EM Decoding of Tardos Traitor Tracing Codes
|
|
- Scarlett Campbell
- 5 years ago
- Views:
Transcription
1 Author manusrit, ublished in "ACM Multimedia and Seurity (2009)" EM Deoding of Tardos Traitor Traing Codes Teddy Furon Thomson Seurity Cometene Center 1, av. Belle Fontaine Cesson Sévigné, Frane Luis Pérez-Freire Gradiant, ETSI Teleom. Lagoas Marosende s/n, Vigo, Sain ABSTRACT This aer rooses a major shift in the deoding of robabilisti Tardos traitor traing ode. The goal of the deoder is to ause olluders but it ignores how they have been mixing their oies in order to forge the irated ontent. As originally roosed by Tardos, so far roosed deoders are agnosti and their erformanes are stable with reset to this unknown ollusion attak. However, this stability automatially leads to non-otimality from a detetion theory ersetive. This is the reason why this aer rooses to estimate the ollusion attak in order to aroximate the otimal mathed deoder. This is done iteratively thanks to the aliation of the well-known Exetation-Maximization algorithm. We have droed the stability: the ower of our deoding algorithm deely deends on the ollusion attak. Some attaks are worse than others. However, even for the worst ollusion hannel, our deoder erforms better than the original Tardos deoding. Categories and Subjet Desritors D.4.6 [Software]: Seurity and Protetion Information flow ontrols General Terms Algorithms Keywords Traitor traing, fingerrinting, ollusion, iterative deoding, Exetation-Maximization 1. INTRODUCTION This artile deals with traitor traing whih is also known as ative fingerrinting, ontent serialization, user forensis or transational watermarking. The tyial aliation is The seond author ontributes to this work while he was at Thomson Seurity Lab Permission to make digital or hard oies of all or art of this work for ersonal or lassroom use is granted without fee rovided that oies are not made or distributed for rofit or ommerial advantage and that oies bear this notie and the full itation on the first age. To oy otherwise, to reublish, to ost on servers or to redistribute to lists, requires rior seifi ermission and/or a fee. MM&Se 09, Setember 7 8, 2009, Prineton, New Jersey, USA. Coyright 2009 ACM /09/09...$ as follows: A video on demand server distributes ersonal oies of the same ontent to n buyers. Some are dishonest users whose goal is to illegally redistribute a irate oy. The rights holder is interested in identifying these dishonest users. For this urose, a unique user identifier onsisting on a sequene of m symbols is embedded in eah video ontent thanks to a watermarking tehnique, thus roduing n different (although eretually similar) oies. This allows traing bak whih user has illegally redistributed his oy. However, there might be a ollusion of dishonest users, > 1. This ollusion mixes their oies in order to forge a irated ontent whih ontains none of the identifiers but a mixture of them. The traitor traing ode invented by Gabor Tardos in 2003 [12] beomes more and more oular. The reader will find a edagogial review of this ode in [6]. This ode is a robabilisti weak fingerrinting ode, where the robability of ausing an innoent is not null but very low. The deoding of this ode is foused, in the sense that it states whether or not a given user is guilty. Its erformanes are usually evaluated in terms of the robability ǫ 1 of ausing an innoent and the robability of missing all olluders ǫ 2. Most of the artiles dealing with the Tardos ode aim at finding a tight lower bound of the required length of the ode for a given ǫ 1 [11, 2]. Other works roose more ratial imlementations of the Tardos ode suh as [10]. A reent trend is to analyze this ode from the information theory viewoint, and to tune the arameter (namely the time sharing distribution f()) at the ode generation side to maximize the ahievable rate, ie. to ahieve aaity [1, 9]. In this aer, we study the other end of the hain: the ausation side. We are onerned with deoding of, in general, robabilisti traitor traing odes, and in artiular, those originally roosed by G. Tardos. The deoding algorithms roosed by Tardos and Skori [12, 11] ose the remarkable roerty of roviding stable erformane indeendently of the ollusion hannel, rovided that the latter fulfills the so-alled marking assumtion [3]. We alled this rationale the agnosti deoding strategy sine it does not use any information about the ollusion hannel. Its main advantage is that the bound on the minimal ode length holds whatever the ollusion attak. However, this deoding strategy suffers from three drawbaks. First, this agnosti deoding strategy has a too strong ouling between the ausation algorithm and the ode generation, sine it was designed for an seifi f(). However, some reent works [1] have shown, from a game-theoreti viewoint, that the otimal time sharing distribution f()
2 is strongly deendent on the number of olluders and may signifiantly deviate from the f() originally roosed by Tardos. In suh onditions, the stable erformane roerty of the agnosti deoder is no longer granted. Seond, the stable erformane roerty doesn t hold either whenever the marking assumtion is not enfored. For instane, when the hannel introdues random errors, deoding erformane raidly dereases. Third, this agnosti deoding is highly subotimal from a hyothesis testing theory viewoint. Thus, although the ode onstrution is rovably good, Tardos deoding rovides stable erformanes indeendently of the ollusion hannel at the ost of high subotimality. This is the reason why we roose a omlete shift in the deoding strategy. Instead of ignoring the ollusion hannel, our deoding estimates it in order to use the mathed otimal deoder. This is done iteratively thanks to an aliation of the well-known Exetation-Maximization algorithm [8]. We have droed the stable erformane roerty: the ower of our deoding algorithm deely deends on the ollusion attak. Some attaks are worse than others. However, we are able to show that even for the worst ollusion hannel, our deoder erforms better than the original Tardos deoding. 2. THE MATHEMATICAL MODEL The robability that the random variable A defined over the alhabet A takes the ourene a is denoted by P A[a]. Vetors and matries are written in boldfae. 