Application of Belief Propagation to Trust and Reputation Management

Size: px
Start display at page:

Download "Application of Belief Propagation to Trust and Reputation Management"

Transcription

1 Appliction of Belief Propgtion to Trust nd Reputtion Mngement Ermn Aydy School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: Frmrz Feri School of Electricl nd Comp. Eng. Georgi Institute of Technology Atlnt, GA 333, USA Emil: Abstrct This pper introduces the first ppliction of Belief Propgtion (BP) in reputtion systems. We view the reputtion mngement s n inference problem, nd hence, describe the reputtion mngement problem s computing mrginl lielihood distributions from complicted globl functions of mny vribles. However, we observe tht computing the mrginl probbility functions of the reputtion vribles is computtionlly prohibitive for lrge scle reputtion systems. Therefore, we propose to utilize the BP lgorithm to efficiently (i.e., in liner complexity) compute these mrginl probbility distributions; leding to fully itertive probbilistic nd BP-bsed pproch (referred to s BP-ITRM). BP-ITRM describes the reputtion system on fctor grph, using which we cn obtin qulittive representtion of how the service providers (sellers) nd consumers (buyers) re relted. Further, by using such grph representtion, we compute the mrginl probbility distribution functions of the vribles representing the globl reputtion vlues vi n itertive messge pssing lgorithm. We show tht BP-ITRM significntly outperforms the well-nown nd commonly used reputtion mngement schemes such s the Averging Scheme, Byesin Approch nd Cluster Filtering in the presence of ttcers. Further, its complexity is liner in the number of service providers nd consumers, fr exceeding the efficiency of other schemes. I. INTRODUCTION Trust nd Reputtion re crucil requirements for most environments wherein entities prticipte in vrious trnsctions nd protocols mong ech other. The recipient of the service often hs insufficient informtion bout the service qulity of the service provider before the trnsction. Hence, the service recipient should te prior ris before receiving the ctul service. This ris puts the recipient into n unprotected position since he hs no opportunity to try the service before he receives it. This problem gives rise to the use of reputtion systems in which reputtions re determined by rules tht evlute the evidence generted by the pst behvior of n entity within protocol. Hence, fter ech trnsction, prty who receives the service (referred to s the rter) provides (to the centrl uthority) its report bout the qulity of the service provided for tht trnsction. The centrl uthority collects the reports nd updtes the reputtions of the service providers. Reputtion systems hve found widespred doption in online communities, web services, d-hoc networs, PP computing, nd e-commerce. Reputtion mngement systems re subect to vrious mnipultions, lunched by the mlicious prticipnts. Thus, the success of reputtion scheme depends on the robustness of the mechnism to ccurtely evlute the service providers service qulities (i.e., reputtions) nd the trustworthiness of the rters bsed on their reports bout the service providers. Further, the emergence of lrge-scle online services nd networs clls for efficient nd sclble lgorithms to solve for the reputtion mngement problem. Hence, there is need to develop relible, sclble nd dependble reputtion schemes tht would lso be resilient to vrious wys reputtion system cn be ttced. In this wor, for the first time, we view the reputtion mngement problem s n inference problem nd describe the reputtion mngement problem s computing mrginl lielihood distributions from complicted globl functions of mny vribles. To solve this problem whose complexity grows exponentilly, we resort to use Belief Propgtion (BP) [1] whose computtionl efficiency (i.e., liner in the number of service providers or consumers) is driven by exploring the wy in which the globl functions fctors into product of simpler locl functions. Thus, we introduce the Belief Propgtion bsed Itertive Trust nd Reputtion Mngement scheme (BP-ITRM). The wor is inspired by erlier wor on grphbsed itertive probbilistic decoding of low-density pritychec codes [], the most powerful prcticlly decodble errorcontrol codes nown. We believe tht the significnt benefits offered by the BP lgorithms cn be tpped in to benefit the field of reputtion systems. In BP-ITRM, the sellers (i.e., service providers) nd buyers (i.e., consumers or rters) re represented vi fctor grph on which they re rrnged s two sets of vrible nd fctor nodes tht re connected vi some edges. The reputtion vlues of the service providers cn be computed by messge pssing between nodes in the grph. In ech itertion of the lgorithm, ll the vrible vertices (service providers) nd subsequently ll the fctor vertices (the rters) pss new messges to their neighbors until convergence. We show tht the proposed itertive scheme is relible (in filtering out mlicious/unrelible rtings) while being computtionlly efficient (i.e., liner in the number of vribles). Thus, it cn be used s n effective nd sclble reputtion system in mny pplictions such s online services. The rest of this pper is orgnized s follows. In the rest of this section, we summrize the relted wor. In Section II, we describe the proposed BP-ITRM in detil. Next, in Section III, we evlute BP-ITRM vi computer simultions nd compre BP-ITRM with the existing nd commonly used reputtion mngement schemes. Further, we nlyze BP-ITRM using mthemticl model for the users. Finlly, in Section IV, we conclude our pper. A. Relted Wor Severl wors in the literture hve focused on building reputtion-mngement mechnisms [3]. The most fmous

