EM Decoding of Tardos Traitor Tracing Codes

Size: px
Start display at page:

Download "EM Decoding of Tardos Traitor Tracing Codes"

Transcription

1 Author manusrit, ublished in "ACM Multimedia and Seurity (2009)" EM Deoding of Tardos Traitor Traing Codes Teddy Furon Thomson Seurity Cometene Center 1, av. Belle Fontaine Cesson Sévigné, Frane Luis Pérez-Freire Gradiant, ETSI Teleom. Lagoas Marosende s/n, Vigo, Sain ABSTRACT This aer rooses a major shift in the deoding of robabilisti Tardos traitor traing ode. The goal of the deoder is to ause olluders but it ignores how they have been mixing their oies in order to forge the irated ontent. As originally roosed by Tardos, so far roosed deoders are agnosti and their erformanes are stable with reset to this unknown ollusion attak. However, this stability automatially leads to non-otimality from a detetion theory ersetive. This is the reason why this aer rooses to estimate the ollusion attak in order to aroximate the otimal mathed deoder. This is done iteratively thanks to the aliation of the well-known Exetation-Maximization algorithm. We have droed the stability: the ower of our deoding algorithm deely deends on the ollusion attak. Some attaks are worse than others. However, even for the worst ollusion hannel, our deoder erforms better than the original Tardos deoding. Categories and Subjet Desritors D.4.6 [Software]: Seurity and Protetion Information flow ontrols General Terms Algorithms Keywords Traitor traing, fingerrinting, ollusion, iterative deoding, Exetation-Maximization 1. INTRODUCTION This artile deals with traitor traing whih is also known as ative fingerrinting, ontent serialization, user forensis or transational watermarking. The tyial aliation is The seond author ontributes to this work while he was at Thomson Seurity Lab Permission to make digital or hard oies of all or art of this work for ersonal or lassroom use is granted without fee rovided that oies are not made or distributed for rofit or ommerial advantage and that oies bear this notie and the full itation on the first age. To oy otherwise, to reublish, to ost on servers or to redistribute to lists, requires rior seifi ermission and/or a fee. MM&Se 09, Setember 7 8, 2009, Prineton, New Jersey, USA. Coyright 2009 ACM /09/09...$ as follows: A video on demand server distributes ersonal oies of the same ontent to n buyers. Some are dishonest users whose goal is to illegally redistribute a irate oy. The rights holder is interested in identifying these dishonest users. For this urose, a unique user identifier onsisting on a sequene of m symbols is embedded in eah video ontent thanks to a watermarking tehnique, thus roduing n different (although eretually similar) oies. This allows traing bak whih user has illegally redistributed his oy. However, there might be a ollusion of dishonest users, > 1. This ollusion mixes their oies in order to forge a irated ontent whih ontains none of the identifiers but a mixture of them. The traitor traing ode invented by Gabor Tardos in 2003 [12] beomes more and more oular. The reader will find a edagogial review of this ode in [6]. This ode is a robabilisti weak fingerrinting ode, where the robability of ausing an innoent is not null but very low. The deoding of this ode is foused, in the sense that it states whether or not a given user is guilty. Its erformanes are usually evaluated in terms of the robability ǫ 1 of ausing an innoent and the robability of missing all olluders ǫ 2. Most of the artiles dealing with the Tardos ode aim at finding a tight lower bound of the required length of the ode for a given ǫ 1 [11, 2]. Other works roose more ratial imlementations of the Tardos ode suh as [10]. A reent trend is to analyze this ode from the information theory viewoint, and to tune the arameter (namely the time sharing distribution f()) at the ode generation side to maximize the ahievable rate, ie. to ahieve aaity [1, 9]. In this aer, we study the other end of the hain: the ausation side. We are onerned with deoding of, in general, robabilisti traitor traing odes, and in artiular, those originally roosed by G. Tardos. The deoding algorithms roosed by Tardos and Skori [12, 11] ose the remarkable roerty of roviding stable erformane indeendently of the ollusion hannel, rovided that the latter fulfills the so-alled marking assumtion [3]. We alled this rationale the agnosti deoding strategy sine it does not use any information about the ollusion hannel. Its main advantage is that the bound on the minimal ode length holds whatever the ollusion attak. However, this deoding strategy suffers from three drawbaks. First, this agnosti deoding strategy has a too strong ouling between the ausation algorithm and the ode generation, sine it was designed for an seifi f(). However, some reent works [1] have shown, from a game-theoreti viewoint, that the otimal time sharing distribution f()