2.1 Code generation We briefly remind how the Tardos ode is designed. The binary ode X is omosed of n sequenes of m bits. The sequene X j = (X j1,, X jm) identifying user j is omosed of m binary symbols. Indeed, these symbols are drawn indeendently suh that P Xji [1] = i, i [m], with [m] denoting {1,..., m}. {P i} i [m] are indeendent and identially distributed auxiliary random variables in the range [0, 1]: P i f(). Tardos roosed the following df, f() = (π (1 ) 1, whih is symmetri around 1/2: f() = f(1 ). It means that symbols 1 and 0 lay a similar role with robability or 1. The atual ourrenes { i} i [m] of these random variables are drawn one for all at the initialization of the ode, and they onstitute its seret key. 2.2 The ollusion hannel Denote the subset of olluder indies by C = {j 1,, j }, and X C = {X j1,...,x j } the restrition of the traitor traing ode to this subset. The ollusion attak is the roess of taking sequenes in X C as inuts and yielding the irated sequene Y as an outut. Fingerrinting odes have been first studied by the rytograhi ommunity and a key-onet is the marking assumtion introdued by Boneh and Shaw [3]. It states that, in its narrow-sense version, whatever the strategy of the ollusion C, we have Y i {x j1 i,, x ji}. In words, olluders forge the irated oy by assembling hunks from their ersonal oies. It imlies that if, at index i, the olluders symbols are idential, then this symbol value is deoded at the i-th hunk of the irated oy. Our mathematial model of the ollusion is essentially based on four main assumtions. The first assumtion is the memoryless nature of the ollusion attak. Sine the symbols of the ode are indeendent, it seems relevant that the irated sequene Y also shares this roerty. Therefore, the value of Y i only deends on {X j1 i,, X ji}. The seond assumtion is the stationarity of the ollusion roess. We assume that the ollusion strategy is indeendent of the index i in the sequene. Therefore, we an desribe it for any index i, and we will dro indexing for sake of larity in the sequel. The third assumtion is the exhangeable nature of the ollusion: the olluders selet the value of the symbol Y deending on the values of their symbols, but not on their order. Therefore, the inut of the ollusion roess is indeed the tye of their symbols (i.e. the emirial robability mass funtion). In the binary ase, this tye is fully defined by the following suffiient statisti: the number Σ i of symbols 1 : Σ i = P k=1 Xj ki. The fourth assumtion is that the ollusion roess may be deterministi (for instane, majority vote, minority vote), or random (for instane, the symbol asted in the irated sequene is deided uon a oin fli). These four assumtions yield that the ollusion attak is fully desribed by the following arameter: θ = {θ 0,..., θ }, with θ σ = P Y [1 Σ = σ] whih reads as the robability that olluders ut a 1 when they have σ 1 among their symbols. There is thus an infinity of ollusion attaks, but we an already state that they all share the following roerty: The marking assumtion enfores that θ 0 = 0 and θ = 1. A ollusion attak is thus defined by 1 real values in the hyerube [0,1] 1. Here are some examles where θ is given for = 4: Random. The olluders randomly draw one of their symbols: θ = (0, 1/4, 1/2, 3/4, 1). Majority. The olluders ut the most frequent symbol: θ = (0,0, 1/2, 1, 1). Minority. The olluders ut the less frequent symbol: θ = (0,1, 1/2, 0, 1). Coin fli. The olluders fli a oin to deide: θ = (0,1/2, 1/2, 1/2, 1/2, 1). Worst Case Attak (WCA) is the attak minimizing E P [D(P, θ)] and hene the loss (14) (See Set. 3.1). More details are given in [7]. A minimization algorithm gives θ = (0, 0.488, 0.50, 0.512, 1). 2.3 The agnosti deoder The most well-sread deoding algorithm is the symmetri version of the Tardos deoding funtion roosed by B. Skori et al [11]. One the sequene Y is extrated from the irated ontent, the algorithm alulates a sore for any user: s j = P m i=1 U(yi,xji, i), j [n], with r r 1 U(1,1, ) = U(0, 0, ) = (1) 1 r r 1 U(1, 0, ) = U(0, 1, ) = 1 (2) Statistially, the sores of the olluders are bigger than the sores of the innoents. The deoding auses the user with the biggest sore, or, as originally roosed by Tardos, the users whose sores are above a given threshold.
3 Asymtotially, as m, the sores are distributed aording to two Gaussian distribution (basi aliation of the Central Limit Theorem): Innoent: S j N(0, m), (3) Colluder: S j N(2π 1 m 1, m(1 4π 2 2 )).(4) 3. THE INFORMED DECODER This setion rovides some arguments why the agnosti deoding strategy is not otimal. 3.1 Kullbak Leibler distane Our first argument is taken from lassial hyothesis testing theory [5, Cha. 12]. The ausation is indeed a test based on the observations (X j,y) that onsists of heking whih of the two following hyothesis is true: H 0: User j is innoent, H 1: User j is a olluder. The ausation roess is omosed of two building bloks: the alulus of the sore and the omarison to a threshold. By Stein s Lemma, the best asymtoti false ositive error exonent is given by the Kullbak Leibler distane between the dfs under hyothesis H 1 and H 0, whih is given by D(P Y,Xj H 1 P Y,Xj H 0 ). (5) Unless the statisti used in the deision is a suffiient statisti, the atual asymtoti error exonent of a given test is neessarily smaller. In the Tardos deoder, it is not ossible to evaluate the Kullbak Leibler distane of the sores S j of Set. 2.3, exet in the asymtotial regime when the df are deemed Gaussian. Then the Kullbak Leibler distane between the df of the sores D(P Sj H 1 P Sj H 0 ) is given by: D(P Sj H 1 P Sj H 0 ) = 2m 2 π 2 log(1 4 π 2 ) + 4 «. (6) 2 π 2 2 As this holds for m, the dominating term is 2m 2 π 2. The mathematial model of the ollusion of Se. 2.2 allows us to evaluate (5) before the soring funtion. First, the memoryless roerty of the ollusion hannel and the indeendene of the bits of the ode sequene simlifies not only the distributions under both hyothesis H l with l {0, 1}: but also the distane: P Y,Xj H l = D(P Y,Xj H 1 P Y,Xj H 0 ) = my P Yi,X ji H l, (7) i=1 mx D(P Yi,X ji H 1 P Yi,X ji H 0 ) i=1 Under H 0, X ji is statistially indeendent of Y i: (8) P Yi,X ji H 0 [y, x] = P Yi [y]p Xji [x], (9) with P Xji [x] = x i (1 i) (1 x). The robability of the irated symbol is slightly more omlex and involves the ollusion model introdued in Set. 2.2: X P Yi [1] = θ σp Σi [σ], (10) σ=0 with P Σi [σ] = ( σ) σ i (1 i) σ, the robability that olluders have σ times the symbols 1 at index i. Obviously, P Yi [0] = 1 P Yi [1]. Under H 1, X ji was used to reate Y i: P Yi,X ji H 1 [y, x] = P Yi X ji,h 1 [y x]p Xji [x]. (11) This onditional robability is slightly different than (10): P Yi X ji,h 1 [1 x] = 1+x X σ=x ` 1 θ σ σ x σ x i (1 i) 1+2x σ. (12) Having the exressions of all the robabilities, it is straight forward to alulate eah summand of (8) as a funtion D( i, θ) of i. Averaging over the ensemble of auxiliary sequenes, we obtain: D(P Y,Xj H 1 P Y,Xj H 0 ) = me P [D(P, θ)], (13) with E P [a(p)] the exetation of a(p), ie. R 1 0 a()f()d. The Kullbak-Leibler distane of the inut sequenes is strongly deendent on the ollusion hannel. The loss due to the use of the agnosti deoder is therefore asymtotially equal to: λ(θ) = m(e P [D(P, θ)] 2 2 π 2 ). (14) Table 1 shows the loss for different ollusion hannels whih are ommonly addressed in the literature and defined in Se In all ases, the loss reresents at least 45% of the ahievable rate Random Majority Minority Coin fli WCA Table 1: Loss λ(θ) in erentage for some ollusion hannels. WCA stands for Worst Case Attak, ie. θ = arg min θ E P [D(P, θ)]. 