2 nd primitive reputtion system is the one tht is used in eby. Other well-nown web sites such s Amzon, Epinions, nd AllExperts use more dvnced reputtion mechnism thn eby. Their reputtion mechnisms mostly compute the weighted verge of the rtings received for product (or peer) to evlute the reputtion of product (or peer). Hence, these schemes re vulnerble to collbortive ttcs by mlicious peers. Use of the Byesin Approch is lso proposed in [4]. Finlly, [5] proposed to use the Cluster Filtering method to distinguish between the relible nd unrelible rters. As we will illustrte vi computer simultions, ll existing methods re vulnerble to sophisticted ttcs such s RepTrp [6] since none of these schemes re designed considering the noise nd the incomplete informtion in the system. Inspired by the erlier wor on itertive decoding of error-control codes in the presence of stopping sets, we developed n lgebric itertive lgorithm for reputtion mngement [7] nd dversry detection [8]. Here, we propose new scheme bsed on the ey observtion tht the reputtion mngement problem cn be formulted s solving for mrginl lielihood functions of mny vribles by using the BP lgorithm. As we will illustrte, comprison with the existing schemes suggests tht the proposed BP-ITRM hs superior performnce (i.e., ccurcy, sclbility nd robustness ginst ttcs). II. BELIEF PROPAGATION BASED ITERATIVE TRUST AND REPUTATION MANAGEMENT In the reputtion mngement problem, we wish to me sttisticl inference bout the reputtions of service providers bsed on pst observtions. Tht is, given the pst dt evidence, wht is the lielihood (probbility) of the reputtion vlues being good or bd? Here, the interprettion of probbility is Byesin one. We formulte this problem s finding the mrginl probbility distributions problem. Unfortuntely, computing such probbility distributions is computtionlly prohibitive for lrge-scle systems. However, the proposed lgorithm (referred to s BP-ITRM) shows tht this problem cn be solved, fortuntely, by pplying the Belief Propgtion (BP) lgorithm (in liner complexity). We ssume two different sets in the reputtion system: i) the set of service providers, S, nd ii) the set of service consumers (rters), U. We note tht these two sets re not necessrily disoint. Trnsctions occur between service providers nd consumers, nd consumers (rters) provide feedbcs in the form of rtings bout service providers fter ech trnsction. As in every reputtion mngement mechnism, we hve two min gols: 1. computing the service qulity (reputtion) of the peers who provide service (henceforth referred to s Service Providers or SPs) by using the feedbcs from the peers who used the service (referred to s the rters), nd. determining the trustworthiness of the rters by nlyzing their feedbc bout SPs. Let G be the reputtion vlue of the SP ( S) nd T i be the rting tht the rter i (i U) reports bout the SP ( S), whenever trnsction is completed between the two peers. Moreover, let R i denote the trustworthiness of the peer i (i U) s rter. In other words, R i represents the mount of confidence tht the reputtion system hs bout the correctness of ny feedbc/rting provided by the rter i. We ssume there re u rters nd s SPs in the system (i.e., U = u nd S = s). We let G = {G : S} nd R = {R i : i U} be the collection of vribles representing the reputtions of the SPs nd the trustworthiness vlues of the rters, respectively. Further, let T be the s u SP-rter mtrix tht stores the rting vlues (T i ), nd T i be the set of rtings provided by the rter i. For simplicity of presenttion, we ssume tht the rting vlues re from the set Υ = {,1}. The extension in which rting vlues cn te ny rel number cn be developed similrly. The reputtion mngement problem cn be viewed s finding the mrginl probbility distributions of ech vrible in G, given the observed dt (i.e., evidence). There re s mrginl probbility functions, p(g T,R), ech of which is ssocited with vrible G ; the reputtion vlue of SP. We formulte the problem by considering the globl function p(g T, R), which is the oint probbility distribution function of the vribles in G given the rting mtrix nd the trustworthiness vlues of the rters. Then, clerly, ech mrginl probbility function p(g T,R) my be obtined s follows 1 : p(g T,R) = p(g T,R). (1) G\{G } Unfortuntely, the number of terms in (1) grows exponentilly with the number of vribles, ming it infesible for lrge-scle systems. However, we propose to fctorize (1) to locl functions f i using fctor grph nd utilize the BP lgorithm to clculte the mrginl probbility distributions in liner complexity. A fctor grph is biprtite grph contining two sets of nodes (corresponding to vribles nd fctors) nd edges incident between two sets. Following [9], we form fctor grph by setting vrible node for ech vrible G, fctor node for ech function f i, nd n edge connecting vrible node to the fctor node i if nd only if G is n rgument of f i. T m b n c T nc Fig. 1: Fctor grph between the SPs nd the rters. Therefore, we rrnge the collection of the rters nd the SPs together with their ssocited reltions (i.e., the rtings of the SPs by the rters) s biprtite (or fctor) grph, s in Fig. 1. In this representtion, ech rter peer corresponds to fctor node in the grph, shown s squre. Ech SP is represented by vrible node shown s hexgon in the grph. Ech report/rting is represented by n edge from the fctor node to the vrible node. Hence, if rter i (i U) hs report bout the SP ( S), we plce n edge with vlue T i from the fctor node i to the vrible node representing the SP. Next, we ssume tht the globl function p(g T, R) fctors into products of severl locl functions, ech hving subset of vribles from G s rguments s follows: p(g T,R) = 1 f i (G i,t i,r i ), () Z i U where Z is the normliztion constnt nd G i is subset of G. Hence, in the grph representtion of Fig. 1, ech fctor node is ssocited with locl function nd ech locl function f i represents the probbility distributions of its rguments 1 The nottion G\{G } implies ll vribles in G except G.

