Probabilistic and nondeterministic aspects of Anonymity 1
|
|
- Gwendoline Dawson
- 6 years ago
- Views:
Transcription
1 MFPS XX1 Preliminary Version Probabilisti and nondeterministi aspets of Anonymity 1 Catusia Palamidessi 2 INRIA and LIX Éole Polytehnique, Rue de Salay, Palaiseau Cedex, FRANCE Abstrat Anonymity means that the identity of the user performing a ertain ation is maintained seret. The protools for ensuring anonymity often use random mehanisms whih an be desribed probabilistially. The user, on the other hand, may be seleted either nondeterministially or probabilistially. We investigate various notions of anonymity, at different levels of strength, for both the ases of probabilisti and nondeterministi users. Key words: Anonymity, Probabilisti Automata, onditional probability. 1 Introdution Anonymity is the property of keeping seret the identity of the user performing a ertain ation. The need for anonymity may raise in a wide range of situations, like postings on eletroni forums, voting, delation, donations, and many others. The protools for ensuring anonymity often use random mehanisms whih an be desribed probabilistially. This is the ase, for example, of the Dining Cryptographers [3], Crowds [7], and Onion Routing [12]. In ontrast, we usually don t know anything about the users, so their behavior, and in partiular, the hoie of the user who performs the ation with respet to whih we want to ensure anonymity, should better be regarded as nondeterministi. (The same would hold for adversaries, although in this paper we do not onsider them.) The whole system onstituted by the protool and the users presents therefore both probabilisti and nondeterministi aspets. 1 This work has been partially supported by the Projet Rossignol of the ACI Séurité Informatique (Ministère de la reherhe et nouvelles tehnologies). 2 atusia@lix.polytehnique.fr This is a preliminary version. The final version will be published in Eletroni Notes in Theoretial Computer Siene URL:
2 Various formal definitions and frameworks for analyzing anonymity have been developed in literature. They an be lassified into approahes based on proess-aluli [9,8], epistemi logi [11,5], and funtion views [6]. From the point of view of the onepts of probability and nondeterminism, however, all these approahes are either purely nondeterministi (also known as possibilisti) or purely probabilisti. The purely nondeterministi approah in [9,8] is based on the so-alled priniple of onfusion : a system is anonymous if the set of the possible outomes is saturated with respet to the intended anonymous users, i.e. if one suh user an ause a ertain observable trae in one possible omputation, then there must be alternative omputations in whih eah other anonymous user an give rise to the same observable trae (modulo the identity of the anonymous users). The purely probabilisti proposals an be lassified under two different points of view: those whih fous on the probability of the users, and those whih fous on the effet that the observables have on the probability of the users. The distintion is subtle but fundamental. In the fist ase, anonymity holds when (an observer knows that) all users have the same probability of having performed the ation (fr. strong probabilisti anonymity in [5]). In the seond ase, it holds when the for any user i and any observable o the onditional probability that i has performed the ation, given the observable, is the same as the (a priory) probability that the user has performed the ation (fr. the informal notion used in [3], and the onditional probabilisti anonymity in [5]). The probabilisti approah also brings naturally to differentiate the notion of anonymity with respet to different levels of strength. Reiter and Robin [7] have proposed the following hierarhy: Beyond suspiion The atual user (i.e. the user that performed the ation) is not more likely (to have performed the ation) than every other user. Probable innoene The atual user has probability less than. Possible innoene There is a non trivial probability that another used ould have performed the ation. These notions were only given informally in [7], and it is unlear to us whether the authors had in mind the first or the seond of the points of view desribed above. On one hand, if we interpret the informal definitions literally, they orrespond to the first point of view. This is the interpretation given by Halpern and O Neill in [5]: they haraterize probable innoene and possible innoene with the notion of (probabilisti) α-anonymity, and beyond suspiion with their notion of strong probabilisti anonymity. On the other hand, the result of probable innoene proved in [7] for Crowds does not seem to fit with this interpretation, while it ould fit with a suitable weakening of the anonymity notion illustrated above under the seond perspetive (i.e. what Halpern and O Neill all onditional probabilisti anonymity). 2