3.2 The exression of the informed deoder The Neyman-Pearson theorem tells us that a sore based on any monotonially inreasing funtion of the likelihood is otimal in the sense that its loss is null. The likelihood L(y,x j) is the ratio L(y,x j) = P Y,X j H 1 [y,x j] P Y,Xj H 0 [y,x j] = m Y i=1 P Yi X ji,h 1 [y i x ji], (15) P Yi [y i] whih an be evaluated thanks to (10) and (12). Thus, the otimal deoder omutes the likelihood ratio for eah user sequene, and deems that those whose likelihood is above a ertain threshold are olluders. Nevertheless, this otimal deoder is a riori not realizable sine it needs to know in advane the ollusion size and the ollusion hannel model θ. We named it the informed deoder. Moreover, the df of this likelihood ratio is ertainly deendent of the ollusion hannel, so the ausation threshold annot be a riori fixed to guarantee a given robability of error. Instead, this threshold must be
4 y X E-ste {π j(θ (k) )} θ (k) M-ste Figure 2: Blok diagram of the iterative deoder. a funtion of θ. One again, sine the ollusion hannel is not known, this suggests that the informed deoder annot be imlemented. Figure 1 shows the ROC (Probability of false alarm vs. robability of false negative) for the agnosti deoder and the informed deoder, illustrating the huge ga. The error robabilities have been omuted using the rare event robability estimator roosed in [7]. 4. THE E.-M. DECODER This setion shows a ossible imlementation of a deoder that tries to aroximate the otimal deoder by means of estimating the ollusion hannel. We roose to aly the Exetation-Maximization algorithm [8] to our roblem. The only rior work we are aware of is [4] where the authors roose a deoding algorithm a la E.-M. or in the sirit of the E.-M. However, they do not use any likelihood funtions but adative soring Tardos funtions, whih brings a lot of sub-otimality. As exlained in Set. 3, an aroah based on ollusion hannel estimation oens the door to owerful deoding. The key idea of the EM deoder is to erform an iterative learn and math strategy: 1. Given an estimated ollusion hannel, use its mathed deoder to suset some olluders, 2. Given some suseted olluders, their sequenes and the irated sequene, build a more aurate estimate of the ollusion hannel. In other words, as we better estimate the ollusion hannel, we better ause dishonest users (i.e. we ause less innoents, and miss less olluders), and in turn, we better estimate what they have been doing as a ollusion roess. Another argument is that the deoder gets a mixture of observations {x j} whih belong to two families innoent or olluder. Therefore, deoding boils down to estimating the hidden state, a.k.a. latent variable in E.-M. literature, of eah observation. This is indeed the event H 1 that user j is a olluder. Our deoding roblem is thus very similar to a mixture modelling whih is a tyial aliation of the E.-M. algorithm. The main bloks and variables of the iterative deoder are shown in Figure 2. A detailed exlanation is given below. 4.1 E-ste The goal of the E-ste is to have a better guess about the identities of the olluders. At iteration k + 1, its inuts are the sequenes of the users and the irated sequene. It also benefits from the estimate (k) of the ollusion size and an estimate θ (k) of the ollusion hannel. It simly alulates the robability π j(θ (k) ) that user j is guilty aording to this ollusion hannel: π j(θ (k) ) = P[H 1 y,x j] (16) P Y Xj,H 1 [y x j]p[h 1] = P Y Xj,H 1 [y x j]p[h 1] + P Y Xj,H 0 [y x, j]p[h 0] where the aliation of the Bayes rules lead to the seond line. Sine there are (k) olluders out of n users, we have P[H 1] = (k) n 1 and P[H 0] = 1 (k) n 1. Note that we an integrate in these rior robabilities susiion for some user based on geograhial or behavioral arguments. Under H 0, Y is indeendent of X j, and P Y Xj,H 0 [y x j] = P Y[y]. (k) π j(θ (k) ) = (k) + (n (k) ) P Y [y] P Y Xj,H [y x 1 j ], (17) The robabilities aearing in this last equation have already been exressed in the revious setion (just relae θ by θ (k) ). 4.2 M-ste The goal of the M-ste is to have a better guess about the ollusion roess. At iteration k + 1, its inuts are the sequenes of the users, the irated sequenes, the revious estimation of the ollusion hannel θ (k) and the estimation of the identities of the olluders thanks to robabilities {π j(θ (k) )} n j=1 evaluated in the E-ste. Aording to the lassial E.-M. formulation, we an refine the estimate of the ollusion hannel by maximizing in θ the following funtional Q(θ; θ (k) ) = X s P S[s y,x,θ (k) ]log (P[X,y,s θ]). (18) The sequene s reresent the hidden state of the system. It is omosed of n binary variables indiating whih users are olluders. (18) requires that we onsider the 2 n ossible hidden states, whih is of ourse out of question for a large number of users. We need to introdue the following simlifiations: P[x j,y,s θ] = P[x j,y, s j θ], (19) ny P S[s y,x, θ] = P Sj [s j y,x j, θ]. (20) j=1 Obviously those equations are not true beause guilty users deend on eah other, but this is a relaxation needed for having affordable omlexity. Assume for the moment that is known, the E-ste refines the estimation of the ollusion hannel with the following simlified funtional with θ (k+1) = arg max θ Q (θ; θ (k) ), (21)