3 given the trustworthiness vlue nd the existing rtings of the ssocited rter. We now introduce the messges between the fctor nd the vrible nodes to compute the mrginl distributions using BP. To tht end, we choose n rbitrry fctor grph s in Fig. 1 nd describe messge exchnges between rter nd SP. We represent the set of neighbors of the vrible node (SP) nd the fctor node (rter) s N nd N, respectively. Further, let Ξ = N \{} nd = N \{}. The BP lgorithm itertively exchnges the probbilistic messges between the fctor nd the vrible nodes in Fig. 1, updting the degree of beliefs on the reputtion vlues of the SPs s well s the confidence of the rters on their rtings (i.e., trustworthiness vlues) t ech step, until convergence. Let G (ν) = {G (ν) : S} be the collection of vribles representing the vlues of the vrible nodes t the itertion ν of the lgorithm. We denote the messges from the vrible nodes to the fctor nodes nd from the fctor nodes to the vrible nodes s µ nd λ, respectively. The messge µ (ν) (G(ν) ) denotes the probbility of G (ν) = l, l {,1}, t the ν th itertion. On the other hnd, (G(ν) ) denotes the probbility tht G (ν) = l, for l {,1}, t the ν th itertion given T nd R. The messge from the fctor node to the vrible node t the ν th itertion is formed using the principles of the BP s (G(ν) ) = f (G,T,R (ν 1) ) µ (ν 1) x (G(ν 1) x ), G (ν 1) \{G (ν 1) } x (3) where G is the set of vrible nodes which re rguments of the locl function f t the fctor node. Further, R (ν 1) (the trustworthiness of rter clculted t the end of (ν 1) th itertion) is vlue between zero nd one nd cn be clculted s follows: R (ν 1) = 1 1 N i N x {,1} T i x µ (ν 1) i (x). (4) The bove eqution cn be interpreted s one minus the verge inconsistency of rter clculted using the messges it received from its neighbors. Using (3), it cn be shown tht (G(ν) ) p(g (ν) T,R (ν 1) ), where p(g (ν) T,R (ν 1) ) = [ (R (ν 1) [ 1 R (ν 1) + 1 R(ν 1) T +(R (ν 1) )T + 1 R(ν 1) ] (1 T ) G (ν) R(ν 1) ] )(1 T ) (1 G (ν) ). (5) This resembles the belief/pleusbility concept of the Dempster- Shfer Theory [1]. Given T = 1, R (ν 1) cn be considered s the belief of the th rter tht the G (ν) vlue is one (t the ν th itertion). In other words, in the eyes of rter, the G (ν) vlue is equl to one with probbility R (ν 1). Thus, (1 R (ν 1) ) corresponds to the uncertinty in the belief of rter. In order to remove this uncertinty nd express p(g (ν) T,R (ν 1) ) s the probbilities tht G (ν) is zero nd Neighbors of SP re the set of rters who rted the SP while neighbors of rter re the SPs whom it rted. one, we distribute the uncertinty uniformly between two outcomes (one nd zero). Hence, in the eyes of the th rter, G (ν) vlue is equl to one with probbility (R (ν 1) +(1 R (ν 1) )/), nd zero with probbility ((1 R (ν 1) )/). We note tht similr sttement holds for the cse when T =. The bove computtion must be performed for every neighbors of ech fctor nodes. This finishes the first hlf of the ν th itertion. During the second hlf of the ν th itertion, the vrible nodes generte their messges (µ) nd send to their neighbors. Vrible node forms µ (ν) (G(ν) ) by multiplying ll informtion it receives from its neighbors excluding the fctor node. Hence, the messge from vrible node to the fctor node t the ν th itertion is given by µ (ν) (G(ν) ) = 1 i (h) i Ξ h {,1} i Ξ i (G(ν) ) (6) This computtion is repeted for every neighbors of ech vrible node. The lgorithm proceeds to the next itertion in the sme wy s the ν th itertion. We note tht the itertive lgorithm strts its first itertion by computing λ (1) (G(1) ) in (3). However, insted of clculting in (4), the trustworthiness vlue R from the previous execution of BP-ITRM is used s initil vlues in (5). The itertions stop when ll vribles in G converge. Therefore, t the end of ech itertion, the reputtions re clculted for ech SP. To clculte the reputtion vlue G (ν), we first compute µ (ν) (G (ν) then we set G (ν) = 1 i= iµ(ν) ) using (6) but replcing Ξ with N, nd (i). III. EVALUATION OF BP-ITRM Here, we wish to evlute the proposed BP-ITRM using mthemticl model for the users. We consider slotted time throughout this discussion. For ech time-slot (or epoch), the itertive reputtion lgorithm is executed using the input prmeters R nd T to output the reputtion vlues fter convergence. We ssumed tht the rting vlues re either or 1. We let Ĝ denote the ctul vlue of the reputtion of the SP ( S), where Ĝ {,1} (1 represents good service qulity). Further, the qulity of ech service provider remins unchnged during time-slots. Rtings generted by the non-mlicious rters re uniformly distributed mong the SPs (i.e., their rtings/edges in the grph representtion re distributed uniformly mong SPs). We lso ssume the rting r h (provided by non-mlicious rter) is rndom vrible with Bernoulli distribution, where Pr(r h = Ĝ ) = p c nd Pr(r h Ĝ) = (1 p c). To fcilitte future references, frequently used nottions re listed in Tble I. U M : The set of mlicious rters U R: The set of non-mlicious rters r h : Report (rting) given by non-mlicious rter r m: Report (rting) given by mlicious rter d: Totl number of newly generted rtings, per time-slot, per non-mlicious rter b: Totl number of newly generted rtings, per time-slot, per mlicious rter TABLE I: Nottions nd definitions. A. Mlicious User Model We consider two mor ttcs tht re common for ny reputtion mngement mechnisms: Bd mouthing: Mlicious rters collude nd ttc the service providers with the highest reputtion by giving low rtings