2 is strongly deendent on the number of olluders and may signifiantly deviate from the f() originally roosed by Tardos. In suh onditions, the stable erformane roerty of the agnosti deoder is no longer granted. Seond, the stable erformane roerty doesn t hold either whenever the marking assumtion is not enfored. For instane, when the hannel introdues random errors, deoding erformane raidly dereases. Third, this agnosti deoding is highly subotimal from a hyothesis testing theory viewoint. Thus, although the ode onstrution is rovably good, Tardos deoding rovides stable erformanes indeendently of the ollusion hannel at the ost of high subotimality. This is the reason why we roose a omlete shift in the deoding strategy. Instead of ignoring the ollusion hannel, our deoding estimates it in order to use the mathed otimal deoder. This is done iteratively thanks to an aliation of the well-known Exetation-Maximization algorithm [8]. We have droed the stable erformane roerty: the ower of our deoding algorithm deely deends on the ollusion attak. Some attaks are worse than others. However, we are able to show that even for the worst ollusion hannel, our deoder erforms better than the original Tardos deoding. 2. THE MATHEMATICAL MODEL The robability that the random variable A defined over the alhabet A takes the ourene a is denoted by P A[a]. Vetors and matries are written in boldfae. 2.1 Code generation We briefly remind how the Tardos ode is designed. The binary ode X is omosed of n sequenes of m bits. The sequene X j = (X j1,, X jm) identifying user j is omosed of m binary symbols. Indeed, these symbols are drawn indeendently suh that P Xji [1] = i, i [m], with [m] denoting {1,..., m}. {P i} i [m] are indeendent and identially distributed auxiliary random variables in the range [0, 1]: P i f(). Tardos roosed the following df, f() = (π (1 ) 1, whih is symmetri around 1/2: f() = f(1 ). It means that symbols 1 and 0 lay a similar role with robability or 1. The atual ourrenes { i} i [m] of these random variables are drawn one for all at the initialization of the ode, and they onstitute its seret key. 2.2 The ollusion hannel Denote the subset of olluder indies by C = {j 1,, j }, and X C = {X j1,...,x j } the restrition of the traitor traing ode to this subset. The ollusion attak is the roess of taking sequenes in X C as inuts and yielding the irated sequene Y as an outut. Fingerrinting odes have been first studied by the rytograhi ommunity and a key-onet is the marking assumtion introdued by Boneh and Shaw [3]. It states that, in its narrow-sense version, whatever the strategy of the ollusion C, we have Y i {x j1 i,, x ji}. In words, olluders forge the irated oy by assembling hunks from their ersonal oies. It imlies that if, at index i, the olluders symbols are idential, then this symbol value is deoded at the i-th hunk of the irated oy. Our mathematial model of the ollusion is essentially based on four main assumtions. The first assumtion is the memoryless nature of the ollusion attak. Sine the symbols of the ode are indeendent, it seems relevant that the irated sequene Y also shares this roerty. Therefore, the value of Y i only deends on {X j1 i,, X ji}. The seond assumtion is the stationarity of the ollusion roess. We assume that the ollusion strategy is indeendent of the index i in the sequene. Therefore, we an desribe it for any index i, and we will dro indexing for sake of larity in the sequel. The third assumtion is the exhangeable nature of the ollusion: the olluders selet the value of the symbol Y deending on the values of their symbols, but not on their order. Therefore, the inut of the ollusion roess is indeed the tye of their symbols (i.e. the emirial robability mass funtion). In the binary ase, this tye is fully defined by the following suffiient statisti: the number Σ i of symbols 1 : Σ i = P k=1 Xj ki. The fourth assumtion is that the ollusion roess may be deterministi (for instane, majority vote, minority vote), or random (for instane, the symbol asted in the irated sequene is deided uon a oin fli). These four assumtions yield that the ollusion attak is fully desribed by the following arameter: θ = {θ 0,..., θ }, with θ σ = P Y [1 Σ = σ] whih reads as the robability that olluders ut a 1 when they have σ 1 among their symbols. There is thus an infinity of ollusion attaks, but we an already state that they all share the following roerty: The marking assumtion enfores that θ 0 = 0 and θ = 1. A ollusion attak is thus defined by 1 real values in the hyerube [0,1] 1. Here are some examles where θ is given for = 4: Random. The olluders randomly draw one of their symbols: θ = (0, 1/4, 1/2, 3/4, 1). Majority. The olluders ut the most frequent symbol: θ = (0,0, 1/2, 1, 1). Minority. The olluders ut the less frequent symbol: θ = (0,1, 1/2, 0, 1). Coin fli. The olluders fli a oin to deide: θ = (0,1/2, 1/2, 1/2, 1/2, 1). Worst Case Attak (WCA) is the attak minimizing E P [D(P, θ)] and hene the loss (14) (See Set. 3.1). More details are given in [7]. A minimization algorithm gives θ = (0, 0.488, 0.50, 0.512, 1). 2.3 The agnosti deoder The most well-sread deoding algorithm is the symmetri version of the Tardos deoding funtion roosed by B. Skori et al [11]. One the sequene Y is extrated from the irated ontent, the algorithm alulates a sore for any user: s j = P m i=1 U(yi,xji, i), j [n], with r r 1 U(1,1, ) = U(0, 0, ) = (1) 1 r r 1 U(1, 0, ) = U(0, 1, ) = 1 (2) Statistially, the sores of the olluders are bigger than the sores of the innoents. The deoding auses the user with the biggest sore, or, as originally roosed by Tardos, the users whose sores are above a given threshold.

