Secure nformation Fow. Communications of the ACM, 977, 0(7: [0] Hanne Riis Nieson and Femming Nieson. Semantics with Appications a Forma ntroduction. Juy, 999. [] F. Nieson, H. R. Nieson and C. Hankin. Principes if Program Anaysis. Springer.999. JC emai for contribution: editor@jic.org.uk

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

Solution of Wave Equation by the Method of Separation of Variables Using the Foss Tools Maxima

Solution of Wave Equation by the Method of Separation of Variables Using the Foss Tools Maxima Internationa Journa of Pure and Appied Mathematics Voume 117 No. 14 2017, 167-174 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-ine version) ur: http://www.ijpam.eu Specia Issue ijpam.eu Soution

More information

An Operational Semantics for Weak PSL

An Operational Semantics for Weak PSL An Operationa Semantics for Weak PSL Koen Caessen 1,2 and Johan Mårtensson 1,3 {koen,johan}@safeogic.se 1 Safeogic AB 2 Chamers University of Technoogy 3 Gothenburg University Abstract. Extending inear

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time

CS 331: Artificial Intelligence Propositional Logic 2. Review of Last Time CS 33 Artificia Inteigence Propositiona Logic 2 Review of Last Time = means ogicay foows - i means can be derived from If your inference agorithm derives ony things that foow ogicay from the KB, the inference

More information

Resource Usage Analysis

Resource Usage Analysis Resource Usage Anaysis ATSUSHI IGARASHI Kyoto University and NAOKI KOBAYASHI Tohoku University It is an important criterion of program correctness that a program accesses resources in a vaid manner. For

More information

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value

Converting Z-number to Fuzzy Number using. Fuzzy Expected Value ISSN 1746-7659, Engand, UK Journa of Information and Computing Science Vo. 1, No. 4, 017, pp.91-303 Converting Z-number to Fuzzy Number using Fuzzy Expected Vaue Mahdieh Akhbari * Department of Industria

More information

Networks Based on Tree Semantics Approach

Networks Based on Tree Semantics Approach Word Journa of Socia Science Research ISSN 2375-9747 (Print) ISSN 2332-5534 (Onine) Vo. 4, No. 4, 2017 www.schoink.org/ojs/index.php/wjssr Reachabiity Anaysis of Asynchronous Dynamic Pushdown Networks

More information

Published in: Proceedings of the Twenty Second Nordic Seminar on Computational Mechanics

Published in: Proceedings of the Twenty Second Nordic Seminar on Computational Mechanics Aaborg Universitet An Efficient Formuation of the Easto-pastic Constitutive Matrix on Yied Surface Corners Causen, Johan Christian; Andersen, Lars Vabbersgaard; Damkide, Lars Pubished in: Proceedings of

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Aerodynamic Design of Turbine Blades Using an Adjoint Equation Method

Aerodynamic Design of Turbine Blades Using an Adjoint Equation Method 43rd AIAA Aerospace Sciences Meeting and Exhibit, January 10-13, 2005, Reno, Nevada Aerodynamic Design of Turbine ades Using an Adjoint Equation Method Hsiao-Yuan Wu, and Feng Liu Department of Mechanica

More information

STABLE GRAPHS BENJAMIN OYE

STABLE GRAPHS BENJAMIN OYE STABLE GRAPHS BENJAMIN OYE Abstract. In Reguarity Lemmas for Stabe Graphs [1] Maiaris and Sheah appy toos from mode theory to obtain stronger forms of Ramsey's theorem and Szemeredi's reguarity emma for

More information

SPATIAL pattern formation is central to the understanding

SPATIAL pattern formation is central to the understanding This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Citation information: DOI 10.1109/TCNS.2016.2609138,

More information

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan

B. Brown, M. Griebel, F.Y. Kuo and I.H. Sloan Wegeerstraße 6 53115 Bonn Germany phone +49 8 73-347 fax +49 8 73-757 www.ins.uni-bonn.de B. Brown, M. Griebe, F.Y. Kuo and I.H. Soan On the expected uniform error of geometric Brownian motion approximated

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems Preprints of the 9th Word Congress The Internationa Federation of Automatic Contro Structura Contro of Probabiistic Booean Networks and Its Appication to Design of Rea-Time Pricing Systems Koichi Kobayashi