4 MAE ~ W=15% W=1% W=35% W=% W=4% W=3% W=5% Fig. : MAE performnce of BP-ITRM versus time when W of the existing rters re mlicious in RepTrp [6]. Avg. trustworthiness of mlicious rters.7.6 W=1% W=% W=3% Fig. 3: Averge trustworthiness of mlicious rters versus time for BP-ITRM when W of the existing rters re mlicious in RepTrp [6]. MAE BP ITRM ITRM Cluster Filtering Averging Scheme Byesin Approch Fig. 4: MAE performnce of vrious schemes when 3% of the existing rters become mlicious in RepTrp [6]. in order to undermine them. It is lso noted tht in ddition to the mlicious peers, in some pplictions, bd mouthing my be originted by group of selfish peers who ttempt to ween high-reputtion SPs in the hope of improving their own chnces s providers. Bllot stuffing: Mlicious rters collude to increse the reputtion vlues of peers with low reputtions. In some pplictions, this could be mounted by group of selfish consumers ttempting to fvor their llies. We me the following ssumptions for modeling the dversry which is lso nown s the RepTrp ttc [6]. RepTrp is believed to be strong ttc ginst the reputtion mngement system. We ssumed tht the mlicious rters initite bd mouthing 3. Further, ll the mlicious rters collude nd ttc the sme subset Γ of SPs in ech time-slot (which represents the strongest ttc), by rting those SPs s r m =. In other words, we denote by Γ the set of size b in which every victim SP hs one edge from ech of the mlicious rters. The subset Γ is chosen to include those SPs who hve the highest reputtion vlues but received the lowest number of rtings from the non-mlicious rters (ssuming tht the ttcers hve this informtion). To the dvntge of mlicious rters, we ssumed tht totl of T time-slots hd pssed since the initiliztion of the system nd frction of the existing rters chnge behvior nd become mlicious fter T time-slots. In other words, mlicious rters behved lie relible rters nd incresed their trustworthiness vlues before mounting their ttcs t the (T + 1) th time-slot. We will evlute the performnce for the time-slot (T + 1). B. Simultions We compred the performnce of BP-ITRM with three wellnown nd commonly used reputtion mngement schemes: 1) The Averging Scheme (which is widely used in eby or Amzon), ) Byesin Approch [4], nd 3) Cluster Filtering [5]. Further, we compred BP-ITRM with our previous method [7] (referred to s ITRM). We ssumed tht d (in Tble I) is rndom vrible with Yule-Simon distribution, which resembles the powerlw distribution used in modeling online systems, with the probbility mss function f d (d;ρ) = ρb(d,ρ+1), where B is the Bet function. Further, we set T = 5, b = 5, p c =.8, ρ = 1, U = 1 nd S = 1. We ssumed the dversry model in Section III-A. In the following, we mesured the 3 It is worth nothing tht even though we use the bd-mouthing ttc, similr counterprt results hold for bllot stuffing nd combintions of bd mouthing nd bllot stuffing. performnce of BP-ITRM, for ech time-slot, s the men bsolute error (MAE) G Ĝ, verged over ll the SPs tht re under ttc. The time-slots in ll the plots re shown fter subtrcting the offset-time T = 5. First, we evluted the MAE performnce of BP-ITRM U M U M+U R ), for different frctions of mlicious rters (W = t different time-slots in Fig.. We observed tht BP-ITRM provides significntly low errors for up to W = 4% mlicious rters. Next, in Fig. 3, we show the chnge in the verge trustworthiness (R i vlues) of mlicious rters with time. We conclude tht the trustworthiness vlues of the mlicious rters decrese over time, nd hence, the impct of the mlicious rtings vnishes over time. Further, Fig. 4 illustrtes the comprison of BP-ITRM with the other well-nown nd commonly used reputtion systems for bd mouthing when the frction of mlicious rters (W ) is 3%. It is cler tht BP-ITRM outperforms ll the other techniques significntly. In ll these simultions, the verge number of itertions for BP-ITRM is round 1 nd it decreses with time nd with decresing frction of mlicious rters. In most reputtion systems, the dversry cuses the most serious dmge by introducing newcomer rters to the system. Since it is not possible for the system to now the trustworthiness of the newcomer rters, the dversry my introduce newcomer rters to the systems nd ttc the SPs using those rters. To study the effect of newcomer mlicious rters to the scheme, we introduced 1 more rters s newcomers. Hence, we hd U = rters nd S = 1 SPs in totl. We ssumed tht the rting vlues re either or 1, r h is rndom vrible with Bernoulli distribution s before, nd mlicious rters choose SPs from Γ nd rte them s r m = (this prticulr ttc scenrio does not represent the RepTrp ttc). In Fig. 5 we observed tht BP- ITRM still provides MAE BP ITRM ITRM Cluster Filtering Averging Scheme Byesin Approch significntly low Fig. 5: MAE performnce of vrious schemes when3% of the newcomer rters re mlicious. MAE nd preserves its superiority over the other schemes. From these simultion results, we conclude tht BP-ITRM significntly outperforms the Averging Scheme, Byesin