3 Asymtotially, as m, the sores are distributed aording to two Gaussian distribution (basi aliation of the Central Limit Theorem): Innoent: S j N(0, m), (3) Colluder: S j N(2π 1 m 1, m(1 4π 2 2 )).(4) 3. THE INFORMED DECODER This setion rovides some arguments why the agnosti deoding strategy is not otimal. 3.1 Kullbak Leibler distane Our first argument is taken from lassial hyothesis testing theory [5, Cha. 12]. The ausation is indeed a test based on the observations (X j,y) that onsists of heking whih of the two following hyothesis is true: H 0: User j is innoent, H 1: User j is a olluder. The ausation roess is omosed of two building bloks: the alulus of the sore and the omarison to a threshold. By Stein s Lemma, the best asymtoti false ositive error exonent is given by the Kullbak Leibler distane between the dfs under hyothesis H 1 and H 0, whih is given by D(P Y,Xj H 1 P Y,Xj H 0 ). (5) Unless the statisti used in the deision is a suffiient statisti, the atual asymtoti error exonent of a given test is neessarily smaller. In the Tardos deoder, it is not ossible to evaluate the Kullbak Leibler distane of the sores S j of Set. 2.3, exet in the asymtotial regime when the df are deemed Gaussian. Then the Kullbak Leibler distane between the df of the sores D(P Sj H 1 P Sj H 0 ) is given by: D(P Sj H 1 P Sj H 0 ) = 2m 2 π 2 log(1 4 π 2 ) + 4 «. (6) 2 π 2 2 As this holds for m, the dominating term is 2m 2 π 2. The mathematial model of the ollusion of Se. 2.2 allows us to evaluate (5) before the soring funtion. First, the memoryless roerty of the ollusion hannel and the indeendene of the bits of the ode sequene simlifies not only the distributions under both hyothesis H l with l {0, 1}: but also the distane: P Y,Xj H l = D(P Y,Xj H 1 P Y,Xj H 0 ) = my P Yi,X ji H l, (7) i=1 mx D(P Yi,X ji H 1 P Yi,X ji H 0 ) i=1 Under H 0, X ji is statistially indeendent of Y i: (8) P Yi,X ji H 0 [y, x] = P Yi [y]p Xji [x], (9) with P Xji [x] = x i (1 i) (1 x). The robability of the irated symbol is slightly more omlex and involves the ollusion model introdued in Set. 2.2: X P Yi [1] = θ σp Σi [σ], (10) σ=0 with P Σi [σ] = ( σ) σ i (1 i) σ, the robability that olluders have σ times the symbols 1 at index i. Obviously, P Yi [0] = 1 P Yi [1]. Under H 1, X ji was used to reate Y i: P Yi,X ji H 1 [y, x] = P Yi X ji,h 1 [y x]p Xji [x]. (11) This onditional robability is slightly different than (10): P Yi X ji,h 1 [1 x] = 1+x X σ=x ` 1 θ σ σ x σ x i (1 i) 1+2x σ. (12) Having the exressions of all the robabilities, it is straight forward to alulate eah summand of (8) as a funtion D( i, θ) of i. Averaging over the ensemble of auxiliary sequenes, we obtain: D(P Y,Xj H 1 P Y,Xj H 0 ) = me P [D(P, θ)], (13) with E P [a(p)] the exetation of a(p), ie. R 1 0 a()f()d. The Kullbak-Leibler distane of the inut sequenes is strongly deendent on the ollusion hannel. The loss due to the use of the agnosti deoder is therefore asymtotially equal to: λ(θ) = m(e P [D(P, θ)] 2 2 π 2 ). (14) Table 1 shows the loss for different ollusion hannels whih are ommonly addressed in the literature and defined in Se In all ases, the loss reresents at least 45% of the ahievable rate Random Majority Minority Coin fli WCA Table 1: Loss λ(θ) in erentage for some ollusion hannels. WCA stands for Worst Case Attak, ie. θ = arg min θ E P [D(P, θ)]. 3.2 The exression of the informed deoder The Neyman-Pearson theorem tells us that a sore based on any monotonially inreasing funtion of the likelihood is otimal in the sense that its loss is null. The likelihood L(y,x j) is the ratio L(y,x j) = P Y,X j H 1 [y,x j] P Y,Xj H 0 [y,x j] = m Y i=1 P Yi X ji,h 1 [y i x ji], (15) P Yi [y i] whih an be evaluated thanks to (10) and (12). Thus, the otimal deoder omutes the likelihood ratio for eah user sequene, and deems that those whose likelihood is above a ertain threshold are olluders. Nevertheless, this otimal deoder is a riori not realizable sine it needs to know in advane the ollusion size and the ollusion hannel model θ. We named it the informed deoder. Moreover, the df of this likelihood ratio is ertainly deendent of the ollusion hannel, so the ausation threshold annot be a riori fixed to guarantee a given robability of error. Instead, this threshold must be

