Optimizing Cost-sensitive Trust-negotiation Protocols
|
|
- Amice Ferguson
- 6 years ago
- Views:
Transcription
1 Optimizing Cot-enitive Trut-negotiation Protocol Weifeng Chen, Lori Clarke, Jim Kuroe, Don Towley Department of Computer Science Univerity of Maachuett, Amhert {chenwf, clarke, kuroe, Technical Report Abtract Trut negotiation i a proce that etablihe mutual trut by the exchange of digital credential and/or guiding policie among entitie who may have no pre-exiting knowledge about each other. Motivated by the deire to dicloe a little enitive information a poible in practice, thi paper invetigate the problem of minimizing the cot of the credential exchanged during a trut-negotiation protocol. A credential or a policy i aigned a weighted cot, referred to a it enitivity cot. We formalize an optimization problem, namely the Minimum Senitivity Cot problem, whoe objective i to minimize the total enitivity cot of the credential and policie dicloed by a trut-negotiation protocol. We tudy the complexity of the Minimal Senitivity Cot problem and propoe algorithm to olve the problem efficiently, in both cae when policie are cot-enitive and cot-inenitive. A imple F inite State M achine model of trut-negotiation protocol i preented to model variou trut-negotiation protocol, and ued to provide a quantitative evaluation of the number of exchange round needed to achieve a ucceful negotiation, and the probability of achieving a ucceful negotiation under variou credential dicloure trategie. keyword: Trut-negotiation protocol, enitivity cot Thi reearch ha been upported in part by the NSF under grant award UF-EIES UMA and EIA Any opinion, finding, and concluion or recommendation expreed in thi material are thoe of the author( and do not necearily reflect the view of the National Science Foundation.
2 Introduction In an electronic environment (e.g., the Internet, electronic commerce, and digital government in which entitie may have no pre-exiting knowledge about each other, trutworthine i of critical concern. The concept of trut ha been addreed within many dicipline. It i complex and multidimenional [5]. A general definition of trut from [8] i that trut i a legal arrangement in which an individual (the trutor give fiduciary control of property to a peron or intitution (the trutee for the benefit of beneficiarie. Here, we focu on trut in an electronic environment [5, 7, 0]. We will ue the definition in [3] that trut i uually conidered a belief or cognitive tance that could eventually be quantified by a ubjective probability. Thi ubjective probability i built upon evidence. In real life, people etablih a trut relationhip baed on paper credential, e.g., an employment ID or a Social Security Number (SSN. Thee paper credential act a the foundation upon which a peron build trut with other. Trut relationhip in an electronic environment i typically etablihed by exchanging digital credential [6, 22, 25], the analogue of paper credential. Digital credential are digitally igned aertion by the credential iuer about the credential owner [, 20]. For intance, an X.509 certificate, which contain a digital ignature of the iuer, the identity and the public key of the owner, and an expiration date etc., i a common digital credential. Entitie can etablih one-direction trut or mutual trut. Mot current Internet application etablih one-direction trut, e.g., a client provide information to a erver in order for the erver to trut the client; it i implicitly or explicitly aumed that the client trut the erver. To make thi concrete, conider a cutomer regitering at amazon.com. The cutomer need to provide a mailing addre, phone number, etc. When the cutomer purchae a book, he/he alo need to provide credit card information. However, Amazon doe not need to authenticate itelf to the cutomer. In one-direction trut, one of the negotiator, generally the erver, i aumed to be truted and only the other negotiator (the client need to provide authentication information. However, etablihing mutual trut i often deirable in electronic environment. Thi i typically achieved through the proce of trut negotiation [2]. For example, in the DIAMETER protocol [4], a client eeking acce to network reource in dial-up PPP, wirele AP, or Mobile IP environment, exchange Capabilitie-Exchange-Requet and Capabilitie-Exchange-Anwer meage with a network acce erver in order to negotiate a mutually acceptable ervice baed on their capabilitie. During trut negotiation, an entity may not want to dicloe credential freely, ince credential can be enitive. An acce control policy (policy, for hort for a credential conequently pecifie the prerequiite condition that mut be atified in order for that credential to be dicloed. For example, a cutomer may have a policy for dicloing hi/her SSN that pecifie that the SSN will only be dicloed when an 2
3 authorization certificate iued by the Social Security Adminitration i received. In real life, people treat their paper credential with different level of enitivity. For example, an SSN will be more enitive than a telephone number. Given multiple credential-exchange equence achieving a ame reult, it i deirable to pick the equence that dicloe a et of le enitive credential. For example, when a cutomer i aked to dicloe either a telephone number or an SSN, the cutomer would likely chooe the former. Policie themelve may alo be conidered enitive [2, 4, 24]. We can thu aociate a cot or weight with each credential or policy. A credential with a high cot i more enitive. We can then define the enitivity cot to be the total cot of the dicloed credential and policie in a particular exchange equence. In thi report, we formulate and tudy the Minimal Senitivity Cot problem of minimizing the total enitivity cot of credential and policie dicloed during a trut-negotiation protocol execution. When policie have no enitivity cot (i.e., they can be freely dicloed, the Minimal Senitivity Cot problem i hown to be NP-complete. Fortunately, we find that heuritic algorithm baed on Dijktra algorithm perform quite well, achieving around 95% of optimal for the cae conidered. When policie themelve have a enitivity cot, olving the Minimal Senitivity Cot problem become even more computationally complex. Thu, we conider a greedy algorithm to olve thi problem approximately. We alo decribe a F inite State Machine model that provide a imple framework for analyzing the number of exchange round needed to achieve a ucceful negotiation, and the probability of achieving a ucceful negotiation under variou credential-dicloure trategie. The ret of the report i organized a follow. In Section 2, we briefly overview the literature of trut negotiation. We formulate the Minimal Senitivity Cot (MSC problem in Section 3. Section 4 attack the MSC problem when policie have no dicloure cot. Section 5 i devoted to olving the MSC problem when policie are themelve enitive. We dicu related optimization problem in Section 6. A FSM model i decribed in Section 7. Section 8 preent related work. Finally, we conclude the paper in Section 9. 2 Background During trut negotiation, the dicloure of a credential i guided by an acce control policy p that pecifie the prerequiite condition that mut be atified in order for credential to be dicloed. Typically, the prerequiite condition are a et of credential C C, where C i the et of all credential. In thi paper, policie are modelled uing propoitional formula. Specifically, for each credential c i C, we introduce a boolean variable x i. Every policy p ha the form: p : φ (x,..., x k where 3
4 φ (x,..., x k i a normal formula coniting only of literal x i, the Boolean operator and, and parenthee a needed. i referred to a the target of p, and φ (x,..., x k the condition of p. Given a et of credential C C, we denote g φ (C a the value of φ (x,..., x k given x i = c i C. For example, if φ = (x x 3 x 2, then g φ ({c, c 2, c 4 } = and g φ ({c, c 4 } = 0. Policy p i atified by a et of credential C C iff g φ (C =. During trut negotiation, a negotiator can dicloe credential if g φ (C = where C i the et of credential that the negotiator ha received from the oppoing negotiator. In the ret of paper, for notational implicity, we will replace x i with c i in policie, following the notation ued in [6, 22, 23, 25]. The φ in the example above i thu repreented a φ = (c c 3 c 2. A trut-negotiation protocol i normally initiated by a negotiator (typically, a client requeting particular ervice from another negotiator (a erver. Trut i etablihed if the initially requeted ervice are granted and all policie for dicloed credential are atified [22]. In thi cae, the credential-exchange equence i a ucceful negotiation. Otherwie, it i a failed negotiation. c Client c c 3 2 c 4 TRUE 3 2 c 2 c 3 c c 4 Server c ( c c c 2 2 c 4 TRUE Figure : An example of exchange equence of credential. Figure how a ucceful trut-negotiation proce initiated by a client requeting ervice from a erver. The client acce control policie are hown at the left, and the erver acce control policie are hown at the right. The client begin by revealing credential c 4, ince no previouly-received erver credential are needed in order for the client to dicloe c 4. The erver then dicloe 3 (which ha no precondition and 2 (which require the earlier receipt of client credential c 4. The credential-exchange proce continue a hown in the center of the figure. Note that at each round, all policie for dicloed credential are atified. The equence of exchanged credential depend on the deciion of each negotiator, referred to a a trategy. A trategy i baed on local credential, local policie, requet for local credential from the oppoing negotiator, and credential received from the oppoing negotiator. A trategy control which credential are Uually, monotonicity of policy language [5, 25] i alo aumed uch that no negative operator ( appear in policie. 4