3 In this work we assume that the users may be nondeterministi, i.e. that nothing may be known about the relative frequeny by whih eah user perform the anonymous ation. More preisely, the users an in priniple be totally unpreditable and hange intention every time, so that their behavior annot be thought of as probabilisti 3. The internal mehanisms of the systems, on the ontrary, like oin tossing in the dining philosophers, or the random seletion of a nearby node in Crowds, are supposed to exhibit a ertain regularity and obey a probabilisti distribution. Correspondingly, we explore a notion of probabilisti anonymity that fouses on the internal mehanism of the system, i.e. their non-leakage of probabilisti information, and it is in a sense independent from the users in ase they are nondeterministi. The ounterpart of our definition in the ase the users are probabilisti (with possibly unknown probabilities), an be shown to orrespond to a generalized version of Halpern and O Neill s onditional probabilisti anonymity, where generalized here means that the anonymity holds for any probability distribution to the users. This abstrat is based on the ongoing work reported in [1], [4] and [2]. 2 Nondeterminism and probability In our approah we onsider systems that an perform both probabilisti and nondeterministi hoie. Intuitively, a probabilisti hoie represents a set of alternative transitions, eah of them assoiated to a ertain probability of being seleted. The sum of all probabilities on the alternatives of the hoie must be 1, i.e. they form a probability distribution. Nondeterministi hoie is also a set of alternatives, but we have no information on how likely one alternative is seleted. There have been many models proposed in literature that ombine both nondeterministi and probabilisti hoie. One of the most general is the formalism of probabilisti automata proposed in [10]. We give here a brief and informal desription of it. A probabilisti automaton onsists in a set of states, and labeled transitions between them. For eah node, the outgoing transitions are partitioned in groups alled steps. Eah step represents a probabilisti hoie, while the hoie between the steps is nondeterministi. Figure 1 illustrates some examples of probabilisti automata. We represent a step by putting an ar aross the member transitions. For instane, in (a), 3 In the areas of onurreny theory there has been a long-standing disussion on whether nondetermistism an be thought of as a situation in whih the probabilities are unknown and an hange very time the experiment is repeated. Nowadays the prevailing opinion, whih we share, is that nondetermistism and probability are fundamentally different onepts. Furthermore, in the formalisms used in onurreny (for instane proess algebras) the differene is lear, as these two onepts (nondeterminism and unknown hanging probability) obey different laws. 3
4 s 2 a s 3 b s 1 s 1 s 1 a 2/3 1/3 s 4 s 5 b a b a b 1/3 1/6 a a s 6 s 7 s 8 (a) (b) () Fig. 1. Examples of probabilisti automata state s 1 has two steps, the first is a probabilisti hoie between two transitions with labels a and b, eah with probability. When there is only a transition in a step, like the one from state s 3 to state s 6, the probability is of ourse 1 and we omit it. In this paper, we use only a simplified kind of automaton, in whih from eah node we have either a probabilisti hoie or a nondeterministi hoie (more preisely, either one step or a set of singleton steps), like in (b). In the partiular ase that the hoies are all probabilisti, like in (), the automaton is alled fully probabilisti. Given an automaton M, we denote by etree(m) its unfolding, i.e. the tree of all possible exeutions of M (in Figure 1 the automata oinide with their unfolding beause there is no loop). If M is fully probabilisti, then eah exeution (maximal branh) of etree(m) has a probability obtained as the produt of the probability of the edges along the branh. In the finite ase, we an define a probability measure for eah set of exeutions, alled event, by summing up the probabilities of the elements 4. Given an event x, we will denote by p(x) the probability of x. For instane, let the event be the set of all omputations in whih ours. In () its probability is p() = 1/3 + 1/6 = 1/3. When nondeterminism is present, the probability an vary, depending on how we resolve the nondeterminism. In other words we need to onsider a funtion ς that, eah time there is a hoie between different steps, selets one of them. By pruning the non-seleted steps, we obtain a fully probabilisti exeution tree etree(m, ς) on whih we an define the probability as before. For historial reasons (i.e. sine nondeterminism typially arises from the parallel operator), the funtion ς is alled sheduler. It should then be lear that the probability of an event is relative to the partiular sheduler. We will denote by p ς (x) the probability of the event x under the sheduler ς. For example, onsider (a). We have two possible 4 In the infinite ase things are more ompliated: we annot define a probability measure for all sets of exeution, and we need to onsider as event spae the σ-field generated by the ones of etree(m). However, in this paper, we onsider only the finite ase. 4
5 shedulers determined by the hoie of the step in s 1. Under one sheduler, the probability of is. Under the other, it is 2/3 + 1/3 = 2/3. In (b) we have three possible shedulers under whih the probability of is 0, and 1, respetively. 3 Anonymity systems We model the anonymity protool as a probabilisti automaton M. The onept of anonymity is relative to the set of anonymous users and to what is visible to the observer. Hene, following [9,8] we lassify the ations of M into the three sets A, B and C as follows: A is the set of the anonymous ations A = {a(i) i I} where I is the set of the identities of the anonymous users and a is an injetive funtions from I to the set of ations, whih we all abstrat ation. We also all the pair (I, a) anonymous ation generator. B is the set of the observable ations. We will use b, b,...to denote the elements of this set. C is the set of the remaining ations (whih are unobservable). Note that the ations in A normally are not visible to the observer, or at least, not for the part that depends on the identity i. However, for the purpose of defining and verifying anonymity we model the elements of A as visible outomes of the system. Definition 3.1 An anonymity system is a tuple (M, I, a, B,Z,p), where M is a probabilisti automaton, (I, a) is an anonymous ation generator, B is a set of observable ations, Z is the set of all possible shedulers for M, and for every ς Z, p ς is the probability measure on the event spae generated by etree(m, ς). For simpliity, we assume the users to be the only possible soure of nondeterminism in the system. If they are probabilisti, then the system is fully probabilisti, hene Z is a singleton and we omit it. We introdue the following notation to represent the events of interest: a(i) : all the exeutions in etree(m, ς) ontaining the ation a(i); a : all the exeutions in etree(m, ς) ontaining an ation a(i) for an arbitrary i; o : all the exeutions in etree(m, ς) ontaining as their maximal sequene of observable ations the sequene o (where o is of the form b 1 b 2... b n for some b 1, b 2,...,b n B). We denote by O (observables) the set of all suh o s. We use the symbols, and to represent the union, the intersetion, and the omplement of events, respetively. 5