5 Approch nd Cluster Filtering in the presence of ttcers. We identify tht our non-probbilistic itertive scheme ITRM [7] is the closest in performnce to BP-ITRM. This emphsizes the robustness of using itertive lgorithms for reputtion mngement. Finlly, ssuming u rters nd s SPs, we obtined the computtionl complexity of BP-ITRM s mx(o ( cu ),O ( cs ) ) in the number of multiplictions, where c is smll number representing the verge number of rting edges per rter. In contrst, Cluster Filtering suffers qudrtic complexity versus number of rters (or SPs). C. The ǫ-optiml Scheme Using the dopted models for vrious peers, it is nturl to s if BP-ITRM mintin ny optimlity in ny sense. We declre reputtion scheme to be ǫ-optiml if the men bsolute error (MAE) ( G Ĝ ) is less thn or equl to ǫ for every SP. Thus, for fixed ǫ, we wish to obtin the conditions for n ǫ-optiml scheme. It cn be shown tht, equivlently, we require BP-ITRM to itertively reduce the impct of mlicious rters nd decrese the error in the reputtion vlues of the SPs below ǫ until it converges. Lemm 1: (Sufficient Condition): The error in the reputtion vlues of the SPs decreses with ech successive itertions (until convergence) if G () > G (1) is stisfied with high probbility for every SP ( S) with Gˆ = 1 4. Proof: Let G (ω) nd G (ω+1) be the reputtion vlue of n rbitrry SP with G ˆ = 1 clculted t the (ω) th nd (ω + 1) th itertions, respectively. G (ω+1) stisfied t the (ω +1) th itertion. > G (ω) p cr (w+1) +1 R (w+1) 1 U R N p cr (w+1) +1+R (w+1) U M N 1+ p cr (w) +1 R (w) 1 ˆR (w) U R N p cr (w) +1+R (w) (w) U M N 1+ ˆR if the following is ˆR (w+1) ˆR (w+1) >, (7) where R (w) (w) nd ˆR re the trustworthiness vlues of relible nd mlicious rter clculted s in (4) t the w th itertion, respectively. Given G (ω) > G (ω 1) holds t the ω th itertion, we would (w) (w+1) get ˆR > ˆR for U M N nd R (w+1) R (w) for U R N. Thus, (7) would hold for the (w+1) th itertion. On the other hnd, if G (ω) < G (ω 1) (w) (w+1), we get ˆR < ˆR for U M N nd R (w+1) < R (w) for U R N. Hence, (7) is not stisfied t the (w + 1) th itertion. Therefore, if G (ω) > G (ω 1) holds for some itertion ω, then the BP-ITRM lgorithm reduces the error on the globl reputtion vlue (G ) until the itertions stop, nd hence, it is sufficient to stisfy G () > G (1) with high probbility for every SP with Ĝ = 1 to gurntee tht BP-ITRM itertively reduces the impct of mlicious rters until it stops. Once the sufficient condition is met, the probbility for ǫ-optimlity cn be obtined 5. Now, we illustrte performnce of our scheme in terms of ǫ for which BP- ITRM is n ǫ-optiml scheme bsed on our nlyticl results. As before, we ssumed tht d is rndom vrible with Yule-Simon distribution (with ρ = 1). 4 The opposite must hold for ny SP with ˆ G =. 5 We omitted the expression due to pge limit. The prmeters we 1 used re U M + U R = 1, S = 1 1, ρ = 1, T = 5, b = 5 nd p c = In Fig. 6, we illustrte the verge 1 6 ǫ (ǫ v) for which BP-ITRM is n ǫ- 1 8 optiml scheme with high probbility for % mlicious rters different frctions of Fig. 6: The verge ǫ vlues for which BPmlicious rters. We ITRM is n ǫ-optiml scheme with high probbility versus frction of mlicious rters. observed tht BP- ITRM provides significntly smll error vlues for up to 3% mlicious rters. ε v IV. CONCLUSION In this pper, we introduced the first ppliction of the Belief Propgtion lgorithm to solve for the inference problem rising in reputtion systems. We presented the Belief Propgtion bsed Itertive Trust nd Reputtion Mngement Scheme (BP-ITRM). BP-ITRM is grph-bsed reputtion mngement system in which service providers nd rters re rrnged s two sets of vrible nd fctor nodes nd the reputtion vlues of service providers re computed by messge pssing between these nodes in the grph until the convergence. The proposed BP-ITRM is robust mechnism to evlute the qulity of the service of the service providers from the rtings received from the rters. Moreover, it effectively evlutes the trustworthiness of the rters. We showed tht the complexity of the proposed scheme grows only linerly with the number of service providers (or rters) in the system. Further, we studied BP-ITRM in detiled nlysis nd showed the robustness using computer simultions. We lso compred BP- ITRM with some well-nown reputtion mngement schemes nd showed the superiority of our scheme both in terms of robustness ginst vrious ttcs nd efficiency. REFERENCES [1] J. Perl, Probbilistic Resoning in Intelligent Systems: Networs of Plusible Inference. Morgn Kufmnn Publishers, Inc., [] T. J. Richrdson nd R. L. Urbne, The cpcity of low-density prity chec codes under messge-pssing decoding, IEEE Trnsctions on Informtion Theory, vol. 47, pp , Feb. 1. [3] P. Resnic, R. Zechuser, E. Friedmn, nd K. Kuwbr, Reputtion systems: fcilitting trust in internet interctions, Communictions of the ACM, vol. 43, no. 1, pp ,. [4] S. Buchegger nd J.Boudec, Coping with flse ccustions in misbehvior reputtion systems for mobile d-hoc networs, EPFL-DI-ICA Technicl Report IC/3/31, 3. [5] C. Dellrocs, Immunizing online reputtion reporting systems ginst unfir rtings nd discrimintory behvior, EC : Proceedings of the nd ACM conference on Electronic commerce, pp ,. [6] Y. Yng, Q. Feng, Y. L. Sun, nd Y. Di, RepTrp: novel ttc on feedbc-bsed reputtion systems, SecureComm 8: Proceedings of the 4th Interntionl Conference on Security nd Privcy in Communiction Networs, pp. 1 11, 8. [7] E. Aydy, H. Lee, nd F. Feri, An itertive lgorithm for trust nd reputtion mngement, ISIT 9: Proceedings of IEEE Interntionl Symposium on Informtion Theory, 9. [8], Trust mngement nd dversry detection in dely tolernt networs, In Proceedings of IEEE Militry Communictions Conference (MILCOM), 1. [9] F. Kschischng, B. Frey, nd H. A. Loeliger, Fctor grphs nd the sumproduct lgorithm, IEEE Trnsctions on Informtion Theory, vol. 47, pp , Feb. 1. [1] G. Shfer, A Mthemticl Theory of Evidence. Princeton University Press, Princeton, N.J., 1976.