5 dicloed and when, and when to terminate a negotiation [25]. Two negotiation trategie: an eager trategy and a parimoniou trategy are propoed in [9]. With eager trategie, two negotiator take turn dicloing a credential to the other ide a oon a acce control policy retriction for that credential are atified. For example, the negotiation proce in Figure i achieved uing an eager trategy. Converely, with a parimoniou trategy, neither negotiator will dicloe a credential until both of them know there exit a ucceful negotiation via an initial exchange of policie only. A a conequence, only credential are exchanged uing eager trategie, while under parimoniou trategie, both policie and credential may be exchanged. Figure 2 how the correponding negotiation proce of Figure with a parimoniou trategy. c 2 c c Client c 5 ( c c 2 c 2 2 c c TRUE c 4 2 c c 2 c Server c 5 ( c c 2 c 2 2 c 4 TRUE 3 Figure 2: An exchange equence of credential for the negotiation in Figure uing a parimoniou trategy. A trategy i afe if, under the trategy, all policie for credential dicloure are atified whenever a credential i dicloed [4]. Conider p : c 5 (c c 2 in Figure. φ = c 5 (c c 2. When either c 5, or both c and c 2, are received, φ i atified and can be dicloed afely. When a credential c can be dicloed without the receipt of any credential from the oppoing negotiator, we ue the policy p c : c T RUE. Intead, if a negotiator doe not have a credential c, we have p c : c F ALSE, which i generally omitted. When negotiator applying a particular trategy are able to find a ucceful credential-exchange equence, whenever uch a equence exit, the trategy i a complete trategy [22]. There i a large body of work in the literature on trut negotiation [4, 9, 22, 25]. In thi previou work, however, credential are treated without preference (i.e., all credential are aumed to be of equal value to a negotiator, in that a negotiator doe not have a preference about whether to dicloe credential c i or c j when given a choice in the work. In thi report, we are concerned with the preference of credential. 5
6 3 Problem formulation Given the problem etting in Section 2, we formulate the trut negotiation problem in thi ection. Definition : Given a et of credential C S and policie P S proceed by a negotiating erver, and C C and P C by a client, the general trut negotiation problem initiated by a requet for C S from the client, i to find an exchange equence of credential and policie M M 2 M n, uch that ( M n ; (2 M k C S PS or M k C C PC, for k n; and (3 m M k, m C S g φm (C C ( j<k M j = and m C C g φm (C S ( j<k M j =, for all k n. Condition ( expree the requirement that the equence hould achieve a ucceful negotiation, i.e., that the initially requeted ervice i granted. Condition (2 indicate that, at each exchange round, both partie exchange credential or requet for credential. Thee requet for credential are in the form of policie that have credential in the condition of the policie. Condition (3 require that every dicloure of a credential i afe, i.e., that the correponding policy i atified when the credential i dicloed. In the above, n i called the number of exchange round. Definition i baed on exiting work [4, 6, 22], although no explicit formal definition i provided there. Similar to Definition, we have the following definition incorporating the enitivity cot of credential and policie. Definition 2: Given a et of credential C S and policie P S proceed by a negotiating erver, C C and P C by a client, and a enitivity cot w c for any credential or policy c C S PS CC PC, the Minimum Senitivity Cot (MSC problem initiated by a requet for C S from the client, i to find an exchange equence of credential and policie M M 2 M n, uch that ( M n ; (2 M k C S PS or M k C C PC, for k n; (3 m M k, m C S g φm (C C ( j<k M j = and m C C g φm (C S ( j<k M j =, for all k n; and (4 Σ c ( k n M kw c i minimum. For now, we aume that only credential are protected by policie. Note, however, the formulation can 6
7 be extended to the cae that policy dicloure themelve are protected by other policie [4]. In the remainder of thi report, we aume that there i no cot to dicloe the name or ID of credential to the oppoing negotiator. In other word, only the dicloure of the content of credential incur enitivity cot. In mot cae, poeing a credential i not enitive, e.g., everyone i known to have an SSN although the SSN number i enitive to dicloe. By doing thi, we exclude poeion-enitive credential dicued in [6, 8, 23], which we leave a a direction for future work. 4 Solving the MSC problem We will invetigate the complexity of olving the MSC problem defined in Section 3 under two cenario. In the firt cenario, policie have no enitivity cot and can be freely dicloed. Thi ection i devoted to thi firt cae. In the econd cenario, which i dicued in Section 5, policie themelve are enitive and dicloing a policy incur a poitive cot. 4. Policy-graph-baed Strategy When policie have no enitivity cot, we propoe a traightforward trategy, namely the policy-graphbaed trategy, to olve the MSC problem. The trategy conit of four tep: ( Both negotiating partie firt dicloe all policie and the cot of local credential to the other ide; (2 A policy graph baed on the exchanged policie i contructed; (3 The negotiator then apply algorithm to find, if it exit, a olution with minimum enitivity cot; (4 Both negotiator conduct the actual exchange equence of credential baed on the reulting olution. In thi ubection, we briefly decribe thee four tep; the following ubection focue on a complexity analyi of thi trategy. A policy graph conit of two kind of node: circle node correponding to credential and rectangle node correponding to operator in the policie. Conider a formula φ in policy p : φ. We aume that all φ are repreented in a dijunctive normal form, a dijunction (equence of OR coniting of one or more dijunct, each of which i a conjunction (AND of one or more credential. If a dijunct conit of a ingle credential c, there i a direct edge from node c to node. If a dijunct conit of everal 7
8 c c c c 5 5 ( 2 c 3 2 c c c c c c c c c 2 c 2 c 3 (a (b Figure 3: Example of policie and correponding policy graph. credential, each credential ha a directed edge to a rectangle node r, which further ha a directed edge to c. Figure 3 how three policy graph and their correponding policie. //Auming condition of all policie are repreented in a dijunctive normal form Contruct-Negotiation-Graph(P S, P C { ( E = {credential in the condition of p }; // p i the policy for originally requeted ervice ; (2 G = ; (3 BuildGraph(G, target of p, condition of p ; (4 WHILE (E i not empty { (5 Pick e from E; (6 IF (there i a policy p e P S PC.t. e i the target of p e { (7 (8 BuildGraph(G, target of p e, condition of p e; E = (E credential in the condition of p e \ {e}; } (9 ELSE { (0 BuildGraph(G, e, FALSE; ( E = E \ {e}; } } (2 RETURN G; } BuildGraph(G, target, condition { (3 IF (target / G Create a node for target; (4 IF (condition==false { (5 Prune(target, G; (6 return; } (7 FOR (each dijunct D of condition { (8 IF (D i a conjunct coniting of more than one literal { (9 Create a rectangle node R in G; (20 Link R to the node of target; (2 FOR (each element e of D { (22 IF (e G Link a direct edge from e to R; (23 ELSE Create a circle node for e and link a direct edge from e to R; } } (24 ELSE { //D i a ingle credential (25 IF (D G Link a direct edge from D to the node of target; (26 ELSE Create a circle node for D and link a direct edge from D to the node of target; (27 } } } Figure 4: Peudo-code for contructing a policy graph. Figure 4 preent the peudo code of the algorithm contructing a policy graph, G, given the input of the erver policie (P S and the client policie (P C. Note that each credential ha at mot one correponding circle node; however, there exit a unique rectangle node for each operator. Every credential that 8