4 y X E-ste {π j(θ (k) )} θ (k) M-ste Figure 2: Blok diagram of the iterative deoder. a funtion of θ. One again, sine the ollusion hannel is not known, this suggests that the informed deoder annot be imlemented. Figure 1 shows the ROC (Probability of false alarm vs. robability of false negative) for the agnosti deoder and the informed deoder, illustrating the huge ga. The error robabilities have been omuted using the rare event robability estimator roosed in [7]. 4. THE E.-M. DECODER This setion shows a ossible imlementation of a deoder that tries to aroximate the otimal deoder by means of estimating the ollusion hannel. We roose to aly the Exetation-Maximization algorithm [8] to our roblem. The only rior work we are aware of is [4] where the authors roose a deoding algorithm a la E.-M. or in the sirit of the E.-M. However, they do not use any likelihood funtions but adative soring Tardos funtions, whih brings a lot of sub-otimality. As exlained in Set. 3, an aroah based on ollusion hannel estimation oens the door to owerful deoding. The key idea of the EM deoder is to erform an iterative learn and math strategy: 1. Given an estimated ollusion hannel, use its mathed deoder to suset some olluders, 2. Given some suseted olluders, their sequenes and the irated sequene, build a more aurate estimate of the ollusion hannel. In other words, as we better estimate the ollusion hannel, we better ause dishonest users (i.e. we ause less innoents, and miss less olluders), and in turn, we better estimate what they have been doing as a ollusion roess. Another argument is that the deoder gets a mixture of observations {x j} whih belong to two families innoent or olluder. Therefore, deoding boils down to estimating the hidden state, a.k.a. latent variable in E.-M. literature, of eah observation. This is indeed the event H 1 that user j is a olluder. Our deoding roblem is thus very similar to a mixture modelling whih is a tyial aliation of the E.-M. algorithm. The main bloks and variables of the iterative deoder are shown in Figure 2. A detailed exlanation is given below. 4.1 E-ste The goal of the E-ste is to have a better guess about the identities of the olluders. At iteration k + 1, its inuts are the sequenes of the users and the irated sequene. It also benefits from the estimate (k) of the ollusion size and an estimate θ (k) of the ollusion hannel. It simly alulates the robability π j(θ (k) ) that user j is guilty aording to this ollusion hannel: π j(θ (k) ) = P[H 1 y,x j] (16) P Y Xj,H 1 [y x j]p[h 1] = P Y Xj,H 1 [y x j]p[h 1] + P Y Xj,H 0 [y x, j]p[h 0] where the aliation of the Bayes rules lead to the seond line. Sine there are (k) olluders out of n users, we have P[H 1] = (k) n 1 and P[H 0] = 1 (k) n 1. Note that we an integrate in these rior robabilities susiion for some user based on geograhial or behavioral arguments. Under H 0, Y is indeendent of X j, and P Y Xj,H 0 [y x j] = P Y[y]. (k) π j(θ (k) ) = (k) + (n (k) ) P Y [y] P Y Xj,H [y x 1 j ], (17) The robabilities aearing in this last equation have already been exressed in the revious setion (just relae θ by θ (k) ). 4.2 M-ste The goal of the M-ste is to have a better guess about the ollusion roess. At iteration k + 1, its inuts are the sequenes of the users, the irated sequenes, the revious estimation of the ollusion hannel θ (k) and the estimation of the identities of the olluders thanks to robabilities {π j(θ (k) )} n j=1 evaluated in the E-ste. Aording to the lassial E.-M. formulation, we an refine the estimate of the ollusion hannel by maximizing in θ the following funtional Q(θ; θ (k) ) = X s P S[s y,x,θ (k) ]log (P[X,y,s θ]). (18) The sequene s reresent the hidden state of the system. It is omosed of n binary variables indiating whih users are olluders. (18) requires that we onsider the 2 n ossible hidden states, whih is of ourse out of question for a large number of users. We need to introdue the following simlifiations: P[x j,y,s θ] = P[x j,y, s j θ], (19) ny P S[s y,x, θ] = P Sj [s j y,x j, θ]. (20) j=1 Obviously those equations are not true beause guilty users deend on eah other, but this is a relaxation needed for having affordable omlexity. Assume for the moment that is known, the E-ste refines the estimation of the ollusion hannel with the following simlified funtional with θ (k+1) = arg max θ Q (θ; θ (k) ), (21)