6 We wish to keep the notion of observables as general as possible, but we still need to make some assumptions on them. First, we want the observables to be disjoint events. Seond, they must over all possible outomes. Third, an observable o must indiate unambiguously whether a has taken plae or not, i.e. it either implies a, or it implies a. In set-theoreti terms it means that either o is a subset of a or of the omplement of a. Formally: Assumption 1 (on the observables) (i) ς Z. o 1, o 2 O. o 1 o 2 p ς (o 1 o 2 ) = p ς (o 1 ) + p ς (o 2 ) (ii) ς Z. p ς (O) = 1 (iii) ς Z. o O. (p ς (o a) = p ς (o)) p ς (o a) = p ς (o) Analogously, we need to make some assumption on the anonymous ations. We onsider first the onditions tailored for the nondeterministi users: eah sheduler determines ompletely whether an ation of the form a(i) takes plae or not, and in the positive ase, there is only one suh i. Formally: Assumption 2 (on the anonymous ations, for nondeterministi users) ς Z. p ς (a) = 0 ( i I. (p ς (a(i)) = 1 j I. j i p ς (a(j)) = 0)) We now onsider the ase in whih the users are fully probabilisti. The assumption on the anonymous ations in this ase is muh weaker: we only require that there be at most one user that performs a, i.e. a(i) and a(j) must be disjoint for i j. Formally: Assumption 3 (on the anonymous ations, for probabilisti users) i, j I. i j p(a(i) a(j)) = p(a(i)) + p(a(j)) 4 Strong probabilisti anonymity In this setion we reall the notion of strong anonymity proposed in [1]. Let us first assume that the users are nondeterministi. Intuitively, a system is strongly anonymous if, given two shedulers ς and ϑ that both hoose a (say a(i) and a(j), respetively), it is not possible to detet from the probabilisti measure of the observables whether the sheduler has been ς or ϑ (i.e. whether the seleted user was i or j). Definition 4.1 anonymous if A system (M, I, a, B,Z,p) with nondeterministi users is ς, ϑ Z. o O. p ς (a) = p ϑ (a) = 1 p ς (o) = p ϑ (o) The probabilisti ounterpart of Definition 4.1 an be formalized using the onept of onditional probability. Reall that, given two events x and y with p(y) > 0, the onditional probability of x given y, denoted by p(x y), is equal to p(x y)/p(y). 6
7 A system (M, I, a, B, p) with probabilisti users is anony- Definition 4.2 mous if i, j I. o O. (p(a(i)) > 0 p(a(j)) > 0) p(o a(i)) = p(o a(j)) The notions of anonymity illustrated so far fous on the probability of the observables. More preisely, it requires the probability of the observables to be independent from the seleted user. In [1] it was shown that Definition 4.2 is equivalent to the notion adopted impliitly in [3], and alled onditional anonymity in [5]. As illustrated in the introdution, the idea of this notion is that a system is anonymous if the observations do not hange the probability of the a(i) s. In other words, we may know the probability of a(i) by some means external to the system, but the system should not inrease our knowledge about it. A system (M, I, a, B, p) with probabilisti users is anony- Proposition 4.3 mous if i I. o O. p(o a) > 0 p(a(i) o) = p(a(i) a) The notions of strong anonymity proposed in this setion have been verified in [1] on the example of the Dining Cryptographers with perfetly fair oins. 4.1 Independene from the probability distribution of the users One important property of Definition 4.2 is that it is independent from the probability distribution of the users. Intuitively, this is due to the fat that the ondition of anonymity implies that p(o a(i)) = p(o)/p(a), hene it is independent from p(a(i)). Theorem 4.4 If (M, I, a, B,p) is anonymous (aording to Definition 4.2) then for any p whih differs from p only on the a(i) s, (M, I, a, B,p ) is anonymous. Also the haraterization of anonymity given in Proposition 4.3 is (obviously) independent from the probability distribution of the users. It should be remarked, however, that their orrespondene with Definition 4.2, and the property of independene from the probability of the users, only holds under the hypothesis that there is at most one agent performing a. (Assumption 3.) 5 Weak probabilisti anonymity The notion of anonymity proposed in previous setion is very strong as it imply the system to leak no information. In reality, some amount of probabilisti information may be revealed by the protool. Typial auses may be either the presene of attakers whih interfere with the normal exeution the protool, or some unavoidable imperfetion of the internal mehanisms, or may even 7