9 can be dicloed without cot ha an incoming edge from a node T that correpond to TRUE. When a credential appear multiple time in the policie, it correponding node ha multiple outgoing edge. Conequently, there may exit cycle in a policy graph, a hown in Figure 5(b, which preent the policy graph contructed in tep (2 for the erver and client policie hown in Figure 5(a. c 6 c c 2 c 4 c 3 c2 2 3 c 3 c 4 c 5 Client TRUE TRUE TRUE Server c c6 ( c2 c4 c2 c3 ( c2 c4 2 c 3 c5 c4 ( ( c 5 3 c 3 T 2 : cycle (a (b Figure 5: A policy graph (b contructed baed on the policie (a. Once both negotiator have contructed a policy graph baed on the exchanged policie, they conduct earching algorithm to find a ucceful olution with minimum cot in the graph. The MSC problem can be tranlated into the following Minimum Directed-Acyclic-Graph problem. Definition 3: Given a directed graph G =< V, A >, a node u i reachable from a node u if there exit a equence v 0, v,..., v k uch that v 0 = u, v k = u and (v i, v i A for i =, 2,..., k. Definition 4: Given a directed graph G =< V, A >, where the node et V conit of circle node U and rectangle node R, i.e., V = U R, a directed acyclic graph (DAG tarting from a node u and ending at a node u i a ubgraph G G uch that ( G i acyclic and u, u G ; (2 There are no incoming edge to u and no outgoing edge from u in G ; (3 For all v G, v i reachable from u; and (4 If a rectangle node v i in G, then (v, v A v G for all v G. Note that condition (4 in Definition 4 enure that, if a rectangle node, v, i in a DAG, all it child node, node that have outgoing edge to v, mut alo be in the DAG. 9
10 Definition 5: Given a directed graph G =< V, A >, V = U R, a ource node u, a detination node u, and a cot map w : V Z, the Minimal DAG problem i to find a DAG, denoted a G u u, tarting from u and ending at u with minimum cot, i.e., min v G u u w(v ( To olve the MSC problem, we need to find a minimum G T in the contructed policy graph, where T i the node correponding to TRUE and repreent the initially requeted ervice. A we hall decribe in the next ubection, the complexity of finding a minimum DAG depend on the policy graph. More pecifically, if all node in the graph are circle node, it i polynomial olvable; however, the problem i NP-hard if the graph include rectangle node. Once a G T i found in a policy graph, there exit a ucceful negotiation. Both negotiator exchange equence of credential according to thi G T, achieving a ucceful outcome. The exchange can be initiated by a negotiator who ha freely-dicloed credential, i.e., one of the parent node of node T in the policy graph. If both negotiator have uch freely-dicloed credential, either can initiate the exchange equence. A credential c in G T can be dicloed by a negotiator if the negotiator ha received all credential appearing a the predeceor of c in G T from the oppoing negotiator. Propoition. The policy-graph-baed trategy i afe and complete. Proof: Condition (4 in Definition 4 guarantee that any node c in a G T ha at leat one of it child node, which correpond to a dijunct in φ c, in the G T. Credential c can be dicloed only when credential correponding to c child node in the G T are received, which mean φ c i atified. If a ucceful olution exit, there exit a G T in the policy graph. Thu the trategy i complete. 4.. Pruning the policy-graph We oberve that for a rectangle node in a policy graph to be in a G T, all it child node mut be in the G T. If a negotiator doe not have credential c, i.e., p c : c F ALSE, node c can not be in any G T. Conequently we can prune node c and all it child edge. Furthermore, if uch node c i a child node of a rectangle node r, r can alo not appear in a G T. Thu during the procedure of contructing a policy graph, when node c with policy p c : c F ALSE i encountered (tep (5 in Figure 4, a procedure Prune(c, G i called to prune the graph, but the pruned graph till contain all valid G T. Figure 6 how the peudo-code of the 0
11 pruning procedure. Prune(target, G { ( F = {target}; (2 WHILE (F i not empty { (3 Pick v from F ; (4 FOR (each parent u of v { (5 IF (u i a rectangle node (6 F = F {u}; (7 } (8 F = F \ {v}; (9 Delete v and all outgoing edge from v from G; (0 } } Figure 6: Peudo-code for pruning the policy graph during contruction. With thi pruning, the pruned policy graph of the one in Figure 5(b i hown in Figure 7. c c 2 c c 5 c 3 : cycle T Figure 7: The pruned policy graph for policie hown in Figure 5(a 4.2 Complexity Analyi In thi ubection, we analyze the complexity of the policy-graph-baed trategy. In particular, we focu on the algorithm for contructing the policy graph, and algorithm for finding the minimum G T graph. in the reultant Propoition 2. The running time of the algorithm for contructing a policy graph i polynomial in the number and the length of policie P S and P C. Proof: We define the length, l p, of a policy p, a the number of credential in the condition of the policy. For example, policy p c 5 (c c 2 ha length of 3 ince there are total 3 credential in the
12 condition of p. Let L be the maximum length of all policie, i.e., L = max p P S P C l p. Conider tep (4 to ( in the WHILE loop. Since et E only include credential appearing in policie, E (L + ( P S + P C. During each execution of the loop, tep (8 or ( delete one element from E, thu the loop i at mot executed (L + ( P S + P C time. Next conider procedure BuildGraph(. The FOR loop from tep (7 to (25 ha at mot L execution ince each execution deal with one dijunction in the condition. Aume that the policy-graph i tored in an n n adjacency matrix, where n i the number of node in the output graph. Deciding whether a node ha been in G (tep (3, (2 and (24 require complexity of O(n. Since at leat two credential are required to incur an operator, a policy with length of l generate at mot l/2 rectangle node. Thu the reulting graph ha at mot L/2 ( P S + P C rectangle node and (L + ( P S + P C circle node (correponding to credential, i.e., n L/2 ( P S + P C + (L + ( P S + P C. Conequently, the running time of procedure BuildGraph( i at mot L( L/2 + L + ( P S + P C. A a reult, the algorithm in Figure 4 will have a total running time that i at mot L(L + ( L/2 + L + ( P S + P C 2. Although a policy graph can be contructed in polynomial time, finding the minimum G T i more complicated. in the graph Compute-Cot(G, W { //W i the cot matrix for all credential/ervice //L[v] and W [v] tore the LABEL and the cot of node v G repectively //A i the et of node that are parent node of node in S ( L[T ] = ; c[t ] = 0; (2 L[v] = ; c[v] = ; //for all other node except T node (3 S = {T }; (4 For (each parent u of node T { (5 Compute L[u] and W [u]; (6 If (W [u] i finite A = A {u}; } (7 WHILE ( / S or (A i not empty { (8 Pick v A with minimum cot; (9 S = S {v}; A = A \ {v}; (0 For (each parent u of node v { ( Compute L[u] and W [u]; (2 If (W [u] i finite A = A {u}; } (3 } (4 If (W [] i finite return L[] and W []; (5 } Figure 8: Peudo-code of variational Dijktra algorithm for finding a minimum G T in a policy-graph G. Propoition 3. If a policy graph doe not include rectangle node, the Minimum DAG problem can be olved uing a variation of Dijktra algorithm, hown in Figure 8. Proof: When Dijktra algorithm in [6] i ued, cot are aociated with edge in the graph. When a 2
13 variation of Dijktra algorithm hown in Figure 8 i ued, cot are aociated with node rather than edge. But in both algorithm, cot are non-negative and the variation of Dijktra algorithm hown in Figure 8 operate exactly the ame a Dijktra algorithm in [6]. The correctne of Dijktra algorithm in [6] guarantee that the variation of Dijktra algorithm return a DAG (L[] with a minimum cot (W []. When rectangle node exit in a policy graph, however, the MSC problem turn to be a NP-complete problem. Propoition 4: The general Minimum DAG problem i NP-complete. Proof: It i eay to how that the Minimum DAG problem NP. Given a G T, validating condition ( and computing the cot of G T can be done in polynomial time. To how that it i NP-hard, we prove that 3-SAT i polynomially reducible to the Minimum DAG problem. Given an intance of 3-SAT with claue et L = {l, l 2,..., l m } and variable et V = {x, x 2,..., x n }, we can formulate an intance of the Minimum DAG problem in Figure 9: u r l l 2... l m v v 2... v n x x x 2 x 2... x n x n u Figure 9: An intance of the Minimum DAG problem formulated from an intance of the 3-SAT problem Contruct 2n circle node {x, x, x 2, x 2,..., x n, x n } for literal, n circle node {v, v 2,..., v n } for variable, and m circle node for claue. Contruct a rectangle node r, a ource node u and a detination node u. Connect directed edge a hown in Figure 9. Note that a claue circle node, l i, ha three incoming edge from three literal node appearing in the claue. All literal node {x i, x i } have cot. Other node have cot 0. The contructed Minimum DAG problem i to find a G u u with cot w G u u 3 n ubject to condition (.