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS

A SIMPLIFIED DESIGN OF MULTIDIMENSIONAL TRANSFER FUNCTION MODELS A SIPLIFIED DESIGN OF ULTIDIENSIONAL TRANSFER FUNCTION ODELS Stefan Petrausch, Rudof Rabenstein utimedia Communications and Signa Procesg, University of Erangen-Nuremberg, Cauerstr. 7, 958 Erangen, GERANY

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

Global Optimality Principles for Polynomial Optimization Problems over Box or Bivalent Constraints by Separable Polynomial Approximations

Global Optimality Principles for Polynomial Optimization Problems over Box or Bivalent Constraints by Separable Polynomial Approximations Goba Optimaity Principes for Poynomia Optimization Probems over Box or Bivaent Constraints by Separabe Poynomia Approximations V. Jeyakumar, G. Li and S. Srisatkunarajah Revised Version II: December 23,

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation

Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation Many-Hep-One Probem for Gaussian Sources with a Tree Structure on their Correation Yasutada Oohama arxiv:090988v csit 4 Jan 009 Abstract In this paper we consider the separate coding probem for + correated

More information

Research Article Optimal Control of Probabilistic Logic Networks and Its Application to Real-Time Pricing of Electricity

Research Article Optimal Control of Probabilistic Logic Networks and Its Application to Real-Time Pricing of Electricity Hindawi Pubishing Corporation Mathematica Probems in Engineering Voume 05, Artice ID 950, 0 pages http://dxdoiorg/055/05/950 Research Artice Optima Contro of Probabiistic Logic Networks and Its Appication

More information

The Incorporation of a Discrete, Dynamic LTC Transformer Model in a Dynamic Power Flow Algorithm

The Incorporation of a Discrete, Dynamic LTC Transformer Model in a Dynamic Power Flow Algorithm Downoaded from orbit.dtu.dk on: Dec 6, 08 The Incorporation of a Discrete, Dynamic LTC Transformer Mode in a Dynamic Power Fow Agorithm Garcia-Vae, Rodrigo; Acha, Enrique Pubished in: The Internationa

More information

Generalized multigranulation rough sets and optimal granularity selection

Generalized multigranulation rough sets and optimal granularity selection Granu. Comput. DOI 10.1007/s41066-017-0042-9 ORIGINAL PAPER Generaized mutigranuation rough sets and optima granuarity seection Weihua Xu 1 Wentao Li 2 Xiantao Zhang 1 Received: 27 September 2016 / Accepted:

More information

Blockchain Abstract Data Type

Blockchain Abstract Data Type Bockchain Abstract Data Type Emmanuee Anceaume, Antonea De Pozzo, Romaric Ludinard, Maria Potop-Butucaru, Sara Tucci-Piergiovanni CNRS, IRISA CEA LIST, PC 174, Gif-sur-Yvette, 91191, France IMT Atantique,

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Sardinas-Patterson like algorithms in coding theory

Sardinas-Patterson like algorithms in coding theory A.I.Cuza University of Iaşi Facuty of Computer Science Sardinas-Patterson ike agorithms in coding theory Author, Bogdan Paşaniuc Supervisor, Prof. dr. Ferucio Laurenţiu Ţipea Iaşi, September 2003 Contents

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Input-to-state stability for a class of Lurie systems

Input-to-state stability for a class of Lurie systems Automatica 38 (2002) 945 949 www.esevier.com/ocate/automatica Brief Paper Input-to-state stabiity for a cass of Lurie systems Murat Arcak a;, Andrew Tee b a Department of Eectrica, Computer and Systems

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

The graded generalized Fibonacci sequence and Binet formula

The graded generalized Fibonacci sequence and Binet formula The graded generaized Fibonacci sequence and Binet formua Won Sang Chung,, Minji Han and Jae Yoon Kim Department of Physics and Research Institute of Natura Science, Coege of Natura Science, Gyeongsang

More information

Research Article Numerical Range of Two Operators in Semi-Inner Product Spaces

Research Article Numerical Range of Two Operators in Semi-Inner Product Spaces Abstract and Appied Anaysis Voume 01, Artice ID 846396, 13 pages doi:10.1155/01/846396 Research Artice Numerica Range of Two Operators in Semi-Inner Product Spaces N. K. Sahu, 1 C. Nahak, 1 and S. Nanda