8 be inherent to the way the protool is designed. In any ase, the information leaked by the system an be used by an observer to infer the likeliness that the ation has been performed by a ertain user. In [4] we have proposed the following weak variants of Definition 4.1, Definition 4.2, and of the notion expressed in Proposition 4.3. Let us onsider first the ase of nondeterministi users: Definition 5.1 Given α [0, 1], a system (M, I, a, B, Z, p) with nondeterministi users is α-anonymous if max{ p ς (o) p ϑ (o) ς, ϑ Z, o O, p ς (o a) = p ς (o), p ϑ (o a) = p ϑ (o)} = α Intuitively, p ς (o) p ϑ (o) = α means that, whenever we observe o, we suspet that user i is more likely than user j to have performed the ation by an additive fator α (where i and j represent the users seleted by ς and ϑ, respetively). Let us now onsider the ase of probabilisti users. The weak version of Definition 4.2, is the following: Definition 5.2 Given α [0, 1], a system (M, I, a, B, p) with probabilisti users is α-anonymous if max{ p(o a(i)) p(o a(j)) i, j I, o O, p(a(i)) > 0, p(a(j)) > 0 } = α An alternative notion of weak anonymity for probabilisti users an be obtained by weakening the formula in Proposition 4.3. Definition 5.3 Given α [0, 1], a system (M, I, a, B, p) with probabilisti users is α-anonymous if max{ p(a(i) o) p(a(i) a) i I, o O, p(o a) > 0} = α Intuitively, p(a(i) o) p(a(i) a) = α means that, after observing o, the probability we attribute to i as the performer of the ation, has inreased by an additive fator α. Differently from their strong version, Definitions 5.2 and Definitions 5.3 are not equivalent. The notions of weak anonymity proposed in this setion have been tested in [4] on the example of the Dining Cryptographers with biased oins. In [2] it has been proved that a slight variant of Definitions 5.2 and 5.3 orrespond, with α =, to the property proved in [7] for the system Crowds (and alled, still in [7], probable innoene). Referenes [1] Mohit Bhargava and Catusia Palamidessi. Probabilisti anonymity. Tehnial report, INRIA Futurs and LIX, Submitted for publiation. 8
9 [2] Kostantinos Chatzikokolakis and Catusia Palamidessi. Probable innoene revisited. Tehnial report, INRIA Futurs and LIX, [3] David Chaum. The dining ryptographers problem: Unonditional sender and reipient untraeability. Journal of Cryptology, 1:65 75, [4] Yuxin Deng, Catusia Palamidessi, and Jun Pang. Weak probabilisti anonymity. Tehnial report, INRIA Futurs and LIX, Submitted for publiation. [5] Joseph Y. Halpern and Kevin R. O Neill. Anonymity and information hiding in multiagent systems. In Pro. of the 16th IEEE Computer Seurity Foundations Workshop, pages 75 88, [6] Domini Hughes and Vitaly Shmatikov. Information hiding, anonymity and privay: a modular approah. Journal of Computer Seurity, 12(1):3 36, [7] Mihael K. Reiter and Aviel D. Rubin. Crowds: anonymity for Web transations. ACM Transations on Information and System Seurity, 1(1):66 92, [8] Peter Y. Ryan and Steve Shneider. Modelling and Analysis of Seurity Protools. Addison-Wesley, [9] Steve Shneider and Abraham Sidiropoulos. CSP and anonymity. In Pro. of the European Symposium on Researh in Computer Seurity (ESORICS), volume 1146 of Leture Notes in Computer Siene, pages Springer- Verlag, [10] Roberto Segala and Nany Lynh. Probabilisti simulations for probabilisti proesses. Nordi Journal of Computing, 2(2): , An extended abstrat appeared in Proeedings of CONCUR 94, LNCS 836: [11] Paul F. Syverson and Stuart G. Stubblebine. Group prinipals and the formalization of anonymity. In World Congress on Formal Methods (1), pages , [12] P.F. Syverson, D.M. Goldshlag, and M.G. Reed. Anonymous onnetions and onion routing. In IEEE Symposium on Seurity and Privay, pages 44 54, Oakland, California,
Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationProbable Innocence Revisited
Probable Innocence Revisited Konstantinos Chatzikokolakis a, Catuscia Palamidessi a a INRIA Futurs and LIX, École Polytechnique Abstract In this paper we propose a formalization of probable innocence,
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationSINCE Zadeh s compositional rule of fuzzy inference
IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning
More informationIndian Institute of Technology Bombay. Department of Electrical Engineering. EE 325 Probability and Random Processes Lecture Notes 3 July 28, 2014
Indian Institute of Tehnology Bombay Department of Eletrial Engineering Handout 5 EE 325 Probability and Random Proesses Leture Notes 3 July 28, 2014 1 Axiomati Probability We have learned some paradoxes
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationMaximum Entropy and Exponential Families
Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It
More informationParallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret
Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationThe Effectiveness of the Linear Hull Effect
The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More informationON THE LEAST PRIMITIVE ROOT EXPRESSIBLE AS A SUM OF TWO SQUARES
#A55 INTEGERS 3 (203) ON THE LEAST PRIMITIVE ROOT EPRESSIBLE AS A SUM OF TWO SQUARES Christopher Ambrose Mathematishes Institut, Georg-August Universität Göttingen, Göttingen, Deutshland ambrose@uni-math.gwdg.de
More information23.1 Tuning controllers, in the large view Quoting from Section 16.7:
Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output
More informationAssessing the Performance of a BCI: A Task-Oriented Approach
Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,
More informationAfter the completion of this section the student should recall
Chapter I MTH FUNDMENTLS I. Sets, Numbers, Coordinates, Funtions ugust 30, 08 3 I. SETS, NUMERS, COORDINTES, FUNCTIONS Objetives: fter the ompletion of this setion the student should reall - the definition
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationPacking Plane Spanning Trees into a Point Set
Paking Plane Spanning Trees into a Point Set Ahmad Biniaz Alfredo Garía Abstrat Let P be a set of n points in the plane in general position. We show that at least n/3 plane spanning trees an be paked into
More informationLECTURE NOTES FOR , FALL 2004