14 By olving thi Minimum DAG problem in Figure 9, we can olve the given 3-SAT problem. If there i a G u u with cot w G u u n, we anwer YES for the given 3-SAT problem and the literal node in the Gu u are aigned TRUE. Otherwie we anwer NO for the 3-SAT problem. Now, we want to how that there i a G u u with cot w G u u aignment atifying the 3-SAT intance. n in Figure 9 if and only if there i a truth. If a G u u with cot n exit, ince r i a rectangle node, all claue and variable node mut be in the G u u. Conequently, one and exact one node from each literal-node pair {x i, x i } mut be in the G u u. We then aign thoe literal node in the G u u with TRUE. Since every claue node i in the G u u, at leat one of the three literal node appearing in a claue i alo in the G u u, which mean the aignment above atifie all claue of the 3-CNF entence.. If there exit a truth aignment atifying the 3-CNF entence, we can put all node in Figure 9 in a G u u except thoe literal node that are NOT aigned TRUE. Such a G u u i a valid DAG tarting from u and ending at u ince each variable node ha exact one child node in the G u u and each claue node ha at leat one component literal node in the G u u. The G u u alo ha a cot equal to n. 4.3 Heuritic Algorithm Given the NP-completene of the Minimum Senitivity Cot problem even when policie can be dicloed freely, in thi ubection, we decribe two heuritic algorithm, followed by a performance tudy for thee heuritic via imulation. A we decribed in Section 4.2, a variation of Dijktra algorithm in Figure 8 can be ued to olve the Minimum DAG problem when there are no rectangle node in the policy graph. So we conider that algorithm a the firt heuritic, referred to a Dijktra heuritic, for the general Minimum DAG problem. Notice that, applying Dijktra heuritic, the cumulative cot of a rectangle node u i the enitivity cot of u plu the cumulative cot of all the child node of u, i.e., if u i a rectangle node, tep ( in Figure 8 i replaced by cot = W [u] + v C[v ], where v i a child node of u. To evaluate the performance of Dijktra heuritic, we randomly generate a et of client policie, erver policie and credential cot with the following aumption: The erver ha N S credential and a ervice that i initially requeted by the client; the client ha N C credential. 4
15 Formula of all policie are in a dijunctive normal form; a formula φ c for a protected credential c ha k (0 k K dijunct and each dijunct conit of m (0 m M credential from the oppoing negotiator. When k = 0, c can be dicloed freely, i.e., c T RUE. For the erver, each of N S credential ha the ame probability of appearing in a dijunct of a policy formula of the client. Similar aumption are made for the client credential. A credential c ha an integer cot w c (0 w c W if c i not freely-dicloed. k, m and w c are all uniformly ditributed in [0, K], [0, M] and [0, W ], repectively. 00 et of policie are randomly generated and for each et, we create 00 different cot aignment for credential. Among thee 0 4 experiment, 8600 experiment have ucceful olution 2. We define the error percentage, (C Approx /C Optimal, to denote the performance of the heuritic algorithm, where C Approx i the cot of the olution returned by Dijktra heuritic and C Optimal i the optimal olution 3. Figure 0 how the performance of Dijktra heuritic with input parameter N S = N C = 7, K = 3, M = 4 and W = 0. Dijktra heuritic perform quite well in that it find the olution with minimum cot in 833 of the 8600 experiment. Figure 0(a how the number of experiment that had a given error percentage. Roughly, a the error percentage increae, the correponding number of experiment decreae. Figure 0(b how the correponding cumulative ditribution of the number of experiment with a given error percentage, from which, one can ee that all olution returned by Dijktra heuritic have an error percentage that i le than 54%. We alo imulated the eager trategy for the ame 8600 experiment. The average cot achieved by the eager trategie, denoted a C Eager, i more than two time the cot returned by Dijktra heuritic, denoted a C Approx (e.g. C Eager = 38.7 and C Approx = 7.6. Note that in the 400 experiment that have no ucceful olution, Dijktra heuritic doe not dicloe any credential but eager trategie will dicloe a et of credential till the negotiation i found to be failed. To further improve the performance of the firt heuritic, conider the policy graph in Figure (a with the cot hown in the center. Dijktra heuritic chooe node c 2 rather than c 3 in the reultant G T ince w c2 < w c3. However, c 3 mut be in the G T becaue of the rectangle node. Conequently chooing c 3 a the predeceor of in the G T ha le cot than chooing c 2. To remedy thi ituation, a node c with n outgoing edge to n rectangle node ha a remedied cot w c = w c /(n +. Thi remedied cot w c, i then ued when earching for a G T uing Dijktra heuritic. 2 The exitence of ucceful olution i determined by the police, diregarding cot aignment. Thi mean that roughly 86 out of 00 et of policie were found to have ucceful olution. 3 The optimal olution i achieved by enumerating all poible DAG, which require exponentially computational complexity. 5
16 0000 N S =N C =7, K=3, M=4, W=0 N S =N C =7, K=3, M=4, W= Number of experiment Probability Error percentage (% Error percentage (% (a Figure 0: Simulated performance of Dijktra heuritic (b c c2 c3 T c c2 c3 3 2 c 4 2 (a credential 2 c c2 c cot T (b c 4 Figure : Two policy-graph. The cot of the reultant G T i till calculated uing w c. However, cot remediation may reult a wore G T than the one without remediation. For example, conider the policy graph in Figure (b. Here, the algorithm chooe c 3 in the reultant G T with cot remediation even though the optimal G T include c 2 intead of c 3. Thu the econd heuritic algorithm, referred to a the hybrid Dijktra heuritic, i to run the algorithm in Figure 8 twice: once with cot remediation and once without, and return the G T maller cot. with the Simulation reult in Figure 2 how that the hybrid Dijktra heuritic provide ome improvement over the firt heuritic algorithm. For example, it find the olution with minimum cot in 8243 of the 8600 experiment with input parameter: N S = N C = 7, K = 3, M = 4 and W = 0. 6
17 N S =N C =7, K=3, M=4, W=0 N S =N C =7, K=3, M=4, W= Dijktra Hybrid 0.99 Number of experiment Probability Hybrid Dijktra Error percentage (% Error percentage (% (a (b Figure 2: Compared performance of two heuritic algorithm 5 The MSC problem with policy-dicloure cot In Section 4 we conidered the olution of the MSC problem when policie are free to dicloe. Thi ection dicue the cae when policie are themelve enitive, i.e., there i a cot in policy dicloure. A decribed earlier, with eager trategie, both negotiator immediately dicloe a credential once that credential condition are atified. A a reult, no policie are exchanged during the negotiation proce. On the other hand, uing policy-graph-baed trategie, both negotiator exchange all policie and find a ucceful G T with minimum enitivity cot and thu only dicloe a maller et of credential. It i poible that the minimum cot achievable uing policy-graph-baed trategie (including the cot of exchange policie i higher than the cot under eager trategie. However, without knowledge of all policie, it i impoible to find a ucceful olution with minimum cot. For thi reaon, we propoe a greedy trategy to approximately olve the MSC problem when policie are themelve enitive. The greedy trategy i baed on eager trategie and conit of two tep. In the firt tep, both negotiator exchange the name and correponding accumulative cot of credential uing eager trategie, i.e., a negotiator will dicloe the name of a credential if the credential i atified by the name of credential received from the oppoing negotiator 4. At the end of the firt tep, the negotiation i determined to have a ucceful olution or not. If a ucceful olution exit, the negotiation proce evolve to the econd tep in which both negotiator contruct the olution and exchange the content of the credential. Thee two tep are detailed in the following. 4 We aume that both negotiator have conitent name of credential. 7
18 5. Step One In the firt tep, the negotiation proce begin by one negotiator dicloing the name and cumulative cot of free credential. The cumulative cot for a freely-dicloed credential i zero. After thi initial tep, both negotiator ue eager trategie. More pecifically, when a credential (except the initially requet ervice, for reaon that will be decribed hortly, i atified by the name of the credential received from the oppoing negotiator, it name and cumulative cot are dicloed. The cumulative cot of a atified credential c i the um of the cot of the credential, w c, and the cumulative cot of all credential appearing in a atified dijunct of φ c. If multiple dijunct are atified, the one currently with minimal cumulative cot i choen. The exchange proce of name and cumulative cot continue till both negotiator have no more credential to dicloe. If the initially requeted ervice i not atified, it i a failed negotiation; otherwie, it i a ucceful negotiation. The reaon for not dicloing the name of immediately when i atified i to find other poible olution atifying with a maller cot. Client c c 2 3 c 3 2 c 4 2 cred. cot Server c c4 c 3 c 4 ( TRUE TRUE c 2 c c2 c3 c Client 2 3 c2 c3 c4 (3 (0, (0 ( (7, (2, ( c (5 Server Client 2 c 4 c Server (a (b (c Figure 3: An exchange equence uing greedy trategie. Figure 3 how a imple two-tep exchange uing greedy trategie. The policie and cot are hown in Figure 3(a. Figure 3(b how the information exchanged during tep one of the greedy trategie. The actual exchange of credential conducted in tep two i hown in Figure 3(c. In Figure 3(b, the erver begin the negotiation by dicloing N = { 2 (0, 3 (0}, where the name of the credential, 2 and 3, are followed by their cumulative cot, which are both 0. After the client receive N, it dicloe in N 2 the name and cumulative cot of all credential atified by N, i.e., N 2 = {c 2 (7, c 3 (2, c 4 (}. Then the erver dicloe N 3 = { (3}. Conider p : c 3 c 4. The cumulative cot of i w + w c3 if c 3 i atified, or w + w c4 if c 4 i atified. If p i atified by both c 3 and c 4, the one with a maller cumulative cot i choen. So when the erver receive N 2, i atified by either c 3 8