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

ACTIVE electrical networks, which require energizing sources for their operation, are most widely

ACTIVE electrical networks, which require energizing sources for their operation, are most widely 1 Stabiization heory For Active Muti-port Networks Mayuresh Bakshi Member, IEEE,, Virendra R Sue and Maryam Shoejai Baghini, Senior Member, IEEE, arxiv:1606.03194v1 [cs.sy] 10 Jun 2016 Abstract his paper

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point Minimum Encosing Circe of a Set of Fixed Points and a Mobie Point Aritra Banik 1, Bhaswar B. Bhattacharya 2, and Sandip Das 1 1 Advanced Computing and Microeectronics Unit, Indian Statistica Institute,

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

A Step-Indexed Model of Substructural State

A Step-Indexed Model of Substructural State A Step-Indexed Mode of Substructura State Ama Ahmed Harvard University ama@eecs.harvard.edu Matthew Fuet Corne University fuet@cs.corne.edu Greg Morrisett Harvard University greg@eecs.harvard.edu Abstract

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Intuitionistic Fuzzy Optimization Technique for Nash Equilibrium Solution of Multi-objective Bi-Matrix Games

Intuitionistic Fuzzy Optimization Technique for Nash Equilibrium Solution of Multi-objective Bi-Matrix Games Journa of Uncertain Systems Vo.5, No.4, pp.27-285, 20 Onine at: www.jus.org.u Intuitionistic Fuzzy Optimization Technique for Nash Equiibrium Soution of Muti-objective Bi-Matri Games Prasun Kumar Naya,,

More information

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated

More information

Convergence results for ant routing

Convergence results for ant routing Convergence resuts for ant routing Joon-Hyuk Yoo, Richard J. La and Armand M. Makowski Abstract We study the convergence property of a famiy of distributed routing agorithms based on the ant coony metaphor,

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Structured sparsity for automatic music transcription

Structured sparsity for automatic music transcription Structured sparsity for automatic music transcription O'Hanon, K; Nagano, H; Pumbey, MD; Internationa Conference on Acoustics, Speech and Signa Processing (ICASSP 2012) For additiona information about

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Wave Equation Dirichlet Boundary Conditions

Wave Equation Dirichlet Boundary Conditions Wave Equation Dirichet Boundary Conditions u tt x, t = c u xx x, t, < x 1 u, t =, u, t = ux, = fx u t x, = gx Look for simpe soutions in the form ux, t = XxT t Substituting into 13 and dividing

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l

Investigation on spectrum of the adjacency matrix and Laplacian matrix of graph G l Investigation on spectrum of the adjacency matrix and Lapacian matrix of graph G SHUHUA YIN Computer Science and Information Technoogy Coege Zhejiang Wani University Ningbo 3500 PEOPLE S REPUBLIC OF CHINA

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry

More information

Proceedings of the 2012 Winter Simulation Conference C. Laroque, J. Himmelspach, R. Pasupathy, O. Rose, and A. M. Uhrmacher, eds.

Proceedings of the 2012 Winter Simulation Conference C. Laroque, J. Himmelspach, R. Pasupathy, O. Rose, and A. M. Uhrmacher, eds. Proceedings of the 2012 Winter Simuation Conference C. aroque, J. Himmespach, R. Pasupathy, O. Rose, and A. M. Uhrmacher, eds. TIGHT BOUNDS FOR AMERICAN OPTIONS VIA MUTIEVE MONTE CARO Denis Beomestny Duisburg-Essen

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

ON DEVIATIONS FROM THE MAXIMUM IN A STOCHASTIC PROCESS. Catherine A. Macken. Howard M. Taylor. June 23, Cornell University

ON DEVIATIONS FROM THE MAXIMUM IN A STOCHASTIC PROCESS. Catherine A. Macken. Howard M. Taylor. June 23, Cornell University ON DEVIATIONS FROM THE MAXIMUM IN A STOCHASTIC PROCESS By Catherine A. Macken Howard M. Tayor June 23, 1975 Corne University Ithaca, New York 14853 Revised - October 21, 1975 ABSTRACT Let T be the first