5 informed deoder agnosti deoder P FN (a) = 3, m = 500, n = informed deoder agnosti deoder P FN (b) = 8, m = 4500, n = 10 5 Figure 1: Probabilities of false alarm and false negative with the informed deoder and agnosti deoder, for = 3 (a) and = 8 (b). Q (θ; θ (k) ) nx = X j=1 s j ={0,1} P Sj [s j y,x j, θ (k) ] log `P Xj [x j,y, s j θ] = log (P Y[y θ]) nx + π j(θ (k) ) log `P Xj,S j [x j,1 y, θ] + j=1 nx (1 π j(θ (k) )) log `P Xj,S j [x j,0 y, θ]. (22) j=1 With some more work: P Xj,S j [x j,0 y, θ] = P Xj [x j](1 /n), (23) P Xj,S j [x j,1 y, θ] = P Xj [x j H 1, θ,y]/n (24) = P Y X j,h 1 [y x j]p Xj [x j]. (25) P Y[y]n Unfortunately there is no losed form exression for the solution of the M-ste, so it must be sought by numerial means. A tyial otimization runs as follows: 1. For a arameter starting from 1 to max, the funtion Q (θ θ (k) ) is maximized. Standard otimization algorithms like Newton-Rahson an be used to find out the otimal θ. 2. Then, the max loal maxima Q (θ θ (k) ) are omared in order to isolate the global maximum, and the arameter θ (k+1) is udated aordingly: (k+1) = arg Q (θ θ (k) ), (26) [ max] θ (k+1) = θ (k+1) (27) 4.3 Initialization and termination of the E.-M. algorithm At the beginning, the ausation roess has no idea about the values of the hidden states s, the number of olluders and +(n )/η the ollusion attak. We roose to retend that (0) = 2 and θ (0) = [0, 1/2, 1], then next omes the E.-ste. The E and M stes are iterated until some termination riterion, usually when Q(θ (k+1), θ (k) ) is no longer imroving or when a maximum number of iteration k max has been reahed. Let k f be the last iteration, the final deision of the deoder is made by omuting the likelihood ratio given in (15) with θ = θ (kf). Notie that the set of robabilities {π j(θ (kf) )} j [n] suffie for erforming the deision, beause (17) is just a monotoni maing of (15) from [0, ] to the interval [0, 1]. Hene, a threshold η [0, ] in (15) is equivalent to a threshold T = in (17). We first selet the sores bigger than T. If the number of these sores is bigger than the estimated ollusion size, we only kee the (k f) biggest ones. This seond rule avoids false alarm (to ause innoent users) and is tyially imossible with a lassial Tardos deoding. 5. EXPERIMENTAL RESULTS The exerimental work is divided in two arts. First, we investigate whether the roosed iterative deoder orretly estimates the ollusion attak. If this is the ase, then it would erform as well as the otimal mathed deoder. In any ase, it doesn t mean that no error would be ommitted, but that as few errors as theoretially ossible would be done. On the ontrary, a mismath in the estimation of the ollusion hannel doesn t imly a bad deoding as the seond art assessing the deoding erformanes shows. The exerimental setu is the following. There are n = 1000 users, we onsider ode sequenes of length m = 250 bits, and the number of olluders ranges from 3 to 9. The iterative deoder is assuming that the maximum number of olluders is 9. Hene, the arameter max introdued in Set. 4.2 is set to 9. The maximum number of iterations for the E.-M. deoder is set to k max = 5. Two ollusion attaks are onsidered: Minority vote and the Worst Case Attak. As exlained before, the erformane of the otimal deoder is largely deendent on the ollusion hannel. The urose