5 informed deoder agnosti deoder P FN (a) = 3, m = 500, n = informed deoder agnosti deoder P FN (b) = 8, m = 4500, n = 10 5 Figure 1: Probabilities of false alarm and false negative with the informed deoder and agnosti deoder, for = 3 (a) and = 8 (b). Q (θ; θ (k) ) nx = X j=1 s j ={0,1} P Sj [s j y,x j, θ (k) ] log `P Xj [x j,y, s j θ] = log (P Y[y θ]) nx + π j(θ (k) ) log `P Xj,S j [x j,1 y, θ] + j=1 nx (1 π j(θ (k) )) log `P Xj,S j [x j,0 y, θ]. (22) j=1 With some more work: P Xj,S j [x j,0 y, θ] = P Xj [x j](1 /n), (23) P Xj,S j [x j,1 y, θ] = P Xj [x j H 1, θ,y]/n (24) = P Y X j,h 1 [y x j]p Xj [x j]. (25) P Y[y]n Unfortunately there is no losed form exression for the solution of the M-ste, so it must be sought by numerial means. A tyial otimization runs as follows: 1. For a arameter starting from 1 to max, the funtion Q (θ θ (k) ) is maximized. Standard otimization algorithms like Newton-Rahson an be used to find out the otimal θ. 2. Then, the max loal maxima Q (θ θ (k) ) are omared in order to isolate the global maximum, and the arameter θ (k+1) is udated aordingly: (k+1) = arg Q (θ θ (k) ), (26) [ max] θ (k+1) = θ (k+1) (27) 4.3 Initialization and termination of the E.-M. algorithm At the beginning, the ausation roess has no idea about the values of the hidden states s, the number of olluders and +(n )/η the ollusion attak. We roose to retend that (0) = 2 and θ (0) = [0, 1/2, 1], then next omes the E.-ste. The E and M stes are iterated until some termination riterion, usually when Q(θ (k+1), θ (k) ) is no longer imroving or when a maximum number of iteration k max has been reahed. Let k f be the last iteration, the final deision of the deoder is made by omuting the likelihood ratio given in (15) with θ = θ (kf). Notie that the set of robabilities {π j(θ (kf) )} j [n] suffie for erforming the deision, beause (17) is just a monotoni maing of (15) from [0, ] to the interval [0, 1]. Hene, a threshold η [0, ] in (15) is equivalent to a threshold T = in (17). We first selet the sores bigger than T. If the number of these sores is bigger than the estimated ollusion size, we only kee the (k f) biggest ones. This seond rule avoids false alarm (to ause innoent users) and is tyially imossible with a lassial Tardos deoding. 5. EXPERIMENTAL RESULTS The exerimental work is divided in two arts. First, we investigate whether the roosed iterative deoder orretly estimates the ollusion attak. If this is the ase, then it would erform as well as the otimal mathed deoder. In any ase, it doesn t mean that no error would be ommitted, but that as few errors as theoretially ossible would be done. On the ontrary, a mismath in the estimation of the ollusion hannel doesn t imly a bad deoding as the seond art assessing the deoding erformanes shows. The exerimental setu is the following. There are n = 1000 users, we onsider ode sequenes of length m = 250 bits, and the number of olluders ranges from 3 to 9. The iterative deoder is assuming that the maximum number of olluders is 9. Hene, the arameter max introdued in Set. 4.2 is set to 9. The maximum number of iterations for the E.-M. deoder is set to k max = 5. Two ollusion attaks are onsidered: Minority vote and the Worst Case Attak. As exlained before, the erformane of the otimal deoder is largely deendent on the ollusion hannel. The urose
6 1 0.9 Minority Worst Minority Worst Prob[orret estimation] distane Figure 3: Probabilities P[C (k f) = ] for m = Figure 4: Distanes d(θ (k f), θ) for m = 400. of fousing in these two artiular attaks is to illustrate the erformane of our deoder against a gentle attak (Minority) and against the worst attak, resetively (.f. Tab. 1). 5.1 Auray of the estimated ollusion attak Estimation of the ollusion size The first exeriment is a Monte-Carlo simulation with N = 1000 runs. Eah run generates a seret sequene and a ode X of n sequenes, of these ollude, and the E.- M. deoding roeeds with the reeived irated sequene. We measure the robability of orretly estimating the ollusion size by the ratio of the number of times where (k f) equals divided by N. Fig 3 shows that this robability dereases as the ollusion attak is worse: more olluders and/or more harmful roess Estimation of the ollusion roess With the same exeriment, when the estimate of the ollusion side is orret, we measure the auray of the estimated ollusion attak by the following distane: d(θ (kf), θ) = max θ (k f) σ θ σ 1 (28) σ [0,] If d(θ (k f), θ) = 0, then the E.-M. sueeds in retrieving the exat value of the ollusion attak, and therefore the deoding is otimal. Fig. 4 shows that the estimation beomes inaurate as inreases. However, there is a big ga between the two attaks: the minority ollusion seems to be easier to estimate than the worst ollusion. This behavior suggests that the information about the ollusion hannel leaking from the observations is signifiantly higher for the minority ollusion. 5.2 Deoding Performanes Thresholding When the sores are omared to a threshold as detailed in Se. 4.3, there are two tyes of error: False Alarm: at least one innoent is aused, False Negative: none of the olluders is aused. The erformanes of the deoder are evaluated by the robabilities of these two events, P F A(T) and P F N(T), measured exerimentally by Monte Carlo. Fig. 5 shows the exerimental ROC urve, obtained with N = 3200 realizations, as the deision threshold T ranges from 0 to 1. Fig. 5(a) shows the resulting ROC when the olluders imlement a Minority vote. In this ase, the ga between the agnosti deoder and the iterative deoder is imressive, and moreover the latter erforms losely to the otimal informed deoder. On the other hand, Fig. 5(b) shows the ROC when the olluders imlement the Worst Case Attak. Clearly, the ga between the informed deoder and the agnosti deoder is greatly redued. However, even in this ase the erformane of the roosed iterative deoder is very lose to that of the informed deoder, and always better than the agnosti deoder. Fig. 6 lots P F A(T) vs. P F N(T) from another ersetive. Now, we fix T suh that P F N(T ) = 0.2, ie. 20% of the time we miss all the olluders, and show the orresonding P F A(T ) for different attaks and ollusion size. Similar omments as for Fig. 5 aly in this ase. Note that the rate of the ode is log 2 n/m 0.04 bits er samle whih exeeds the ollusion hannel aaity for 4. Therefore, big robabilities of errors are exeted for 4. In real aliations, the ode should be longer. Finally, it is interesting to note that the huge variability in erformane among different attaks, that has been observed in this set of exeriments, is ertainly orrelated to the theoretial results shown in Tab. 1, where we an see that Minority has the biggest loss with regard to the otimal deoder Maximum sore heuristi Instead of a thresholding deision rule, we an use a maximum sore heuristi, where only one user is aused: the one whose sore is the largest. Thus, there is no threshold and the two errors mentioned above beome now the same event.