LECTURE NOTES FOR 18.155, FALL 2004 83 12. Cone support and wavefront set In disussing the singular support of a tempered distibution above, notie that singsupp(u) = only implies that u C (R n ), not as
More informationMillennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationStructural Reconfiguration of Systems under Behavioral Adaptation
Strutural Reonfiguration of Systems under Behavioral Adaptation Carlos Canal a, Javier Cámara b, Gwen Salaün a Department of Computer Siene, University of Málaga, Spain b Department of Informatis Engineering,
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationCounting Idempotent Relations
Counting Idempotent Relations Beriht-Nr. 2008-15 Florian Kammüller ISSN 1436-9915 2 Abstrat This artile introdues and motivates idempotent relations. It summarizes haraterizations of idempotents and their
More informationSufficient Conditions for a Flexible Manufacturing System to be Deadlocked
Paper 0, INT 0 Suffiient Conditions for a Flexile Manufaturing System to e Deadloked Paul E Deering, PhD Department of Engineering Tehnology and Management Ohio University deering@ohioedu Astrat In reent
More informationLecture 3 - Lorentz Transformations
Leture - Lorentz Transformations A Puzzle... Example A ruler is positioned perpendiular to a wall. A stik of length L flies by at speed v. It travels in front of the ruler, so that it obsures part of the
More informationSensitivity analysis for linear optimization problem with fuzzy data in the objective function
Sensitivity analysis for linear optimization problem with fuzzy data in the objetive funtion Stephan Dempe, Tatiana Starostina May 5, 2004 Abstrat Linear programming problems with fuzzy oeffiients in the
More informationStability of alternate dual frames
Stability of alternate dual frames Ali Akbar Arefijamaal Abstrat. The stability of frames under perturbations, whih is important in appliations, is studied by many authors. It is worthwhile to onsider
More informationOrdered fields and the ultrafilter theorem
F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF
More informationEinstein s Three Mistakes in Special Relativity Revealed. Copyright Joseph A. Rybczyk
Einstein s Three Mistakes in Speial Relativity Revealed Copyright Joseph A. Rybzyk Abstrat When the evidene supported priniples of eletromagneti propagation are properly applied, the derived theory is
More informationAverage Rate Speed Scaling
Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.
More informationSensitivity Analysis in Markov Networks
Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores
More informationQuantum secret sharing without entanglement
Quantum seret sharing without entanglement Guo-Ping Guo, Guang-Can Guo Key Laboratory of Quantum Information, University of Siene and Tehnology of China, Chinese Aademy of Sienes, Hefei, Anhui, P.R.China,
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationArray Design for Superresolution Direction-Finding Algorithms
Array Design for Superresolution Diretion-Finding Algorithms Naushad Hussein Dowlut BEng, ACGI, AMIEE Athanassios Manikas PhD, DIC, AMIEE, MIEEE Department of Eletrial Eletroni Engineering Imperial College
More informationMeasuring & Inducing Neural Activity Using Extracellular Fields I: Inverse systems approach
Measuring & Induing Neural Ativity Using Extraellular Fields I: Inverse systems approah Keith Dillon Department of Eletrial and Computer Engineering University of California San Diego 9500 Gilman Dr. La
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationA Functional Representation of Fuzzy Preferences
Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationSome Properties on Nano Topology Induced by Graphs
AASCIT Journal of anosiene 2017; 3(4): 19-23 http://wwwaasitorg/journal/nanosiene ISS: 2381-1234 (Print); ISS: 2381-1242 (Online) Some Properties on ano Topology Indued by Graphs Arafa asef 1 Abd El Fattah
More informationRobust Recovery of Signals From a Structured Union of Subspaces
Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling
More informationThe Concept of Mass as Interfering Photons, and the Originating Mechanism of Gravitation D.T. Froedge
The Conept of Mass as Interfering Photons, and the Originating Mehanism of Gravitation D.T. Froedge V04 Formerly Auburn University Phys-dtfroedge@glasgow-ky.om Abstrat For most purposes in physis the onept
More informationNPTEL STRUCTURAL RELIABILITY
NTEL Course On STRUCTURL RELIBILITY Module # 02 Leture 2 Course Format: Web Instrutor: Dr. runasis Chakraborty Department of Civil Engineering Indian Institute of Tehnology Guwahati 2. Leture 02: Theory
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationJAST 2015 M.U.C. Women s College, Burdwan ISSN a peer reviewed multidisciplinary research journal Vol.-01, Issue- 01
JAST 05 M.U.C. Women s College, Burdwan ISSN 395-353 -a peer reviewed multidisiplinary researh journal Vol.-0, Issue- 0 On Type II Fuzzy Parameterized Soft Sets Pinaki Majumdar Department of Mathematis,
More informationA NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM
NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum
More informationChapter 3 Church-Turing Thesis. CS 341: Foundations of CS II
CS 341: Foundations of CS II Marvin K. Nakayama Computer Siene Department New Jersey Institute of Tehnology Newark, NJ 07102 CS 341: Chapter 3 3-2 Contents Turing Mahines Turing-reognizable Turing-deidable
More informationA Recursive Approach to the Kauffman Bracket
Applied Mathematis, 204, 5, 2746-2755 Published Online Otober 204 in SiRes http://wwwsirporg/journal/am http://ddoiorg/04236/am20457262 A Reursive Approah to the Kauffman Braet Abdul Rauf Nizami, Mobeen
More informationLecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.
Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these
More informationarxiv:physics/ v1 [physics.class-ph] 8 Aug 2003
arxiv:physis/0308036v1 [physis.lass-ph] 8 Aug 003 On the meaning of Lorentz ovariane Lszl E. Szab Theoretial Physis Researh Group of the Hungarian Aademy of Sienes Department of History and Philosophy
More informationChapter 2. Conditional Probability
Chapter. Conditional Probability The probabilities assigned to various events depend on what is known about the experimental situation when the assignment is made. For a partiular event A, we have used
More informationBäcklund Transformations: Some Old and New Perspectives
Bäklund Transformations: Some Old and New Perspetives C. J. Papahristou *, A. N. Magoulas ** * Department of Physial Sienes, Helleni Naval Aademy, Piraeus 18539, Greee E-mail: papahristou@snd.edu.gr **
More informationCoding for Random Projections and Approximate Near Neighbor Search
Coding for Random Projetions and Approximate Near Neighbor Searh Ping Li Department of Statistis & Biostatistis Department of Computer Siene Rutgers University Pisataay, NJ 8854, USA pingli@stat.rutgers.edu
More informationEstimating the probability law of the codelength as a function of the approximation error in image compression
Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using
More informationDerivation of Non-Einsteinian Relativistic Equations from Momentum Conservation Law
Asian Journal of Applied Siene and Engineering, Volue, No 1/13 ISSN 35-915X(p); 37-9584(e) Derivation of Non-Einsteinian Relativisti Equations fro Moentu Conservation Law M.O.G. Talukder Varendra University,
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This doument is downloaded from DR-NTU, Nanyang Tehnologial University Library, Singapore. Title Extrating Threshold Coneptual Strutures from Web Douments Author(s) Ciobanu, Gabriel; Horne, Ross; Vaideanu,
More informationUNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS. V. N. Matveev and O. V. Matvejev
UNCERTAINTY RELATIONS AS A CONSEQUENCE OF THE LORENTZ TRANSFORMATIONS V. N. Matveev and O. V. Matvejev Joint-Stok Company Sinerta Savanoriu pr., 159, Vilnius, LT-315, Lithuania E-mail: matwad@mail.ru Abstrat
More informationWeighted K-Nearest Neighbor Revisited
Weighted -Nearest Neighbor Revisited M. Biego University of Verona Verona, Italy Email: manuele.biego@univr.it M. Loog Delft University of Tehnology Delft, The Netherlands Email: m.loog@tudelft.nl Abstrat
More informationA Spatiotemporal Approach to Passive Sound Source Localization
A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,
More informationParticle-wave symmetry in Quantum Mechanics And Special Relativity Theory
Partile-wave symmetry in Quantum Mehanis And Speial Relativity Theory Author one: XiaoLin Li,Chongqing,China,hidebrain@hotmail.om Corresponding author: XiaoLin Li, Chongqing,China,hidebrain@hotmail.om
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,
More informationAharonov-Bohm effect. Dan Solomon.
Aharonov-Bohm effet. Dan Solomon. In the figure the magneti field is onfined to a solenoid of radius r 0 and is direted in the z- diretion, out of the paper. The solenoid is surrounded by a barrier that
More information3 Tidal systems modelling: ASMITA model
3 Tidal systems modelling: ASMITA model 3.1 Introdution For many pratial appliations, simulation and predition of oastal behaviour (morphologial development of shorefae, beahes and dunes) at a ertain level
More informationA model for measurement of the states in a coupled-dot qubit
A model for measurement of the states in a oupled-dot qubit H B Sun and H M Wiseman Centre for Quantum Computer Tehnology Centre for Quantum Dynamis Griffith University Brisbane 4 QLD Australia E-mail:
More informationConvergence of reinforcement learning with general function approximators
Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu
More informationMOLECULAR ORBITAL THEORY- PART I
5.6 Physial Chemistry Leture #24-25 MOLECULAR ORBITAL THEORY- PART I At this point, we have nearly ompleted our rash-ourse introdution to quantum mehanis and we re finally ready to deal with moleules.