6 1 0.9 Minority Worst Minority Worst Prob[orret estimation] distane Figure 3: Probabilities P[C (k f) = ] for m = Figure 4: Distanes d(θ (k f), θ) for m = 400. of fousing in these two artiular attaks is to illustrate the erformane of our deoder against a gentle attak (Minority) and against the worst attak, resetively (.f. Tab. 1). 5.1 Auray of the estimated ollusion attak Estimation of the ollusion size The first exeriment is a Monte-Carlo simulation with N = 1000 runs. Eah run generates a seret sequene and a ode X of n sequenes, of these ollude, and the E.- M. deoding roeeds with the reeived irated sequene. We measure the robability of orretly estimating the ollusion size by the ratio of the number of times where (k f) equals divided by N. Fig 3 shows that this robability dereases as the ollusion attak is worse: more olluders and/or more harmful roess Estimation of the ollusion roess With the same exeriment, when the estimate of the ollusion side is orret, we measure the auray of the estimated ollusion attak by the following distane: d(θ (kf), θ) = max θ (k f) σ θ σ 1 (28) σ [0,] If d(θ (k f), θ) = 0, then the E.-M. sueeds in retrieving the exat value of the ollusion attak, and therefore the deoding is otimal. Fig. 4 shows that the estimation beomes inaurate as inreases. However, there is a big ga between the two attaks: the minority ollusion seems to be easier to estimate than the worst ollusion. This behavior suggests that the information about the ollusion hannel leaking from the observations is signifiantly higher for the minority ollusion. 5.2 Deoding Performanes Thresholding When the sores are omared to a threshold as detailed in Se. 4.3, there are two tyes of error: False Alarm: at least one innoent is aused, False Negative: none of the olluders is aused. The erformanes of the deoder are evaluated by the robabilities of these two events, P F A(T) and P F N(T), measured exerimentally by Monte Carlo. Fig. 5 shows the exerimental ROC urve, obtained with N = 3200 realizations, as the deision threshold T ranges from 0 to 1. Fig. 5(a) shows the resulting ROC when the olluders imlement a Minority vote. In this ase, the ga between the agnosti deoder and the iterative deoder is imressive, and moreover the latter erforms losely to the otimal informed deoder. On the other hand, Fig. 5(b) shows the ROC when the olluders imlement the Worst Case Attak. Clearly, the ga between the informed deoder and the agnosti deoder is greatly redued. However, even in this ase the erformane of the roosed iterative deoder is very lose to that of the informed deoder, and always better than the agnosti deoder. Fig. 6 lots P F A(T) vs. P F N(T) from another ersetive. Now, we fix T suh that P F N(T ) = 0.2, ie. 20% of the time we miss all the olluders, and show the orresonding P F A(T ) for different attaks and ollusion size. Similar omments as for Fig. 5 aly in this ase. Note that the rate of the ode is log 2 n/m 0.04 bits er samle whih exeeds the ollusion hannel aaity for 4. Therefore, big robabilities of errors are exeted for 4. In real aliations, the ode should be longer. Finally, it is interesting to note that the huge variability in erformane among different attaks, that has been observed in this set of exeriments, is ertainly orrelated to the theoretial results shown in Tab. 1, where we an see that Minority has the biggest loss with regard to the otimal deoder Maximum sore heuristi Instead of a thresholding deision rule, we an use a maximum sore heuristi, where only one user is aused: the one whose sore is the largest. Thus, there is no threshold and the two errors mentioned above beome now the same event.