7 10 1 iterative deoder informed deoder agnosti deoder P FN (a) Minority 10 3 iterative deoder informed deoder agnosti deoder P FN (b) Worst Case Attak Figure 5: Probabilities of false alarm and false negative with the iterative, informed, and agnosti deoders, for = 5, m = 300, n = 1000 (a) Minority Attak and (b) Worst Case Attak iterative, minority iterative, worst informed, minority informed, worst agnosti, minority agnosti, worst Figure 6: Probability of false alarm when P F N(T ) = 0.2, m = 250, n = Fig. 7 shows the robability of being wrong in ausing the user having the biggest sore. The urves were obtained by Monte Carlo, in a set of N = 1000 exeriments. The same behavior as in Set an be notied. Two omments are in order. First, the WCA is not the worst attak for this framework. The WCA is indeed defined as the ollusion attak minimizing the mutual information between the symbols of the irated oy and the user odeword. Thus, the WCA minimizes in general the uer bound on the ausation erformanes, but it might not be the worst attak for a given ausation roess. Seond, the urve of the iterative deoder against a minority attak is hidden behind the one for the informed deoder, ie. the robability of error is null. Probability of error iterative, minority iterative, worst informed, minority informed, worst agnosti, minority agnosti, worst Figure 7: Probability of error for the maximum sore heuristi, with m = 400, n = CONCLUSION The reliminary results of this aer show that the new roosed aroah, based on joint hannel estimation and deoding, oens the door to owerful deoding shemes for robabilisti traitor traing odes. The main drawbak of the E.-M. deoder resides in its omlexity. The evaluation of the Q funtion needs O(nm) elementary oerations, and we must erform a maximization of several of these funtions. This is the reason why exeriments resented in this aer do not takle long odes and many users. They learly show that the E.-M. deoder erforms signifiantly better than the agnosti deoder, and sometimes as good as the informed deoder. However, this exerimental setu would not be aliable to senarios where a huge number of users
8 is involved. Our future work will investigate less omlex deoders and reroessing tehniques able to rune most of the users. We will investigate as well the fundamental limits in the estimation of the ollusion model, in terms of the ode length and the tye of ollusion attak. On the other hand, the roosed deoding aroah brings new ossibilities that, to the best of our knowledge, have not been exloited yet in the deoding of traitor traing odes. For instane, the aroah an be extended to more general ollusion models, other than the marking assumtion used in this aer and in many others in the literature. Indeed, nothing revents us from enomassing symbol erasures and random errors in the statistial model of the ollusion. The diffiulty is that the iterative deoder must estimate even more arameters. Yet, the agnosti deoder is not at all robust against erasures and eseially random errors, sine they violate the marking assumtion. A larger ga between the agnosti deoder and the informed deoder an be exeted in suh ase. 7. REFERENCES [1] E. Amiri and G. Tardos. High rate fingerrinting odes and the fingerrinting aaity. In Pro. of 20th Annual ACM-SIAM Symosium on Disrete Algorithms (SODA 2009), jan [2] O. Blayer and T. Tassa. Imroved versions of Tardos fingerrinting sheme. Des. Codes Crytograhy, 48(1):79 103, [3] D. Boneh and J. Shaw. Collusion-seure fingerrinting for digital data. IEEE Trans. Inform. Theory, 44: , Setember [4] A. Charentier, F. Xie, C. Fontaine, and T. Furon. Exetation maximisation deoding of tardos robabilisti fingerrinting ode. In N. Memon, editor, Seurity, steganograhy and watermarking of multimedia ontents, San Jose, CA, USA, jan SPIE Eletroni Imaging. [5] T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley series in Teleommuniations, [6] T. Furon, A. Guyader, and F. Cérou. On the design and otimization of tardos robabilisti fingerrinting odes. In 10th International Worksho on Information Hiding, IH 08, Santa Barbara, California, USA, May [7] T. Furon, L. Pérez-Freire, A. Guyader, and F. Cérou. Estimating the minimal length of tardos ode. In Information Hiding, Darmstadt, Germany, jun Aeted. [8] T. K. Moon. The exetation-maximization algorithm. IEEE Signal Proessing Magazine, 13(6):47 60, November [9] P. Moulin. Universal fingerrinting: aaity and random-oding exonents. IEEE Transations on Information Theory, January Submitted. Prerint available at htt://arxiv.org/abs/ [10] K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe, K. Ogawa, and H. Imai. An imrovement of Tardos s ollusion-seure fingerrinting odes with very short lengths. In Pro. 9th International Worksho on Information Hiding, IH 07, volume 4851 of LNCS, ages 80 89, Saint Malo, Frane, June [11] B. Skori, T. Vladimirova, M. Celik, and J. Talstra. Tardos fingerrinting is better than we thought. arxiv:s/ v1, July [12] G. Tardos. Otimal robabilisti fingerrint odes. In Pro. of the 35th annual ACM symosium on theory of omuting, ages , San Diego, CA, USA, ACM.
Risk Analysis in Water Quality Problems. Souza, Raimundo 1 Chagas, Patrícia 2 1,2 Departamento de Engenharia Hidráulica e Ambiental
Risk Analysis in Water Quality Problems. Downloaded from aselibrary.org by Uf - Universidade Federal Do Ceara on 1/29/14. Coyright ASCE. For ersonal use only; all rights reserved. Souza, Raimundo 1 Chagas,
More informationProportional-Integral-Derivative PID Controls
Proortional-Integral-Derivative PID Controls Dr M.J. Willis Det. of Chemial and Proess Engineering University of Newastle e-mail: mark.willis@nl.a.uk Written: 7 th November, 998 Udated: 6 th Otober, 999
More informationCSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 10: The Bayesian way to fit models. Geoffrey Hinton
CSC31: 011 Introdution to Neural Networks and Mahine Learning Leture 10: The Bayesian way to fit models Geoffrey Hinton The Bayesian framework The Bayesian framework assumes that we always have a rior
More informationINFORMATION TRANSFER THROUGH CLASSIFIERS AND ITS RELATION TO PROBABILITY OF ERROR
IFORMATIO TRAFER TROUG CLAIFIER AD IT RELATIO TO PROBABILITY OF ERROR Deniz Erdogmus, Jose C. Prini Comutational euroengineering Lab (CEL, University of Florida, Gainesville, FL 6 [deniz,rini]@nel.ufl.edu
More informationCONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)
Global J. of Arts & Mgmt., 0: () Researh Paer: Samath kumar et al., 0: P.07- CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)
More informationPanos Kouvelis Olin School of Business Washington University
Quality-Based Cometition, Profitability, and Variable Costs Chester Chambers Co Shool of Business Dallas, TX 7575 hamber@mailosmuedu -768-35 Panos Kouvelis Olin Shool of Business Washington University
More informationEconS 503 Homework #8. Answer Key
EonS 503 Homework #8 Answer Key Exerise #1 Damaged good strategy (Menu riing) 1. It is immediate that otimal rie is = 3 whih yields rofits of ππ = 3/ (the alternative being a rie of = 1, yielding ππ =
More informationFast, Approximately Optimal Solutions for Single and Dynamic MRFs