19 or c 4, and c 4 i choen due to it maller cumulative cot. Alo note that i atified by c 2 in N 2, but the erver did not dicloe the name of immediately in N 3. Indeed, another olution (c c 4 wa found in a later dicloure with a maller cot. When both negotiator have no more name of credential to dicloe and i atified, the negotiation ha a ucceful olution and the negotiation proce enter the econd tep. 5.2 Step Two In the econd tep of the greedy trategy, both negotiator contruct a ucceful exchange equence and conduct the actual exchange of credential. To contruct the equence, the erver end the client the name of credential that are choen to atify p, which are referred to a a counter-requet, denoted a Q 2, e.g., Q 2 = {c, c 4 } in the example hown in Figure 3. When a negotiator receive Q i, the negotiator replie with Q i+ that include the name of credential choen to atify the credential in Q i. The proce top when Q n conit of only freely-dicloed credential (recall that n i the number of exchange round. Q n,..., Q 2, Q = {} conequently form a ucceful exchange equence. In the example hown in Figure 3, Q 5 = { 2 }, Q 4 = {c 4 }, Q 3 = {, 2 }, Q 2 = {c, c 4 } and Q = {}. The conequent exchange of credential i conducted according to thi equence except that all credential are dicloed at mot once, i.e., if the name of a credential appear in Q i and Q j (i > j, and the credential i dicloed in Q i, the credential will not be dicloed again in Q j. For example, a hown in Figure 3(c, 2 appear in both Q 5 and Q 3. 2 i dicloed at the firt round (when Q 5 i dicloed and i not dicloed again at the third round (when Q 3 i dicloed. Note that ymbol for credential in Figure 3(b repreent the name of the credential wherea ymbol in Figure 3(c repreent the content of the credential. Clearly, it i not guaranteed that the olution achieved under greedy trategie be the optimal olution. Our imulation reult in Figure 4 how that the greedy trategy find the olution with minimum cot in 76 of the 8600 experiment with input parameter: N S = N C = 7, K = 3, M = 4 and W = 0. The greedy trategy generate a higher error percentage (more than 200% compared to the performance of the two heuritic decribed in Section 4. Thi i becaue the negotiator have no knowledge about the policie. It hould be noted that, ince no information of the G T i included in N in tep one, a credential may incur multiple copie of enitivity cot in the cumulative cot if the credential appear multiple time in a olution. For example, c 4 incur cot for and incur cot again for in Figure 3. However, only one copy of the cot i calculated in computing the cot of a olution in the imulation. The average cot achieved by the eager trategie ( C Eager = 38.7 i around two time the average cot returned by the greedy trategy 9
20 N S =N C =7, K=3, M=4, W=0 N S =N C =7, K=3, M=4, W= Number of experiment Probability Error percentage (% Error percentage (% (a (b Figure 4: Simulated performance of greedy trategie ( C Greedy = Policy Inference Under greedy trategie, although no policie are explicitly dicloed, partial information about the policie can be inferred baed on the behavior of the negotiator. For intance, in the example hown in Figure 3, the client may infer that c c 4 i one dijunct of φ baed on Q 2. Thi form of policy inference can be concealed if the erver add other mak credential into Q 2. However, a pointed out in [23], the quetion of how to prevent policy inference deerve more conideration in the future work. We conclude thi ection with the following propoition. Propoition 5: The greedy trategy i afe and complete. Proof: In tep one of the greedy trategy, both negotiator exchange the name of credential uing the eager trategy. Becaue of the completene of the eager trategy [9], a ucceful equence i guaranteed to be found if it exit. Thu the greedy trategy i complete. A counter-requet Q i+ include a et of credential that atify credential in Q i. In tep two of the greedy trategy, ince credential in Q i+ are dicloed earlier than the credential in Q i, the trategy i afe. 6 Dicuion Thu far, we have focued on the MSC problem minimizing the total cot of credential and policie dicloed by two negotiator during trut negotiation. In thi ection, we dicu related formulation of thi problem. 20
21 6. The MSC Problem for One Negotiator Conider an online-drug purchae during which a cutomer and an online tore etablih mutual trut followed by a tranaction. A ucceful tranaction i mot important to the tore and the tore may not care about the negotiation cot. However, the cutomer may till prefer the olution that minimize the cutomer cot. In thi cae, the goal of the optimization problem i to minimize the cot of only one negotiator, which can be defined a the Minimum Senitivity Cot problem for One Negotiator (MSCON. Definition 6: Given a et of credential C S and policie P S proceed by a negotiating erver, C C and P C by a client, and a enitivity cot w c for any credential or policy c C S PS CC PC, the Minimum Senitivity Cot problem for One Negotiator (MSCON initiated by a requet for C S from the client, i to find an exchange equence of credential and policie M M 2 M n, uch that ( M n ; (2 M k C S PS or M k C C PC, for k n; (3 m M k, m C S g φm (C C ( j<k M j = and m C C g φm (C S ( j<k M j =, for all k n; and (4 Σ c ( k n M k (C C P C w c i minimum or Σ c ( k n M k (C S P S w c i minimum. In the proof of Propoition 4, we howed the NP-completene of the MSC problem by reducing a general 3-SAT problem to a MSCON problem, which i a pecial cae of the MSC problem. Thu the MSCON problem i alo NP-hard even when policie are freely-dicloed. The policy-graph-baed trategy and the greedy trategy propoed earlier can be ued to approximately olve the MSCON problem when policie are free and with cot, repectively, by having the cot of all credential and policie of the oppoing negotiator to be The MSC Problem with Selfih Negotiator The MSC problem minimize the total cot of credential and policie dicloed by both negotiator during trut negotiation. However, an optimal olution for the MSC problem may not give the minimal cot for a ingle negotiator. When negotiator are elfih, a negotiator goal i to minimize hi/her own cot diregarding the cot of the oppoing negotiator. Thee conideration reult in the following problem: Definition 7: Given a et of credential C S and policie P S proceed by a negotiating erver, C C and P C by a client, and a enitivity cot w c for any credential or policy c C S PS CC PC, the Selfih- 2
22 Minimum Senitivity Cot (SMSC problem initiated by a requet for C S from the client, i to find an exchange equence of credential and policie M M 2 M n, uch that ( M n ; (2 M k C S PS or M k C C PC, for k n; (3 m M k, m C S g φm (C C ( j<k M j = and m C C g φm (C S ( j<k M j =, for all k n; and (4 Σ c ( k n M k (C C P C w c i minimum and Σ c ( k n M k (C S P S w c i minimum. Since a ucceful equence minimizing one negotiator cot may not minimize the cot of the other negotiator, the SMSC problem may have no olution even though there exit a ucceful negotiation. Thu we revie the problem uch that either negotiator afely dicloe a et of credential and policie that minimize the remaining cot at each tep. Definition 8: The remaining cot, CM R, of a dicloure, M, of credential and policie for a negotiator i defined a the minimum cot of credential and policie that the negotiator need to dicloe after dicloing M to achieve a ucceful outcome if there exit. If there i no ucceful negotiation, C R M M. = for any Definition 9: Given a et of credential C S and policie P S proceed by a negotiating erver, and C C and P C by a client, and a enitivity cot w c for any credential or policy c C S PS CC PC, the Minimum Remaining Senitivity Cot (MRSC problem initiated by a requet for C S from the client, i to find an exchange equence of credential and policie M M 2 M n, uch that ( M n ; (2 M k C S PS or M k C C PC, for k n; (3 m M k, m C S g φm (C C ( j<k M j = and m C C g φm (C S ( j<k M j =, for all k n; and (4 ( c M k w c + C R M k i minimum for each k =,..., n. Before a negotiator dicloe any credential and policie, the remaining cot i exactly the optimal olution of the MSCON problem. Thu finding the remaining cot of a particular dicloure even when policie have no dicloure cot i NP-hard. Conequently, the MRSC problem i alo NP-hard. We can firt apply heuritic evaluation function to approximate the remaining cot, followed by a minimini algorithm imilar to the minimax algorithm in [3] to find a approximation olution for the MRSC problem. 22