7 10 1 iterative deoder informed deoder agnosti deoder P FN (a) Minority 10 3 iterative deoder informed deoder agnosti deoder P FN (b) Worst Case Attak Figure 5: Probabilities of false alarm and false negative with the iterative, informed, and agnosti deoders, for = 5, m = 300, n = 1000 (a) Minority Attak and (b) Worst Case Attak iterative, minority iterative, worst informed, minority informed, worst agnosti, minority agnosti, worst Figure 6: Probability of false alarm when P F N(T ) = 0.2, m = 250, n = Fig. 7 shows the robability of being wrong in ausing the user having the biggest sore. The urves were obtained by Monte Carlo, in a set of N = 1000 exeriments. The same behavior as in Set an be notied. Two omments are in order. First, the WCA is not the worst attak for this framework. The WCA is indeed defined as the ollusion attak minimizing the mutual information between the symbols of the irated oy and the user odeword. Thus, the WCA minimizes in general the uer bound on the ausation erformanes, but it might not be the worst attak for a given ausation roess. Seond, the urve of the iterative deoder against a minority attak is hidden behind the one for the informed deoder, ie. the robability of error is null. Probability of error iterative, minority iterative, worst informed, minority informed, worst agnosti, minority agnosti, worst Figure 7: Probability of error for the maximum sore heuristi, with m = 400, n = CONCLUSION The reliminary results of this aer show that the new roosed aroah, based on joint hannel estimation and deoding, oens the door to owerful deoding shemes for robabilisti traitor traing odes. The main drawbak of the E.-M. deoder resides in its omlexity. The evaluation of the Q funtion needs O(nm) elementary oerations, and we must erform a maximization of several of these funtions. This is the reason why exeriments resented in this aer do not takle long odes and many users. They learly show that the E.-M. deoder erforms signifiantly better than the agnosti deoder, and sometimes as good as the informed deoder. However, this exerimental setu would not be aliable to senarios where a huge number of users

8 is involved. Our future work will investigate less omlex deoders and reroessing tehniques able to rune most of the users. We will investigate as well the fundamental limits in the estimation of the ollusion model, in terms of the ode length and the tye of ollusion attak. On the other hand, the roosed deoding aroah brings new ossibilities that, to the best of our knowledge, have not been exloited yet in the deoding of traitor traing odes. For instane, the aroah an be extended to more general ollusion models, other than the marking assumtion used in this aer and in many others in the literature. Indeed, nothing revents us from enomassing symbol erasures and random errors in the statistial model of the ollusion. The diffiulty is that the iterative deoder must estimate even more arameters. Yet, the agnosti deoder is not at all robust against erasures and eseially random errors, sine they violate the marking assumtion. A larger ga between the agnosti deoder and the informed deoder an be exeted in suh ase. 7. REFERENCES [1] E. Amiri and G. Tardos. High rate fingerrinting odes and the fingerrinting aaity. In Pro. of 20th Annual ACM-SIAM Symosium on Disrete Algorithms (SODA 2009), jan [2] O. Blayer and T. Tassa. Imroved versions of Tardos fingerrinting sheme. Des. Codes Crytograhy, 48(1):79 103, [3] D. Boneh and J. Shaw. Collusion-seure fingerrinting for digital data. IEEE Trans. Inform. Theory, 44: , Setember [4] A. Charentier, F. Xie, C. Fontaine, and T. Furon. Exetation maximisation deoding of tardos robabilisti fingerrinting ode. In N. Memon, editor, Seurity, steganograhy and watermarking of multimedia ontents, San Jose, CA, USA, jan SPIE Eletroni Imaging. [5] T. M. Cover and J. A. Thomas. Elements of Information Theory. Wiley series in Teleommuniations, [6] T. Furon, A. Guyader, and F. Cérou. On the design and otimization of tardos robabilisti fingerrinting odes. In 10th International Worksho on Information Hiding, IH 08, Santa Barbara, California, USA, May [7] T. Furon, L. Pérez-Freire, A. Guyader, and F. Cérou. Estimating the minimal length of tardos ode. In Information Hiding, Darmstadt, Germany, jun Aeted. [8] T. K. Moon. The exetation-maximization algorithm. IEEE Signal Proessing Magazine, 13(6):47 60, November [9] P. Moulin. Universal fingerrinting: aaity and random-oding exonents. IEEE Transations on Information Theory, January Submitted. Prerint available at htt://arxiv.org/abs/ [10] K. Nuida, S. Fujitsu, M. Hagiwara, T. Kitagawa, H. Watanabe, K. Ogawa, and H. Imai. An imrovement of Tardos s ollusion-seure fingerrinting odes with very short lengths. In Pro. 9th International Worksho on Information Hiding, IH 07, volume 4851 of LNCS, ages 80 89, Saint Malo, Frane, June [11] B. Skori, T. Vladimirova, M. Celik, and J. Talstra. Tardos fingerrinting is better than we thought. arxiv:s/ v1, July [12] G. Tardos. Otimal robabilisti fingerrint odes. In Pro. of the 35th annual ACM symosium on theory of omuting, ages , San Diego, CA, USA, ACM.