Fast, Aroximately Otimal Solutions for Single and Dynami MRFs Nikos Komodakis, Georgios Tziritas University of Crete, Comuter Siene Deartment {komod,tziritas}@sd.uo.gr Nikos Paragios MAS, Eole Centrale
More informationELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2
ELG 5372 Error Control Coding Claude D Amours Leture 2: Introdution to Coding 2 Deoding Tehniques Hard Deision Reeiver detets data before deoding Soft Deision Reeiver quantizes reeived data and deoder
More informationarxiv: v1 [cs.db] 30 Jun 2012
Mining Statistially Signifiant Substrings using the Chi-Square Statisti Mayank Sahan mayasa@se.iitk.a.in Det. of Comuter Siene and Engineering Indian Institute of Tehnology, Kanur INDIA Arnab Bhattaharya
More informationINTUITIONISTIC FUZZY SOFT MATRIX THEORY IN MEDICAL DIAGNOSIS USING MAX-MIN AVERAGE COMPOSITION METHOD
Journal of Theoretial and lied Information Tehnology 10 th Setember 014. Vol. 67 No.1 005-014 JTIT & LLS. ll rights reserved. ISSN: 199-8645 www.atit.org E-ISSN: 1817-3195 INTUITIONISTI FUZZY SOFT MTRIX
More informationEE451/551: Digital Control. Relationship Between s and z Planes. The Relationship Between s and z Planes 11/10/2011
/0/0 EE45/55: Digital Control Chater 6: Digital Control System Design he Relationshi Between s and Planes As noted reviously: s j e e e e r s j where r e and If an analog system has oles at: s n jn a jd
More informationBLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES
BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES Luis Pérez-Freire, Teddy Furon To cite this version: Luis Pérez-Freire, Teddy Furon. BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING
More informationCSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 11: Bayesian learning continued. Geoffrey Hinton
CSC31: 011 Introdution to Neural Networks and Mahine Learning Leture 11: Bayesian learning ontinued Geoffrey Hinton Bayes Theorem, Prior robability of weight vetor Posterior robability of weight vetor
More informationA General Approach for Analysis of Actuator Delay Compensation Methods for Real-Time Testing
The th World Conferene on Earthquake Engineering Otober -7, 8, Beijing, China A General Aroah for Analysis of Atuator Delay Comensation Methods for Real-Time Testing Cheng Chen and James M. Riles Post-dotoral
More informationOn Some Coefficient Estimates For Certain Subclass of Analytic And Multivalent Functions
IOSR Journal of Mathematis (IOSR-JM) e-issn: 78-578, -ISSN: 9-765X. Volume, Issue 6 Ver. I (Nov. - De.06), PP 58-65 www.iosrournals.org On Some Coeffiient Estimates For Certain Sublass of nalyti nd Multivalent
More informationMaintaining prediction quality under the condition of a growing knowledge space. A probabilistic dynamic model of knowledge spaces quality evolution
Maintaining redition quality under the ondition of a growing knowledge sae Christoh Jahnz ORCID: 0000-0003-3297-7564 Email: jahnz@gmx.de Intelligene an be understood as an agent s ability to redit its
More informationUSING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS
Journal of Engineering Studies and Researh Volume 19 (2013) No. 1 47 USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS DUSAN PETKOVIC 1, MIROSLAV RADOVANOVIC 1 1 University of Nis,
More informationFalse Negative probabilities in Tardos codes
False Negative probabilities in Tardos odes Antonino Simone Boris Škorić Abstrat Forensi watermarking is the appliation of digital watermarks for the purpose of traing unauthorized redistribution of ontent.
More informationSolutions of burnt-bridge models for molecular motor transport
PHYSICAL REVIEW E 75, 0390 2007 Solutions of burnt-bridge models for moleular motor transort Alexander Yu. Morozov, Ekaterina Pronina, and Anatoly B. Kolomeisky Deartment of Chemistry, Rie University,
More informationEXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL
MATHEMATICS OF OPERATIONS RESEARCH Vol. 28, No. 3, August 2003,. 497 523 Printed in U.S.A. EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL AHARON BEN-TAL, ARKADI NEMIROVSKI, and CORNELIS
More informationTardos codes for real
Tardos codes for real Teddy Furon, athieu esoubeaux To cite this version: Teddy Furon, athieu esoubeaux. Tardos codes for real. IEEE Worksho on Information Forensics and Security, ec 2014, Atlanta, United
More informationMessage Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption
Message Partitioning and Liited Auxiliary Randoness: Alternatives to Honey Enrytion AirEad Ghassai, Daniel Cullina, and Negar Kiyavash Deartent of ECE and Deartent of ISE, Coordinated Siene Laboratory
More information2.2 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES
Essential Miroeonomis -- 22 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES Continuity of demand 2 Inome effets 6 Quasi-linear, Cobb-Douglas and CES referenes 9 Eenditure funtion 4 Substitution effets and
More informationApplication of Drucker-Prager Plasticity Model for Stress- Strain Modeling of FRP Confined Concrete Columns
Available online at www.sienediret.om Proedia Engineering 14 (211) 687 694 The Twelfth East Asia-Paifi Conferene on Strutural Engineering and Constrution Aliation of Druker-Prager Plastiity Model for Stress-
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationNONLINEAR MODEL: CELL FORMATION
ational Institute of Tehnology Caliut Deartment of Mehanial Engineering OLIEAR MODEL: CELL FORMATIO System Requirements and Symbols 0-Integer Programming Formulation α i - umber of interell transfers due
More informationThe Effectiveness of the Linear Hull Effect
The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports
More informationarxiv: v2 [cs.ai] 16 Feb 2016
Cells in Multidimensional Reurrent Neural Networks arxiv:42.2620v2 [s.ai] 6 Feb 206 Gundram Leifert Tobias Sauß Tobias Grüning Welf Wustlih Roger Labahn University of Rostok Institute of Mathematis 805
More informationSimple Cyclic loading model based on Modified Cam Clay
Simle li loading model based on Modified am la Imlemented in RISP main rogram version 00. and higher B Amir Rahim, The RISP onsortium Ltd Introdution This reort resents a simle soil model whih rovides
More informationsilicon wafers p b θ b IR heater θ h p h solution bath cleaning filter bellows pump
An Analysis of Cometitive Assoiative Net for Temerature Control of RCA Cleaning Solutions S Kurogi y, H Nobutomo y, T Nishida y, H Sakamoto y, Y Fuhikawa y, M Mimata z and K Itoh z ykyushu Institute of
More informationAny AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer
Any AND-OR formula of size N an be evaluated in time N /2+o( on a quantum omuter Andris Ambainis, ambainis@math.uwaterloo.a Robert Šalek salek@ees.berkeley.edu Andrew M. Childs, amhilds@uwaterloo.a Shengyu
More informationENHANCED BLIND DECODING of TARDOS CODES with NEW MAP-BASED FUNCTIONS
ENHANCED BLIND DECODING of TARDOS CODES with NEW MAP-BASED FUNCTIONS Mathieu Desoubeaux #1, Cédric Herzet 2, William Puech #, Gaëtan Le Guelvouit o # University of Montpellier 2 - LIRMM - 3495 - Montpellier
More informationAssessing the Performance of a BCI: A Task-Oriented Approach
Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,
More informationSubject: Modeling of Thermal Rocket Engines; Nozzle flow; Control of mass flow. p c. Thrust Chamber mixing and combustion
16.50 Leture 6 Subjet: Modeling of Thermal Roket Engines; Nozzle flow; Control of mass flow Though onetually simle, a roket engine is in fat hysially a very omlex devie and diffiult to reresent quantitatively
More informationReal-time Hand Tracking Using a Sum of Anisotropic Gaussians Model
Real-time Hand Traking Using a Sum of Anisotroi Gaussians Model Srinath Sridhar 1, Helge Rhodin 1, Hans-Peter Seidel 1, Antti Oulasvirta 2, Christian Theobalt 1 1 Max Plank Institute for Informatis Saarbrüken,
More information3. THE SOLUTION OF TRANSFORMATION PARAMETERS
Deartment of Geosatial Siene. HE SOLUION OF RANSFORMAION PARAMEERS Coordinate transformations, as used in ratie, are models desribing the assumed mathematial relationshis between oints in two retangular
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationInvestigation of the Potential of Long Wave Radiation Heating to Reduce Energy Consumption for Greenhouse Heating
Investigation of the Potential of Long Wave Radiation Heating to Redue Energy Consumtion for Greenhouse Heating A. Kavga S. Pantelakis and Th. Panidis Deartment of Mehanial Engineering & Aeronautis University
More informationOPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS
International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 3 OPTIMIZE COOPERATIVE SPECTRUM-SENSING IN CLUSTERE COGNITIVE RAIO NETWORKS ABSTRACT Birsen Sirkei-Mergen and Wafa-Iqbal
More informationThe Spread of Internet Worms and the Optimal Patch Release Strategies
Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 5 Proeedings Amerias Conferene on Information Systems (AMCIS) 5 The Sread of Internet Worms and the Otimal Path Release Strategies
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationarxiv: v1 [cs.gt] 21 Jul 2017
RSU II ommuniation Cyber attaks Otimal Seure Multi-Layer IoT Network Design Juntao Chen, Corinne Touati, and Quanyan Zhu arxiv:1707.07046v1 [s.gt] 1 Jul 017 Abstrat With the remarkable growth of the Internet
More informationTOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS
TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS Jean-Charles Antonioli ONERA Air Base 70 366 Salon de Provene Frane Armin
More informationOn a Networked Automata Spacetime and its Application to the Dynamics of States in Uniform Translatory Motion
On a Networked Automata Saetime and its Aliation to the Dynamis of States in Uniform Translatory Motion Othon Mihail Deartment of Comuter Siene, University of Liverool, Liverool, UK Othon.Mihail@liverool.a.uk
More informationNUMERICAL SIMULATIONS OF METAL ONTO COMPOSITES CASTING
NUMERICAL SIMULATIONS OF METAL ONTO COMPOSITES CASTING E. Marklund 1, D. Mattsson 2, M. Svanberg 2 and M. Wysoki 1* 1 Swerea SICOMP AB, Box 14, SE-431 22 Mölndal, Sweden 2 Swerea SICOMP AB, Box 271, SE-941
More informationSYNTHESIS AND OPTIMIZATION OF EPICYCLIC-TYPE AUTOMATIC TRANSMISSIONS BASED ON NOMOGRAPHS
Al-Qadisiya Journal For Engineering Sienes Vol. 4 o. 3 Year 0 SYTHESIS AD OPTIMIZATIO OF EPICYCLIC-TYPE AUTOMATIC TASMISSIOS BASED O OMOGAPHS E. L. Esmail K. H. Salih Leturer Assistant Leturer Deartment
More informationConcerning the Numbers 22p + 1, p Prime
Conerning the Numbers 22p + 1, p Prime By John Brillhart 1. Introdution. In a reent investigation [7] the problem of fatoring numbers of the form 22p + 1, p a, was enountered. Sine 22p + 1 = (2P - 2*
More informationExperimental study with analytical validation of thermo-hydraulic performance of plate heat exchanger with different chevron angles
Exerimental study with analytial validation of thermo-hydrauli erformane of late heat exhanger with different hevron angles Arunahala U C, Ajay R K and Sandee H M Abstrat The Plate heat exhanger is rominent
More informationThe Holey Grail A special score function for non-binary traitor tracing
The Holey Grail A special score function for non-binary traitor tracing B. Škorić, J.-J. Oosterwijk, J. Doumen Abstract We study collusion-resistant traitor tracing in the simple decoder approach, i.e.
More informationTuple decoders for traitor tracing schemes
Tuple deoders for traitor traing shees Jan-Jaap Oosterwijk a,b, Jeroen Douen b, Thijs Laarhoven a a Eindhoven University of Tehnology, P.O. Box 53, 5600 MB Eindhoven, The Netherlands; b Irdeto B.V., P.O.
More informationNonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationMillennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationCase I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1
MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues
More informationMulti-version Coding for Consistent Distributed Storage of Correlated Data Updates
Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed
More informationBroadcast Channels with Cooperating Decoders
To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider
More informationTakeshi Kurata Jun Fujiki Katsuhiko Sakaue. 1{1{4 Umezono, Tsukuba-shi, Ibaraki , JAPAN. fkurata, fujiki,
Ane Eiolar Geometry via Fatorization Method akeshi Kurata Jun Fujiki Katsuhiko Sakaue Eletrotehnial Laboratory {{4 Umezono, sukuba-shi, Ibaraki 305-8568, JAPAN fkurata, fujiki, sakaueg@etl.go.j Abstrat
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationComputer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1
Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random
More informationClose range effects on a concrete wall of an underwater explosion A numerical approach
Close range effets on a onrete wall of an underwater exlosion A numerial aroah O. Loiseau, K. Cheval & B. Autrusson Institut de Radiorotetion et de Sûreté Nuléaire (IRSN), BP 17, 92262 Fontenay-Aux-Roses
More informationOn the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION
5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.
More informationA MULTIRATE APPROACH TO DDS ALGORITHM VERSUS TAYLOR-SERIES EXPANSION TECHNIQUE
A ULTIRATE APPROACH TO DDS ALGORITH VERSUS TAYLOR-SERIES EXPANSION TECHNIQUE Ewa Hermanowiz 1 and iroslaw Rojewski Faulty of Eletronis, Teleommuniations and Informatis, Gdansk University of Tehnology,
More informationMaximum entropy generation rate in a heat exchanger at constant inlet parameters
Maximum entroy generation rate in a heat exhanger at onstant inlet arameters Rafał LASKOWSKI, Maiej JAWORSKI Online: htt://www.jmee.tu.koszalin.l/download_artile/jmee_7 7986.df Cite this artile as: Laskowski
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationThe Effect of Gauge Measurement Capability and Dependency Measure of Process Variables on the MC p
Journal of Industrial and Systems Engineering Vol. 4, No., 59-76 Sring The Effet of Gauge easurement Caability and Deendeny easure of Proess Variables on the C Daood Shishebori, Ali Zeinal Hamadani Deartment
More informationSummary of EUV Optics Contamination Modeling Meeting
Summary of EUV Otis Contamination Modeling Meeting IEUVI Otis Contamination/Lifetime TWG San Jose, CA, USA February 28, 2008 Andrea Wüest, SEMATECH Shannon Hill, NIST Lennie Klebanoff, Sandia Nat. Lab.