23 6.3 Minimal Exchange Round Problem When negotiator are concerned with the peed of trut negotiation rather than the cot, it i deirable to minimize the number of exchange round. Thi problem can be eaily defined and the eager trategie propoed in [9] achieve the minimum number of exchange round. In the following ection, a F inite State Machine i propoed to analyze the performance of a particular negotiation proce in term of the number of exchange round. 7 Modeling trut negotiation In previou ection, we conidered the computational complexity of olving cot optimization problem aociated with credential dicloure in trut negotiation protocol. In thi ection, we turn our attention from credential dicloure cot to the time needed to uccefully complete a negotiation protocol. Our goal will be to quantify the number of round needed to complete a negotiation under variou credential dicloure policie. 7. Varied Strategie without Policy Knowledge Let u begin by conidering a trut negotiation proce in which the erver ha a requeted ervice, and N S credential, among which, f S credential are freely-dicloed. The client ha N C credential, f C of which are freely-dicloed. We further aume that neither negotiator ha knowledge of it opponent policie, i.e., that policie are hidden [4] or enitive [2]. Recall that under an eager trategy, both negotiator immediately dicloe a credential once that credential condition are atified. Eager trategie thu achieve the minimum number of exchange round. The price paid for thi minimum number of exchange round, however, i that a negotiator may dicloe many more credential than what i minimally required to uccefully complete the negotiation. In contrat, under a prudent trategy, a negotiator dicloe only one atified credential (pecifically, the credential with minimum enitivity cot at each round. The goal of the prudent trategy i to minimize the number of credential dicloed. Note that a prudent trategy differ from the parimoniou trategie [9] we conidered earlier in that a prudent trategy ha no knowledge of the opponent policie. Prudent trategie dicloe a few credential a poible. However, in the abence of policy knowledge, the credential dicloed by a negotiator may not atify any of the opponent credential policie. In 23
24 other word, the dicloure of a ingle credential under a prudent trategy may not be ufficient to allow a negotiation continue if the oppoing negotiator ha no atified credential to dicloe at the next round. A a compromie, at each round, a negotiator may dicloe a few credential a poible, but enough to advance the negotiation. A natural way to achieve thi i to define a threhold 0 Γ. A negotiator will calculate the correponding probability, p(x, that the opponent i able to continue the negotiation at the next round, given that the negotiator will dicloe x credential. Clearly, p(x increae a x increae. The negotiator conequently dicloe a minimum number, m, of credential uch that p(m Γ. If a negotiator ha A atified credential and p(a < Γ, the negotiator will dicloe all A credential. We will refer to thi trategy a a threhold trategy with threhold Γ. Note that when Γ = 0, the threhold trategy i the ame a the prudent trategy; when Γ =, the threhold trategy i the ame a the eager trategy. Prudent trategie and threhold trategie can reduce the number of credential dicloed, but have a higher number of exchange round. Thu, there exit a trade-off between the number of exchange round and the number of credential dicloed. To quantitatively tudy thi tradeoff, we decribe a imple F inite State Machine to model the round of credential exchange in the trut negotiation proce. 7.2 A Non-determinitic Finite State Model Rather than conider a pecific et of client and erver credential dicloure policie, we eek here a more general model in which the dicloure of credential by one negotiator can lead to everal different tate for the other negotiator. Roughly peaking, thi non-determinim model the fact that the erver policie are unknown to the client, and conequently (depending on the pecific dicloure policie implemented by the erver a client dicloure of a et of credential can reult in any number of erver credential becoming atified a a reult of the client dicloure. Thu, a non-determinitic Finite State Model imilar to the probabilitic verification technique in [2] will be appropriate to model a trut-negotiation proce in abence of policy knowledge. The F inite State Machine i a 5-tuple (S, 0, T, P, A where S i a finite et of tate; 0 S i the initial tate; T : S 2 S i a non-determinitic tate tranition function; P : S S [0, ] i a probability function; and A S i a et of accepting tate. A tate i S conit of 5 element: (r, d S, a S, d C, a C, where r i the number of exchange round to reach thi tate; d S (d C i the number of credential dicloed by the erver (client to the client (erver; and a S (a C i the number of erver (client credential available, i.e., atified, but not dicloed to 24
Problem Set 8 Solutions
Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem
More informationPreemptive scheduling on a small number of hierarchical machines
Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,
More informationAvoiding Forbidden Submatrices by Row Deletions
Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076
More informationClustering Methods without Given Number of Clusters
Clutering Method without Given Number of Cluter Peng Xu, Fei Liu Introduction A we now, mean method i a very effective algorithm of clutering. It mot powerful feature i the calability and implicity. However,
More informationSocial Studies 201 Notes for November 14, 2003
1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More information7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281
72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition
More informationLecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004
18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem
More informationA BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH
Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan
More informationChapter 4. The Laplace Transform Method
Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination
More informationOnline Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat
Online Appendix for Managerial Attention and Worker Performance by Marina Halac and Andrea Prat Thi Online Appendix contain the proof of our reult for the undicounted limit dicued in Section 2 of the paper,
More informationChapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover
Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature
More informationIEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation
IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between
More informationApproximating discrete probability distributions with Bayesian networks
Approximating dicrete probability ditribution with Bayeian network Jon Williamon Department of Philoophy King College, Str and, London, WC2R 2LS, UK Abtract I generalie the argument of [Chow & Liu 1968]
More informationA Provably Secure Scheme for Remote User Authentication
A Provably Secure Scheme for Remote Uer Authentication Fuw-Yi Yang 1, Su-Hui Chiu 2 1 Department of Computer Science and Information Engineering, Chaoyang Univerity of Technology Taichung County 41349,
More informationTheoretical Computer Science. Optimal algorithms for online scheduling with bounded rearrangement at the end
Theoretical Computer Science 4 (0) 669 678 Content lit available at SciVere ScienceDirect Theoretical Computer Science journal homepage: www.elevier.com/locate/tc Optimal algorithm for online cheduling
More informationON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang
Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang
More informationCS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division
1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,
More informationAn inventory model with temporary price discount when lead time links to order quantity
80 Journal of Scientific & Indutrial Reearch J SCI IN RES VOL 69 MARCH 00 Vol. 69 March 00 pp. 80-87 An inventory model with temporary price dicount when lead time link to order quantity Chih-Te Yang Liang-Yuh
More informationPredicting the Performance of Teams of Bounded Rational Decision-makers Using a Markov Chain Model
The InTITuTe for ytem reearch Ir TechnIcal report 2013-14 Predicting the Performance of Team of Bounded Rational Deciion-maer Uing a Marov Chain Model Jeffrey Herrmann Ir develop, applie and teache advanced
More informationChapter 2 Sampling and Quantization. In order to investigate sampling and quantization, the difference between analog
Chapter Sampling and Quantization.1 Analog and Digital Signal In order to invetigate ampling and quantization, the difference between analog and digital ignal mut be undertood. Analog ignal conit of continuou
More informationReliability Analysis of Embedded System with Different Modes of Failure Emphasizing Reboot Delay
International Journal of Applied Science and Engineering 3., 4: 449-47 Reliability Analyi of Embedded Sytem with Different Mode of Failure Emphaizing Reboot Delay Deepak Kumar* and S. B. Singh Department
More informationOptimal Coordination of Samples in Business Surveys
Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New
More informationLecture 8: Period Finding: Simon s Problem over Z N
Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing
More informationChip-firing game and a partial Tutte polynomial for Eulerian digraphs
Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut
More informationMicroblog Hot Spot Mining Based on PAM Probabilistic Topic Model
MATEC Web of Conference 22, 01062 ( 2015) DOI: 10.1051/ matecconf/ 2015220106 2 C Owned by the author, publihed by EDP Science, 2015 Microblog Hot Spot Mining Baed on PAM Probabilitic Topic Model Yaxin
More informationWhite Rose Research Online URL for this paper: Version: Accepted Version
Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/
More informationTHE STOCHASTIC SCOUTING PROBLEM. Ana Isabel Barros
THE STOCHASTIC SCOUTING PROBLEM Ana Iabel Barro TNO, P.O. Box 96864, 2509 JG The Hague, The Netherland and Faculty of Military Science, Netherland Defence Academy, P.O. Box 10000, 1780 CA Den Helder, The
More informationIn presenting the dissertation as a partial fulfillment of the requirements for an advanced degree from the Georgia Institute of Technology, I agree
In preenting the diertation a a partial fulfillment of the requirement for an advanced degree from the Georgia Intitute of Technology, I agree that the Library of the Intitute hall make it available for
More informationOptimization model in Input output analysis and computable general. equilibrium by using multiple criteria non-linear programming.