More informationOn Component Order Edge Reliability and the Existence of Uniformly Most Reliable Unicycles
Daniel Gross, Lakshmi Iswara, L. William Kazmierzak, Kristi Luttrell, John T. Saoman, Charles Suffel On Component Order Edge Reliability and the Existene of Uniformly Most Reliable Uniyles DANIEL GROSS
More informationSearching All Approximate Covers and Their Distance using Finite Automata
Searhing All Approximate Covers and Their Distane using Finite Automata Ondřej Guth, Bořivoj Melihar, and Miroslav Balík České vysoké učení tehniké v Praze, Praha, CZ, {gutho1,melihar,alikm}@fel.vut.z
More informationTaste for variety and optimum product diversity in an open economy
Taste for variety and optimum produt diversity in an open eonomy Javier Coto-Martínez City University Paul Levine University of Surrey Otober 0, 005 María D.C. Garía-Alonso University of Kent Abstrat We
More informationarxiv: v2 [cs.dm] 4 May 2018
Disrete Morse theory for the ollapsibility of supremum setions Balthazar Bauer INRIA, DIENS, PSL researh, CNRS, Paris, Frane Luas Isenmann LIRMM, Université de Montpellier, CNRS, Montpellier, Frane arxiv:1803.09577v2
More informationOptimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach
Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)
More informationProduct Policy in Markets with Word-of-Mouth Communication. Technical Appendix
rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,
More informationSensor management for PRF selection in the track-before-detect context
Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationOblivious Transfer Is Symmetric
Oblivious Transfer Is Symmetri Stefan Wolf and Jürg Wullshleger Computer Siene Department, ETH Zürih, Switzerland {wolf, wjuerg}@inf.ethz.h bstrat. We show that oblivious transfer of bits from to an be
More informationOn the density of languages representing finite set partitions
On the density of languages representing finite set partitions Nelma Moreira Rogério Reis Tehnial Report Series: DCC-04-07 Departamento de Ciênia de Computadores Fauldade de Ciênias & Laboratório de Inteligênia
More informationOn the Quantum Theory of Radiation.
Physikalishe Zeitshrift, Band 18, Seite 121-128 1917) On the Quantum Theory of Radiation. Albert Einstein The formal similarity between the hromati distribution urve for thermal radiation and the Maxwell
More informationOn the Licensing of Innovations under Strategic Delegation
On the Liensing of Innovations under Strategi Delegation Judy Hsu Institute of Finanial Management Nanhua University Taiwan and X. Henry Wang Department of Eonomis University of Missouri USA Abstrat This
More informationThe Hanging Chain. John McCuan. January 19, 2006
The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a
More informationMaxmin expected utility through statewise combinations
Eonomis Letters 66 (2000) 49 54 www.elsevier.om/ loate/ eonbase Maxmin expeted utility through statewise ombinations Ramon Casadesus-Masanell, Peter Klibanoff, Emre Ozdenoren* Department of Managerial
More informationc-perfect Hashing Schemes for Binary Trees, with Applications to Parallel Memories
-Perfet Hashing Shemes for Binary Trees, with Appliations to Parallel Memories (Extended Abstrat Gennaro Cordaso 1, Alberto Negro 1, Vittorio Sarano 1, and Arnold L.Rosenberg 2 1 Dipartimento di Informatia
More informationThe universal model of error of active power measuring channel
7 th Symposium EKO TC 4 3 rd Symposium EKO TC 9 and 5 th WADC Workshop nstrumentation for the CT Era Sept. 8-2 Kosie Slovakia The universal model of error of ative power measuring hannel Boris Stogny Evgeny
More informationA Logic of Local Graph Shapes
CTIT Tehnial Report TR CTIT 03 35, University of Twente, 2003 A Logi of Loal Graph Shapes Arend Rensink Department of Computer Siene, University of Twente P.O.Box 27, 7500 AE, The Netherlands rensink@s.utwente.nl
More informationVolume 29, Issue 3. On the definition of nonessentiality. Udo Ebert University of Oldenburg
Volume 9, Issue 3 On the definition of nonessentiality Udo Ebert University of Oldenburg Abstrat Nonessentiality of a good is often used in welfare eonomis, ost-benefit analysis and applied work. Various
More informationQCLAS Sensor for Purity Monitoring in Medical Gas Supply Lines
DOI.56/sensoren6/P3. QLAS Sensor for Purity Monitoring in Medial Gas Supply Lines Henrik Zimmermann, Mathias Wiese, Alessandro Ragnoni neoplas ontrol GmbH, Walther-Rathenau-Str. 49a, 7489 Greifswald, Germany
More informationONLINE APPENDICES for Cost-Effective Quality Assurance in Crowd Labeling
ONLINE APPENDICES for Cost-Effetive Quality Assurane in Crowd Labeling Jing Wang Shool of Business and Management Hong Kong University of Siene and Tehnology Clear Water Bay Kowloon Hong Kong jwang@usthk
More informationSome GIS Topological Concepts via Neutrosophic Crisp Set Theory
New Trends in Neutrosophi Theory and Appliations A.A.SALAMA, I.M.HANAFY, HEWAYDA ELGHAWALBY 3, M.S.DABASH 4,2,4 Department of Mathematis and Computer Siene, Faulty of Sienes, Port Said University, Egypt.