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Principles of Program Analysis: A Sampler of Approaches

Principles of Program Analysis: A Sampler of Approaches Principles of Program Analysis: A Sampler of Approaches Transparencies based on Chapter 1 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis Springer Verlag

More information

Ensemble Online Clustering through Decentralized Observations

Ensemble Online Clustering through Decentralized Observations Ensembe Onine Custering through Decentraized Observations Dimitrios Katseis, Caroyn L. Bec and Mihaea van der Schaar Abstract We investigate the probem of onine earning for an ensembe of agents custering

More information

A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds

A Cryptographic Proof of Regularity Lemmas: Simpler Unified Proofs and Refined Bounds A Cryptographic Proof of Reguarity Lemmas: Simper Unified Proofs and Refined Bounds Maciej Skórski IST Austria maciej.skorski@gmai.com Abstract. In this work we present a short and unified proof for the

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES

ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES ON THE POSITIVITY OF SOLUTIONS OF SYSTEMS OF STOCHASTIC PDES JACKY CRESSON 1,2, MESSOUD EFENDIEV 3, AND STEFANIE SONNER 3,4 On the occasion of the 75 th birthday of Prof. Dr. Dr.h.c. Wofgang L. Wendand

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Appendix of the Paper The Role of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Model

Appendix of the Paper The Role of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Model Appendix of the Paper The Roe of No-Arbitrage on Forecasting: Lessons from a Parametric Term Structure Mode Caio Ameida cameida@fgv.br José Vicente jose.vaentim@bcb.gov.br June 008 1 Introduction In this

More information

Restricted weak type on maximal linear and multilinear integral maps.

Restricted weak type on maximal linear and multilinear integral maps. Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

ODE Homework 2. Since M y N x, the equation is not exact. 2. Determine whether the following equation is exact. If it is exact, M y N x 1 x.

ODE Homework 2. Since M y N x, the equation is not exact. 2. Determine whether the following equation is exact. If it is exact, M y N x 1 x. ODE Homework.6. Exact Equations and Integrating Factors 1. Determine whether the foowing equation is exact. If it is exact, find the soution pe x sin qdx p3x e x sin qd 0 [.6 #8] So. Let Mpx, q e x sin,

More information

History-Dependent Automata

History-Dependent Automata History-Dependent Automata Ugo Montanari Dipartimento di Informatica Università di Pisa in coaboration with Marzia Buscemi, GianLuigi Ferrari, Marco Pistore, Roberto Raggi, Emiio Tuosto 1 Outine History

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

On generalized quantum Turing machine and its language classes

On generalized quantum Turing machine and its language classes Proceedings of the 11th WSEAS Internationa onference on APPLIED MATHEMATIS, Daas, Texas, USA, March -4, 007 51 On generaized quantum Turing machine and its anguage casses SATOSHI IRIYAMA Toyo University

More information

Crystallisation of a supercooled spherical nodule in a flow

Crystallisation of a supercooled spherical nodule in a flow EUROTHERM 69 Heat and Mass Transfer in Soid-Liquid Phase hange Processes June 25-27, 2003, Bistra caste, Ljubjana, Sovenia Eds.: B. Sarer, D. Gobin rystaisation of a supercooed spherica nodue in a fow

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information

A Core Calculus for Provenance Inspection

A Core Calculus for Provenance Inspection A Core Cacuus for Provenance Inspection Wimer Ricciotti Laboratory for Foundations of Computer Science University of Edinburgh research@wimer-ricciotti.net August 17, 2017 Abstract Recent research has

More information

CONSTRUCTION AND APPLICATION BASED ON COMPRESSING DEPICTION IN PROFILE HIDDEN MARKOV MODEL

CONSTRUCTION AND APPLICATION BASED ON COMPRESSING DEPICTION IN PROFILE HIDDEN MARKOV MODEL CONSRUCON AND APPCAON BASED ON COPRESSNG DEPCON N PROFE HDDEN ARKOV ODE Zhijian Zhou, 1, Daoiang i, 3, 3, i i,3,*, Zetian Fu 1 Coege of Science, China Agricuture University, Beijing, China, 100083 Key

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information