Optimization model in Input output analyi and computable general equilibrium by uing multiple criteria non-linear programming Jing He * Intitute of ytem cience, cademy of Mathematic and ytem cience Chinee
More informationThe Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks
The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,
More informationμ + = σ = D 4 σ = D 3 σ = σ = All units in parts (a) and (b) are in V. (1) x chart: Center = μ = 0.75 UCL =
Our online Tutor are available 4*7 to provide Help with Proce control ytem Homework/Aignment or a long term Graduate/Undergraduate Proce control ytem Project. Our Tutor being experienced and proficient
More informationList coloring hypergraphs
Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity
More informationarxiv: v1 [math.mg] 25 Aug 2011
ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,
More informationSTOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND
OPERATIONS RESEARCH AND DECISIONS No. 4 203 DOI: 0.5277/ord30402 Marcin ANHOLCER STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND The generalized tranportation problem
More informationLecture 9: Shor s Algorithm
Quantum Computation (CMU 8-859BB, Fall 05) Lecture 9: Shor Algorithm October 7, 05 Lecturer: Ryan O Donnell Scribe: Sidhanth Mohanty Overview Let u recall the period finding problem that wa et up a a function
More informationMinimum Cost Noncrossing Flow Problem on Layered Networks
Minimum Cot Noncroing Flow Problem on Layered Network İ. Kuban Altınel*, Necati Ara, Zeynep Şuvak, Z. Caner Taşkın Department of Indutrial Engineering, Boğaziçi Univerity, 44, Bebek, İtanbul, Turkey Abtract
More informationCodes Correcting Two Deletions
1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of
More informationSocial Studies 201 Notes for March 18, 2005
1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationStochastic Optimization with Inequality Constraints Using Simultaneous Perturbations and Penalty Functions
Stochatic Optimization with Inequality Contraint Uing Simultaneou Perturbation and Penalty Function I-Jeng Wang* and Jame C. Spall** The John Hopkin Univerity Applied Phyic Laboratory 11100 John Hopkin
More informationTechnical Appendix: Auxiliary Results and Proofs
A Technical Appendix: Auxiliary Reult and Proof Lemma A. The following propertie hold for q (j) = F r [c + ( ( )) ] de- ned in Lemma. (i) q (j) >, 8 (; ]; (ii) R q (j)d = ( ) q (j) + R q (j)d ; (iii) R
More informationNCAAPMT Calculus Challenge Challenge #3 Due: October 26, 2011
NCAAPMT Calculu Challenge 011 01 Challenge #3 Due: October 6, 011 A Model of Traffic Flow Everyone ha at ome time been on a multi-lane highway and encountered road contruction that required the traffic
More informationMulticast Network Coding and Field Sizes
Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,
More informationStandard Guide for Conducting Ruggedness Tests 1
Deignation: E 69 89 (Reapproved 996) Standard Guide for Conducting Ruggedne Tet AMERICA SOCIETY FOR TESTIG AD MATERIALS 00 Barr Harbor Dr., Wet Conhohocken, PA 948 Reprinted from the Annual Book of ASTM
More informationProactive Serving Decreases User Delay Exponentially: The Light-tailed Service Time Case
Proactive Serving Decreae Uer Delay Exponentially: The Light-tailed Service Time Cae Shaoquan Zhang, Longbo Huang, Minghua Chen, and Xin Liu Abtract In online ervice ytem, the delay experienced by uer
More informationBogoliubov Transformation in Classical Mechanics
Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How
More informationCONGESTION control is a key functionality in modern
IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,
More informationOBSERVER DESIGN FOR DISCRETE-TIME LINEAR SWITCHING SYSTEMS 1
OBSERVER DESIGN FOR DISCRETE-TIME LINEAR SWITCHING SYSTEMS 1 E. De Santi, M.D. Di Benedetto Department of Electrical Engineering and Computer Science, Univerity of L Aquila. Email: (deanti,dibenede@ing.univaq.it
More informationIEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER Wenguang Mao, Xudong Wang, Senior Member, IEEE, and Shanshan Wu
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 10, OCTOBER 2016 8511 Ditributed Opportunitic Scheduling With QoS Contraint for Wirele Network With Hybrid Link Wenguang Mao, Xudong Wang, Senior
More informationSource slideplayer.com/fundamentals of Analytical Chemistry, F.J. Holler, S.R.Crouch. Chapter 6: Random Errors in Chemical Analysis
Source lideplayer.com/fundamental of Analytical Chemitry, F.J. Holler, S.R.Crouch Chapter 6: Random Error in Chemical Analyi Random error are preent in every meaurement no matter how careful the experimenter.
More information[Saxena, 2(9): September, 2013] ISSN: Impact Factor: INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY
[Saena, (9): September, 0] ISSN: 77-9655 Impact Factor:.85 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Contant Stre Accelerated Life Teting Uing Rayleigh Geometric Proce
More informationinto a discrete time function. Recall that the table of Laplace/z-transforms is constructed by (i) selecting to get
Lecture 25 Introduction to Some Matlab c2d Code in Relation to Sampled Sytem here are many way to convert a continuou time function, { h( t) ; t [0, )} into a dicrete time function { h ( k) ; k {0,,, }}
More information4. Connectivity Connectivity Connectivity. Whitney's s connectivity theorem: (G) (G) (G) for special
4. Connectivity 4.. Connectivity Vertex-cut and vertex-connectivity Edge-cut and edge-connectivty Whitney' connectivity theorem: Further theorem for the relation of and graph 4.. The Menger Theorem and
More informationConvex Hulls of Curves Sam Burton
Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall
More informationLecture 10 Filtering: Applied Concepts
Lecture Filtering: Applied Concept In the previou two lecture, you have learned about finite-impule-repone (FIR) and infinite-impule-repone (IIR) filter. In thee lecture, we introduced the concept of filtering
More informationDimensional Analysis A Tool for Guiding Mathematical Calculations
Dimenional Analyi A Tool for Guiding Mathematical Calculation Dougla A. Kerr Iue 1 February 6, 2010 ABSTRACT AND INTRODUCTION In converting quantitie from one unit to another, we may know the applicable
More informationComparing Means: t-tests for Two Independent Samples
Comparing ean: t-tet for Two Independent Sample Independent-eaure Deign t-tet for Two Independent Sample Allow reearcher to evaluate the mean difference between two population uing data from two eparate
More informationGain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays
Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,
More informationLDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings
LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,
More informationBeta Burr XII OR Five Parameter Beta Lomax Distribution: Remarks and Characterizations
Marquette Univerity e-publication@marquette Mathematic, Statitic and Computer Science Faculty Reearch and Publication Mathematic, Statitic and Computer Science, Department of 6-1-2014 Beta Burr XII OR
More informationOn the Isomorphism of Fractional Factorial Designs 1
journal of complexity 17, 8697 (2001) doi:10.1006jcom.2000.0569, available online at http:www.idealibrary.com on On the Iomorphim of Fractional Factorial Deign 1 Chang-Xing Ma Department of Statitic, Nankai
More informationOptimal revenue management in two class pre-emptive delay dependent Markovian queues
Optimal revenue management in two cla pre-emptive delay dependent Markovian queue Manu K. Gupta, N. Hemachandra and J. Venkatewaran Indutrial Engineering and Operation Reearch, IIT Bombay March 15, 2015
More informationMemoryle Strategie in Concurrent Game with Reachability Objective Λ Krihnendu Chatterjee y Luca de Alfaro x Thoma A. Henzinger y;z y EECS, Univerity o
Memoryle Strategie in Concurrent Game with Reachability Objective Krihnendu Chatterjee, Luca de Alfaro and Thoma A. Henzinger Report No. UCB/CSD-5-1406 Augut 2005 Computer Science Diviion (EECS) Univerity
More informationEvolutionary Algorithms Based Fixed Order Robust Controller Design and Robustness Performance Analysis
Proceeding of 01 4th International Conference on Machine Learning and Computing IPCSIT vol. 5 (01) (01) IACSIT Pre, Singapore Evolutionary Algorithm Baed Fixed Order Robut Controller Deign and Robutne
More informationSERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lectures 41-48)
Chapter 5 SERIES COMPENSATION: VOLTAGE COMPENSATION USING DVR (Lecture 41-48) 5.1 Introduction Power ytem hould enure good quality of electric power upply, which mean voltage and current waveform hould
More informationUnavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes
European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication
More informationGNSS Solutions: What is the carrier phase measurement? How is it generated in GNSS receivers? Simply put, the carrier phase
GNSS Solution: Carrier phae and it meaurement for GNSS GNSS Solution i a regular column featuring quetion and anwer about technical apect of GNSS. Reader are invited to end their quetion to the columnit,
More informationNew bounds for Morse clusters
New bound for More cluter Tamá Vinkó Advanced Concept Team, European Space Agency, ESTEC Keplerlaan 1, 2201 AZ Noordwijk, The Netherland Tama.Vinko@ea.int and Arnold Neumaier Fakultät für Mathematik, Univerität
More informationA Study on Simulating Convolutional Codes and Turbo Codes
A Study on Simulating Convolutional Code and Turbo Code Final Report By Daniel Chang July 27, 2001 Advior: Dr. P. Kinman Executive Summary Thi project include the deign of imulation of everal convolutional
More informationSOME RESULTS ON INFINITE POWER TOWERS
NNTDM 16 2010) 3, 18-24 SOME RESULTS ON INFINITE POWER TOWERS Mladen Vailev - Miana 5, V. Hugo Str., Sofia 1124, Bulgaria E-mail:miana@abv.bg Abtract To my friend Kratyu Gumnerov In the paper the infinite
More informationEXTENDED STABILITY MARGINS ON CONTROLLER DESIGN FOR NONLINEAR INPUT DELAY SYSTEMS. Otto J. Roesch, Hubert Roth, Asif Iqbal
EXTENDED STABILITY MARGINS ON CONTROLLER DESIGN FOR NONLINEAR INPUT DELAY SYSTEMS Otto J. Roech, Hubert Roth, Aif Iqbal Intitute of Automatic Control Engineering Univerity Siegen, Germany {otto.roech,
More informationEfficient Heuristic Approach to Dominance Testing in CP-nets
Efficient Heuritic Approach to Dominance Teting in CP-net Minyi Li Swinburne Univerity of Technology myli@win.edu.au Quoc Bao Vo Swinburne Univerity of Technology BVO@win.edu.au Ryzard Kowalczyk Swinburne
More informationThe Secret Life of the ax + b Group
The Secret Life of the ax + b Group Linear function x ax + b are prominent if not ubiquitou in high chool mathematic, beginning in, or now before, Algebra I. In particular, they are prime exhibit in any
More informationThe machines in the exercise work as follows:
Tik-79.148 Spring 2001 Introduction to Theoretical Computer Science Tutorial 9 Solution to Demontration Exercie 4. Contructing a complex Turing machine can be very laboriou. With the help of machine chema
More informationSymmetric Determinantal Representation of Formulas and Weakly Skew Circuits
Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity
More informationarxiv: v3 [quant-ph] 23 Nov 2011
Generalized Bell Inequality Experiment and Computation arxiv:1108.4798v3 [quant-ph] 23 Nov 2011 Matty J. Hoban, 1, 2 Joel J. Wallman, 3 and Dan E. Browne 1 1 Department of Phyic and Atronomy, Univerity
More informationCHAPTER 6. Estimation
CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.