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique?

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique? XII. LINEAR ALGEBRA: SOLVING SYSTEMS OF EQUATIONS Tody we re going to tlk bout solving systems of liner equtions. These re problems tht give couple of equtions with couple of unknowns, like: 6 2 3 7 4

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Scientific notation is a way of expressing really big numbers or really small numbers.

Scientific notation is a way of expressing really big numbers or really small numbers. Scientific Nottion (Stndrd form) Scientific nottion is wy of expressing relly big numbers or relly smll numbers. It is most often used in scientific clcultions where the nlysis must be very precise. Scientific

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Definite integral. Mathematics FRDIS MENDELU

Definite integral. Mathematics FRDIS MENDELU Definite integrl Mthemtics FRDIS MENDELU Simon Fišnrová Brno 1 Motivtion - re under curve Suppose, for simplicity, tht y = f(x) is nonnegtive nd continuous function defined on [, b]. Wht is the re of the

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Definite integral. Mathematics FRDIS MENDELU. Simona Fišnarová (Mendel University) Definite integral MENDELU 1 / 30

Definite integral. Mathematics FRDIS MENDELU. Simona Fišnarová (Mendel University) Definite integral MENDELU 1 / 30 Definite integrl Mthemtics FRDIS MENDELU Simon Fišnrová (Mendel University) Definite integrl MENDELU / Motivtion - re under curve Suppose, for simplicity, tht y = f(x) is nonnegtive nd continuous function

More information

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction

UNIT 1 FUNCTIONS AND THEIR INVERSES Lesson 1.4: Logarithmic Functions as Inverses Instruction Lesson : Logrithmic Functions s Inverses Prerequisite Skills This lesson requires the use of the following skills: determining the dependent nd independent vribles in n exponentil function bsed on dt from

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

fractions Let s Learn to

fractions Let s Learn to 5 simple lgebric frctions corne lens pupil retin Norml vision light focused on the retin concve lens Shortsightedness (myopi) light focused in front of the retin Corrected myopi light focused on the retin

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

Applicable Analysis and Discrete Mathematics available online at

Applicable Analysis and Discrete Mathematics available online at Applicble Anlysis nd Discrete Mthemtics vilble online t http://pefmth.etf.rs Appl. Anl. Discrete Mth. 4 (2010), 23 31. doi:10.2298/aadm100201012k NUMERICAL ANALYSIS MEETS NUMBER THEORY: USING ROOTFINDING

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

3.4 Numerical integration

3.4 Numerical integration 3.4. Numericl integrtion 63 3.4 Numericl integrtion In mny economic pplictions it is necessry to compute the definite integrl of relvlued function f with respect to "weight" function w over n intervl [,

More information

Heat flux and total heat

Heat flux and total heat Het flux nd totl het John McCun Mrch 14, 2017 1 Introduction Yesterdy (if I remember correctly) Ms. Prsd sked me question bout the condition of insulted boundry for the 1D het eqution, nd (bsed on glnce

More information

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac REVIEW OF ALGEBRA Here we review the bsic rules nd procedures of lgebr tht you need to know in order to be successful in clculus. ARITHMETIC OPERATIONS The rel numbers hve the following properties: b b

More information

Riemann is the Mann! (But Lebesgue may besgue to differ.)

Riemann is the Mann! (But Lebesgue may besgue to differ.) Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information

Predict Global Earth Temperature using Linier Regression

Predict Global Earth Temperature using Linier Regression Predict Globl Erth Temperture using Linier Regression Edwin Swndi Sijbt (23516012) Progrm Studi Mgister Informtik Sekolh Teknik Elektro dn Informtik ITB Jl. Gnesh 10 Bndung 40132, Indonesi 23516012@std.stei.itb.c.id

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: How to identify the leding coefficients nd degrees of polynomils How to dd nd subtrct polynomils How to multiply polynomils

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

Numerical Analysis: Trapezoidal and Simpson s Rule

Numerical Analysis: Trapezoidal and Simpson s Rule nd Simpson s Mthemticl question we re interested in numericlly nswering How to we evlute I = f (x) dx? Clculus tells us tht if F(x) is the ntiderivtive of function f (x) on the intervl [, b], then I =

More information

Reinforcement learning II

Reinforcement learning II CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

APPROXIMATE INTEGRATION

APPROXIMATE INTEGRATION APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be