More informationDiscrete Bessel functions and partial difference equations
Disrete Bessel funtions and partial differene equations Antonín Slavík Charles University, Faulty of Mathematis and Physis, Sokolovská 83, 186 75 Praha 8, Czeh Republi E-mail: slavik@karlin.mff.uni.z Abstrat
More informationCOMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION
4 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES COMBINED PROBE FOR MACH NUMBER, TEMPERATURE AND INCIDENCE INDICATION Jiri Nozika*, Josef Adame*, Daniel Hanus** *Department of Fluid Dynamis and
More informationWhere as discussed previously we interpret solutions to this partial differential equation in the weak sense: b
Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential
More informationModeling of discrete/continuous optimization problems: characterization and formulation of disjunctions and their relaxations
Computers and Chemial Engineering (00) 4/448 www.elsevier.om/loate/omphemeng Modeling of disrete/ontinuous optimization problems: haraterization and formulation of disjuntions and their relaxations Aldo
More informationGeneral Equilibrium. What happens to cause a reaction to come to equilibrium?
General Equilibrium Chemial Equilibrium Most hemial reations that are enountered are reversible. In other words, they go fairly easily in either the forward or reverse diretions. The thing to remember
More informationRESEARCH ON RANDOM FOURIER WAVE-NUMBER SPECTRUM OF FLUCTUATING WIND SPEED
The Seventh Asia-Paifi Conferene on Wind Engineering, November 8-1, 9, Taipei, Taiwan RESEARCH ON RANDOM FORIER WAVE-NMBER SPECTRM OF FLCTATING WIND SPEED Qi Yan 1, Jie Li 1 Ph D. andidate, Department
More informationREFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS. 1. Introduction
Version of 5/2/2003 To appear in Advanes in Applied Mathematis REFINED UPPER BOUNDS FOR THE LINEAR DIOPHANTINE PROBLEM OF FROBENIUS MATTHIAS BECK AND SHELEMYAHU ZACKS Abstrat We study the Frobenius problem:
More informationNormative and descriptive approaches to multiattribute decision making
De. 009, Volume 8, No. (Serial No.78) China-USA Business Review, ISSN 57-54, USA Normative and desriptive approahes to multiattribute deision making Milan Terek (Department of Statistis, University of
More informationMAC Calculus II Summer All you need to know on partial fractions and more
MC -75-Calulus II Summer 00 ll you need to know on partial frations and more What are partial frations? following forms:.... where, α are onstants. Partial frations are frations of one of the + α, ( +
More informationFINITE WORD LENGTH EFFECTS IN DSP
FINITE WORD LENGTH EFFECTS IN DSP PREPARED BY GUIDED BY Snehal Gor Dr. Srianth T. ABSTRACT We now that omputers store numbers not with infinite preision but rather in some approximation that an be paed
More informationI F I G R e s e a r c h R e p o r t. Minimal and Hyper-Minimal Biautomata. IFIG Research Report 1401 March Institut für Informatik
I F I G R e s e a r h R e p o r t Institut für Informatik Minimal and Hyper-Minimal Biautomata Markus Holzer Seastian Jakoi IFIG Researh Report 1401 Marh 2014 Institut für Informatik JLU Gießen Arndtstraße
More informationarxiv:gr-qc/ v2 6 Feb 2004
Hubble Red Shift and the Anomalous Aeleration of Pioneer 0 and arxiv:gr-q/0402024v2 6 Feb 2004 Kostadin Trenčevski Faulty of Natural Sienes and Mathematis, P.O.Box 62, 000 Skopje, Maedonia Abstrat It this
More information(q) -convergence. Comenius University, Bratislava, Slovakia
Annales Mathematiae et Informatiae 38 (2011) pp. 27 36 http://ami.ektf.hu On I (q) -onvergene J. Gogola a, M. Mačaj b, T. Visnyai b a University of Eonomis, Bratislava, Slovakia e-mail: gogola@euba.sk
More informationELECTROMAGNETIC WAVES WITH NONLINEAR DISPERSION LAW. P. М. Меdnis
ELECTROMAGNETIC WAVES WITH NONLINEAR DISPERSION LAW P. М. Меdnis Novosibirs State Pedagogial University, Chair of the General and Theoretial Physis, Russia, 636, Novosibirs,Viljujsy, 8 e-mail: pmednis@inbox.ru
More informationChapter 26 Lecture Notes
Chapter 26 Leture Notes Physis 2424 - Strauss Formulas: t = t0 1 v L = L0 1 v m = m0 1 v E = m 0 2 + KE = m 2 KE = m 2 -m 0 2 mv 0 p= mv = 1 v E 2 = p 2 2 + m 2 0 4 v + u u = 2 1 + vu There were two revolutions
More information). In accordance with the Lorentz transformations for the space-time coordinates of the same event, the space coordinates become
Relativity and quantum mehanis: Jorgensen 1 revisited 1. Introdution Bernhard Rothenstein, Politehnia University of Timisoara, Physis Department, Timisoara, Romania. brothenstein@gmail.om Abstrat. We first
More information