More informationOnline Parallel Scheduling of Non-uniform Tasks: Trading Failures for Energy
Online Parallel Scheduling of Non-uniform Tak: Trading Failure for Energy Antonio Fernández Anta a, Chryi Georgiou b, Dariuz R. Kowalki c, Elli Zavou a,d,1 a Intitute IMDEA Network b Univerity of Cypru
More information(b) Is the game below solvable by iterated strict dominance? Does it have a unique Nash equilibrium?
14.1 Final Exam Anwer all quetion. You have 3 hour in which to complete the exam. 1. (60 Minute 40 Point) Anwer each of the following ubquetion briefly. Pleae how your calculation and provide rough explanation
More informationSMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD
SMALL-SIGNAL STABILITY ASSESSMENT OF THE EUROPEAN POWER SYSTEM BASED ON ADVANCED NEURAL NETWORK METHOD S.P. Teeuwen, I. Erlich U. Bachmann Univerity of Duiburg, Germany Department of Electrical Power Sytem
More informationControl Systems Analysis and Design by the Root-Locus Method
6 Control Sytem Analyi and Deign by the Root-Locu Method 6 1 INTRODUCTION The baic characteritic of the tranient repone of a cloed-loop ytem i cloely related to the location of the cloed-loop pole. If
More informationBayesian-Based Decision Making for Object Search and Characterization
9 American Control Conference Hyatt Regency Riverfront, St. Loui, MO, USA June -, 9 WeC9. Bayeian-Baed Deciion Making for Object Search and Characterization Y. Wang and I. I. Huein Abtract Thi paper focue
More informationNonlinear Single-Particle Dynamics in High Energy Accelerators
Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction
More informationCHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS
CHAPTER 8 OBSERVER BASED REDUCED ORDER CONTROLLER DESIGN FOR LARGE SCALE LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.1 INTRODUCTION 8.2 REDUCED ORDER MODEL DESIGN FOR LINEAR DISCRETE-TIME CONTROL SYSTEMS 8.3
More informationEC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables
EC38/MN38 Probability and Some Statitic Yanni Pachalidi yannip@bu.edu, http://ionia.bu.edu/ Lecture 7 - Outline. Continuou Random Variable Dept. of Manufacturing Engineering Dept. of Electrical and Computer
More informationCONTROL SYSTEMS, ROBOTICS AND AUTOMATION Vol. VIII Decoupling Control - M. Fikar
DECOUPLING CONTROL M. Fikar Department of Proce Control, Faculty of Chemical and Food Technology, Slovak Univerity of Technology in Bratilava, Radlinkého 9, SK-812 37 Bratilava, Slovakia Keyword: Decoupling:
More informationMulticolor Sunflowers
Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of
More informationMolecular Dynamics Simulations of Nonequilibrium Effects Associated with Thermally Activated Exothermic Reactions
Original Paper orma, 5, 9 7, Molecular Dynamic Simulation of Nonequilibrium Effect ociated with Thermally ctivated Exothermic Reaction Jerzy GORECKI and Joanna Natalia GORECK Intitute of Phyical Chemitry,
More informationHORNSAT, Model Checking, Verication and Games * (Abstract For Category A) Sandeep K. Shukla Harry B. Hunt III Daniel J.
HORNSAT, Model Checking, Verication and Game * (Abtract For Category A) Sandeep K. Shukla Harry B. Hunt III Daniel J. Roenkrantz Department of Computer Science Univerity at Albany { State Univerity of
More informationPerformance Evaluation
Performance Evaluation 95 (206) 40 Content lit available at ScienceDirect Performance Evaluation journal homepage: www.elevier.com/locate/peva Optimal cheduling in call center with a callback option Benjamin
More informationQuestion 1 Equivalent Circuits
MAE 40 inear ircuit Fall 2007 Final Intruction ) Thi exam i open book You may ue whatever written material you chooe, including your cla note and textbook You may ue a hand calculator with no communication
More informationSecretary problems with competing employers
Secretary problem with competing employer Nicole Immorlica 1, Robert Kleinberg 2, and Mohammad Mahdian 1 1 Microoft Reearch, One Microoft Way, Redmond, WA. {nickle,mahdian}@microoft.com 2 UC Berkeley Computer
More informationUNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS
UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer
More informationMAE140 Linear Circuits Fall 2012 Final, December 13th
MAE40 Linear Circuit Fall 202 Final, December 3th Intruction. Thi exam i open book. You may ue whatever written material you chooe, including your cla note and textbook. You may ue a hand calculator with
More informationCDMA Signature Sequences with Low Peak-to-Average-Power Ratio via Alternating Projection
CDMA Signature Sequence with Low Peak-to-Average-Power Ratio via Alternating Projection Joel A Tropp Int for Comp Engr and Sci (ICES) The Univerity of Texa at Autin 1 Univerity Station C0200 Autin, TX
More informationALLOCATING BANDWIDTH FOR BURSTY CONNECTIONS
SIAM J. COMPUT. Vol. 30, No. 1, pp. 191 217 c 2000 Society for Indutrial and Applied Mathematic ALLOCATING BANDWIDTH FOR BURSTY CONNECTIONS JON KLEINBERG, YUVAL RABANI, AND ÉVA TARDOS Abtract. In thi paper,
More informationSuggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall
Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall
More informationCall Centers with a Postponed Callback Offer
Call Center with a Potponed Callback Offer Benjamin Legro, Sihan Ding, Rob Van Der Mei, Oualid Jouini To cite thi verion: Benjamin Legro, Sihan Ding, Rob Van Der Mei, Oualid Jouini. Call Center with a
More informationON MULTIPLE AND INFINITE LOG-CONCAVITY
ON MULTIPLE AND INFINITE LOG-CONCAVITY LUIS A. MEDINA AND ARMIN STRAUB Abtract. Following Boro Moll, a equence (a n) i m-log-concave if L j (a n) 0 for all j = 0,,..., m. Here, L i the operator defined
More informationMATEMATIK Datum: Tid: eftermiddag. A.Heintz Telefonvakt: Anders Martinsson Tel.:
MATEMATIK Datum: 20-08-25 Tid: eftermiddag GU, Chalmer Hjälpmedel: inga A.Heintz Telefonvakt: Ander Martinon Tel.: 073-07926. Löningar till tenta i ODE och matematik modellering, MMG5, MVE6. Define what
More informationJul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer
Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical
More information