More information

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95 An pproximtion to the rithmetic-geometric men G.J.O. Jmeson, Mth. Gzette 98 (4), 85 95 Given positive numbers > b, consider the itertion given by =, b = b nd n+ = ( n + b n ), b n+ = ( n b n ) /. At ech

More information

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1 Exm, Mthemtics 471, Section ETY6 6:5 pm 7:4 pm, Mrch 1, 16, IH-115 Instructor: Attil Máté 1 17 copies 1. ) Stte the usul sufficient condition for the fixed-point itertion to converge when solving the eqution

More information

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of

More information

Introduction to Numerical Analysis

Introduction to Numerical Analysis Introduction to Numericl Anlysis Doron Levy Deprtment of Mthemtics nd Center for Scientific Computtion nd Mthemticl Modeling (CSCAMM) University of Mrylnd June 14, 2012 D. Levy CONTENTS Contents 1 Introduction

More information

Numerical Integration

Numerical Integration Chpter 5 Numericl Integrtion Numericl integrtion is the study of how the numericl vlue of n integrl cn be found. Methods of function pproximtion discussed in Chpter??, i.e., function pproximtion vi the

More information

The Riemann-Lebesgue Lemma

The Riemann-Lebesgue Lemma Physics 215 Winter 218 The Riemnn-Lebesgue Lemm The Riemnn Lebesgue Lemm is one of the most importnt results of Fourier nlysis nd symptotic nlysis. It hs mny physics pplictions, especilly in studies of

More information

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007 A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus

More information

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed

More information

Math 426: Probability Final Exam Practice

Math 426: Probability Final Exam Practice Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by

More information

PEER-TO-PEER systems are autonomous and distributed

PEER-TO-PEER systems are autonomous and distributed 1 Evolutionry Stbility of Reputtion Mngement System in Peer to Peer etworks Antriksh Goswmi, Ruchir Gupt rxiv:1703.08286v1 [cs.gt] 24 Mr 2017 Abstrct Ech prticipnt in peer-to-peer network prefers to free-ride

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

CS667 Lecture 6: Monte Carlo Integration 02/10/05

CS667 Lecture 6: Monte Carlo Integration 02/10/05 CS667 Lecture 6: Monte Crlo Integrtion 02/10/05 Venkt Krishnrj Lecturer: Steve Mrschner 1 Ide The min ide of Monte Crlo Integrtion is tht we cn estimte the vlue of n integrl by looking t lrge number of

More information

4 The dynamical FRW universe

4 The dynamical FRW universe 4 The dynmicl FRW universe 4.1 The Einstein equtions Einstein s equtions G µν = T µν (7) relte the expnsion rte (t) to energy distribution in the universe. On the left hnd side is the Einstein tensor which

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Probabilistic Reasoning in Bayesian Networks: A Relational Database Approach

Probabilistic Reasoning in Bayesian Networks: A Relational Database Approach Probbilistic Resoning in Byesin Networks: A Reltionl Dtbse Approch S.K.M. Wong, D. Wu nd C.J. Butz Deprtment of Computer Science, University of Regin Regin Ssktchewn, Cnd S4S 0A2 Abstrct. Probbilistic

More information

ECO 317 Economics of Uncertainty Fall Term 2007 Notes for lectures 4. Stochastic Dominance

ECO 317 Economics of Uncertainty Fall Term 2007 Notes for lectures 4. Stochastic Dominance Generl structure ECO 37 Economics of Uncertinty Fll Term 007 Notes for lectures 4. Stochstic Dominnce Here we suppose tht the consequences re welth mounts denoted by W, which cn tke on ny vlue between

More information

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b. Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn

More information

Best Approximation. Chapter The General Case

Best Approximation. Chapter The General Case Chpter 4 Best Approximtion 4.1 The Generl Cse In the previous chpter, we hve seen how n interpolting polynomil cn be used s n pproximtion to given function. We now wnt to find the best pproximtion to given

More information

We will see what is meant by standard form very shortly

We will see what is meant by standard form very shortly THEOREM: For fesible liner progrm in its stndrd form, the optimum vlue of the objective over its nonempty fesible region is () either unbounded or (b) is chievble t lest t one extreme point of the fesible

More information

Travelling Profile Solutions For Nonlinear Degenerate Parabolic Equation And Contour Enhancement In Image Processing

Travelling Profile Solutions For Nonlinear Degenerate Parabolic Equation And Contour Enhancement In Image Processing Applied Mthemtics E-Notes 8(8) - c IN 67-5 Avilble free t mirror sites of http://www.mth.nthu.edu.tw/ men/ Trvelling Profile olutions For Nonliner Degenerte Prbolic Eqution And Contour Enhncement In Imge

More information

Zero-Sum Magic Graphs and Their Null Sets

Zero-Sum Magic Graphs and Their Null Sets Zero-Sum Mgic Grphs nd Their Null Sets Ebrhim Slehi Deprtment of Mthemticl Sciences University of Nevd Ls Vegs Ls Vegs, NV 89154-4020. ebrhim.slehi@unlv.edu Abstrct For ny h N, grph G = (V, E) is sid to

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

Lecture 19: Continuous Least Squares Approximation

Lecture 19: Continuous Least Squares Approximation Lecture 19: Continuous Lest Squres Approximtion 33 Continuous lest squres pproximtion We begn 31 with the problem of pproximting some f C[, b] with polynomil p P n t the discrete points x, x 1,, x m for

More information

Section 6.1 INTRO to LAPLACE TRANSFORMS

Section 6.1 INTRO to LAPLACE TRANSFORMS Section 6. INTRO to LAPLACE TRANSFORMS Key terms: Improper Integrl; diverge, converge A A f(t)dt lim f(t)dt Piecewise Continuous Function; jump discontinuity Function of Exponentil Order Lplce Trnsform

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Introduction Lecture 3 Gussin Probbility Distribution Gussin probbility distribution is perhps the most used distribution in ll of science. lso clled bell shped curve or norml distribution Unlike the binomil

More information

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations.