More informationEmergence of Superpeer Networks: A New Perspective
Emergene o Suereer Networs: A New Persetive Bivas Mitra Deartment o Comuter Siene & Engineering Indian Institute o Tehnology, Kharagur, India Peer to Peer arhiteture Node Node Node Internet Node Node All
More informationThe Constrainedness of Search. constrainedness. Surprisingly, we can often characterize. an ensemble of problems using just two parameters:
In Proeedings of AAAI-96. Amerian Assoiation for Artiial Intelligene, 1996. The Constrainedness of Searh Ian P. Gent and Ewan MaIntyre and Patrik Prosser Deartment of Comuter Siene University of Strathlyde
More informationTheory of the Integer and Fractional Quantum Hall Effects
Theory of the Integer and Frational Quantum all Effets Shosuke SASAKI Center for Advaned igh Magneti Field Siene, Graduate Shool of Siene, Osaka University, - Mahikaneyama, Toyonaka, Osaka 56-, Jaan Prefae
More informationSOLVED QUESTIONS 1 / 2. in a closed container at equilibrium. What would be the effect of addition of CaCO 3 on the equilibrium concentration of CO 2?
SOLVED QUESTIONS Multile Choie Questions. and are the veloity onstants of forward and bakward reations. The equilibrium onstant k of the reation is (A) (B) (C) (D). Whih of the following reations will
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationCS 687 Jana Kosecka. Uncertainty, Bayesian Networks Chapter 13, Russell and Norvig Chapter 14,
CS 687 Jana Koseka Unertainty Bayesian Networks Chapter 13 Russell and Norvig Chapter 14 14.1-14.3 Outline Unertainty robability Syntax and Semantis Inferene Independene and Bayes' Rule Syntax Basi element:
More informationAdaptive neuro-fuzzy inference system-based controllers for smart material actuator modelling
Adaptive neuro-fuzzy inferene system-based ontrollers for smart material atuator modelling T L Grigorie and R M Botez Éole de Tehnologie Supérieure, Montréal, Quebe, Canada The manusript was reeived on
More informationSingular Event Detection
Singular Event Detetion Rafael S. Garía Eletrial Engineering University of Puerto Rio at Mayagüez Rafael.Garia@ee.uprm.edu Faulty Mentor: S. Shankar Sastry Researh Supervisor: Jonathan Sprinkle Graduate
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationDEB-oriented Modelling and Control of Coal-Fired Power Plant
Prerints of the 9th World Congress he International Federation of Automati Control Cae own, South Afria. August 4-9, 4 DEB-oriented Modelling and Control of Coal-Fired Power Plant Li Sun*. Junyi Dong*.
More informationThe Procedure of Finding the Stress-Energy. Tensor and Equations of Vector Field of Any Form
Advaned Studies in Theoretial Phsis Vol. 8, 14, no. 18, 771-779 HIKARI Ltd, www.m-hikari.om htt://d.doi.org/1.1988/ast.14.4711 The Proedure of Finding the Stress-Energ Tensor and Equations of Vetor Field
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationWEIGHTED MAXIMUM OVER MINIMUM MODULUS OF POLYNOMIALS, APPLIED TO RAY SEQUENCES OF PADÉ APPROXIMANTS
WEIGHTED MAXIMUM OVER MINIMUM MODULUS OF POLYNOMIALS, APPLIED TO RAY SEQUENCES OF PADÉ APPROXIMANTS D.S. LUBINSKY Abstrat. Let a 0; " > 0. We use otential theory to obtain a shar lower bound for the linear
More information7 Max-Flow Problems. Business Computing and Operations Research 608
7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates
More informationAI*IA 2003 Fusion of Multiple Pattern Classifiers PART III
AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers
More informationOptimal control of inverted pendulum system using PID controller, LQR and MPC
IOP Conferene Series: aterials Siene and Engineering PAPER OPEN ACCESS Otimal ontrol of inverted endulum system using PID ontroller, LQR and PC To ite this artile: Elisa Sara Varghese et al 7 IOP Conf.
More informationSupplementary Materials
Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More informationA new Automatic Formant Tracking approach based on scalogram maxima detection using complex wavelets
A new Automati Formant Traking aroah based on salogram maxima detetion using omlex wavelets Imen Jemaa, Kais Ouni, Yves Larie, Slim Ouni, Jean-Paul Haton To ite this version: Imen Jemaa, Kais Ouni, Yves
More informationSTA 250: Statistics. Notes 7. Bayesian Approach to Statistics. Book chapters: 7.2
STA 25: Statistics Notes 7. Bayesian Aroach to Statistics Book chaters: 7.2 1 From calibrating a rocedure to quantifying uncertainty We saw that the central idea of classical testing is to rovide a rigorous
More informationASYMPTOTIC ANALYSIS OF ITERATIVE CHANNEL ESTIMATION AND MULTIUSER DETECTION WITH SOFT FEEDBACK IN MULTIPATH CHANNELS
6th uroean Signal Proessing Conferene USIPCO 8, Lausanne, Switzerland, August 5-9, 8, oyright by URASIP ASYPTOTIC ANALYSIS OF ITRATIV CHANNL STIATION AND ULTIUSR DTCTION WITH SOFT FDBAC IN ULTIPATH CHANNLS
More informationFlow Characteristics of High-Pressure Hydrogen Gas in the Critical Nozzle
Flow Charateristis of High-Pressure Hydrogen Gas in the Critial Nozzle Shigeru MATSUO *1, Soihiro KOYAMA *2, Junji NAGAO *3 and Toshiaki SETOGUCHI *4 *1 Saga University, Det. of Mehanial Engineering, 1
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More information, given by. , I y. and I z. , are self adjoint, meaning that the adjoint of the operator is equal to the operator. This follows as A.
Further relaxation 6. ntrodution As resented so far the theory is aable of rediting the rate of transitions between energy levels i.e. it is onerned with oulations. The theory is thus erfetly aetable for
More informationFundamental Theorem of Calculus
Chater 6 Fundamental Theorem of Calulus 6. Definition (Nie funtions.) I will say that a real valued funtion f defined on an interval [a, b] is a nie funtion on [a, b], if f is ontinuous on [a, b] and integrable
More informationOn the Designs and Challenges of Practical Binary Dirty Paper Coding
On the Designs and Challenges of Pratial Binary Dirty Paper Coding 04 / 08 / 2009 Gyu Bum Kyung and Chih-Chun Wang Center for Wireless Systems and Appliations Shool of Eletrial and Computer Eng. Outline
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationCMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017
CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,
More informationChapter 8 Hypothesis Testing
Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two
More informationApplications of Complex Analysis to Celestial Navigation
Aliations of Comlex Analysis to Celestial Navigation Robin G. Stuart Valhalla, New York, USA Abstrat Maing oints on the shere by stereograhi rojetion to oints on the lane of omlex numbers transforms the
More informationAn Efficient Implementation of Linear-Phase FIR Filters for Rational Sampling Rate Conversion
An Effiient Imlementation of inear-pase FIR Filters for Rational Samling Rate Conversion Priyati Guta 1, Amita Verma 2, Ravikant Sarma 3 Deartment of Eletronis and Communiation Engineering, Green ills
More informationParallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret
Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat
More information