Lecture 3. In this lecture, we will discuss algorithms for solving systems of linear equations. Lecture 3 3 Solving liner equtions In this lecture we will discuss lgorithms for solving systems of liner equtions Multiplictive identity Let us restrict ourselves to considering squre mtrices since one

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

CHM Physical Chemistry I Chapter 1 - Supplementary Material

CHM Physical Chemistry I Chapter 1 - Supplementary Material CHM 3410 - Physicl Chemistry I Chpter 1 - Supplementry Mteril For review of some bsic concepts in mth, see Atkins "Mthemticl Bckground 1 (pp 59-6), nd "Mthemticl Bckground " (pp 109-111). 1. Derivtion

More information

2D1431 Machine Learning Lab 3: Reinforcement Learning

2D1431 Machine Learning Lab 3: Reinforcement Learning 2D1431 Mchine Lerning Lb 3: Reinforcement Lerning Frnk Hoffmnn modified by Örjn Ekeberg December 7, 2004 1 Introduction In this lb you will lern bout dynmic progrmming nd reinforcement lerning. It is ssumed

More information

Non-Linear & Logistic Regression

Non-Linear & Logistic Regression Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find

More information

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year

USA Mathematical Talent Search Round 1 Solutions Year 21 Academic Year 1/1/21. Fill in the circles in the picture t right with the digits 1-8, one digit in ech circle with no digit repeted, so tht no two circles tht re connected by line segment contin consecutive digits.

More information

2.4 Linear Inequalities and Problem Solving

2.4 Linear Inequalities and Problem Solving Section.4 Liner Inequlities nd Problem Solving 77.4 Liner Inequlities nd Problem Solving S 1 Use Intervl Nottion. Solve Liner Inequlities Using the Addition Property of Inequlity. 3 Solve Liner Inequlities

More information

Chapter 5 : Continuous Random Variables

Chapter 5 : Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll

More information

Precalculus Spring 2017

Precalculus Spring 2017 Preclculus Spring 2017 Exm 3 Summry (Section 4.1 through 5.2, nd 9.4) Section P.5 Find domins of lgebric expressions Simplify rtionl expressions Add, subtrct, multiply, & divide rtionl expressions Simplify

More information

Unit 1 Exponentials and Logarithms

Unit 1 Exponentials and Logarithms HARTFIELD PRECALCULUS UNIT 1 NOTES PAGE 1 Unit 1 Eponentils nd Logrithms (2) Eponentil Functions (3) The number e (4) Logrithms (5) Specil Logrithms (7) Chnge of Bse Formul (8) Logrithmic Functions (10)

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS

ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS ADVANCEMENT OF THE CLOSELY COUPLED PROBES POTENTIAL DROP TECHNIQUE FOR NDE OF SURFACE CRACKS F. Tkeo 1 nd M. Sk 1 Hchinohe Ntionl College of Technology, Hchinohe, Jpn; Tohoku University, Sendi, Jpn Abstrct:

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15

Physics 202H - Introductory Quantum Physics I Homework #08 - Solutions Fall 2004 Due 5:01 PM, Monday 2004/11/15 Physics H - Introductory Quntum Physics I Homework #8 - Solutions Fll 4 Due 5:1 PM, Mondy 4/11/15 [55 points totl] Journl questions. Briefly shre your thoughts on the following questions: Of the mteril

More information

Overview of Calculus I

Overview of Calculus I Overview of Clculus I Prof. Jim Swift Northern Arizon University There re three key concepts in clculus: The limit, the derivtive, nd the integrl. You need to understnd the definitions of these three things,

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks

Construction and Selection of Single Sampling Quick Switching Variables System for given Control Limits Involving Minimum Sum of Risks Construction nd Selection of Single Smpling Quick Switching Vribles System for given Control Limits Involving Minimum Sum of Risks Dr. D. SENHILKUMAR *1 R. GANESAN B. ESHA RAFFIE 1 Associte Professor,

More information

The Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve.

The Fundamental Theorem of Calculus. The Total Change Theorem and the Area Under a Curve. Clculus Li Vs The Fundmentl Theorem of Clculus. The Totl Chnge Theorem nd the Are Under Curve. Recll the following fct from Clculus course. If continuous function f(x) represents the rte of chnge of F

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses

More information

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0) 1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this

More information

Multi-Armed Bandits: Non-adaptive and Adaptive Sampling

Multi-Armed Bandits: Non-adaptive and Adaptive Sampling CSE 547/Stt 548: Mchine Lerning for Big Dt Lecture Multi-Armed Bndits: Non-dptive nd Adptive Smpling Instructor: Shm Kkde 1 The (stochstic) multi-rmed bndit problem The bsic prdigm is s follows: K Independent

More information

Notes on length and conformal metrics

Notes on length and conformal metrics Notes on length nd conforml metrics We recll how to mesure the Eucliden distnce of n rc in the plne. Let α : [, b] R 2 be smooth (C ) rc. Tht is α(t) (x(t), y(t)) where x(t) nd y(t) re smooth rel vlued

More information