Risk Analysis in Water Quality Problems. Souza, Raimundo 1 Chagas, Patrícia 2 1,2 Departamento de Engenharia Hidráulica e Ambiental

Risk Analysis in Water Quality Problems. Souza, Raimundo 1 Chagas, Patrícia 2 1,2 Departamento de Engenharia Hidráulica e Ambiental Risk Analysis in Water Quality Problems. Downloaded from aselibrary.org by Uf - Universidade Federal Do Ceara on 1/29/14. Coyright ASCE. For ersonal use only; all rights reserved. Souza, Raimundo 1 Chagas,

More information

Proportional-Integral-Derivative PID Controls

Proportional-Integral-Derivative PID Controls Proortional-Integral-Derivative PID Controls Dr M.J. Willis Det. of Chemial and Proess Engineering University of Newastle e-mail: mark.willis@nl.a.uk Written: 7 th November, 998 Udated: 6 th Otober, 999

More information

CSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 10: The Bayesian way to fit models. Geoffrey Hinton

CSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 10: The Bayesian way to fit models. Geoffrey Hinton CSC31: 011 Introdution to Neural Networks and Mahine Learning Leture 10: The Bayesian way to fit models Geoffrey Hinton The Bayesian framework The Bayesian framework assumes that we always have a rior

More information

INFORMATION TRANSFER THROUGH CLASSIFIERS AND ITS RELATION TO PROBABILITY OF ERROR

INFORMATION TRANSFER THROUGH CLASSIFIERS AND ITS RELATION TO PROBABILITY OF ERROR IFORMATIO TRAFER TROUG CLAIFIER AD IT RELATIO TO PROBABILITY OF ERROR Deniz Erdogmus, Jose C. Prini Comutational euroengineering Lab (CEL, University of Florida, Gainesville, FL 6 [deniz,rini]@nel.ufl.edu

More information

CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)

CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL) Global J. of Arts & Mgmt., 0: () Researh Paer: Samath kumar et al., 0: P.07- CONSTRUCTION OF MIXED SAMPLING PLAN WITH DOUBLE SAMPLING PLAN AS ATTRIBUTE PLAN INDEXED THROUGH (MAPD, MAAOQ) AND (MAPD, AOQL)

More information

Panos Kouvelis Olin School of Business Washington University

Panos Kouvelis Olin School of Business Washington University Quality-Based Cometition, Profitability, and Variable Costs Chester Chambers Co Shool of Business Dallas, TX 7575 hamber@mailosmuedu -768-35 Panos Kouvelis Olin Shool of Business Washington University

More information

EconS 503 Homework #8. Answer Key

EconS 503 Homework #8. Answer Key EonS 503 Homework #8 Answer Key Exerise #1 Damaged good strategy (Menu riing) 1. It is immediate that otimal rie is = 3 whih yields rofits of ππ = 3/ (the alternative being a rie of = 1, yielding ππ =

More information

Fast, Approximately Optimal Solutions for Single and Dynamic MRFs

Fast, Approximately Optimal Solutions for Single and Dynamic MRFs Fast, Aroximately Otimal Solutions for Single and Dynami MRFs Nikos Komodakis, Georgios Tziritas University of Crete, Comuter Siene Deartment {komod,tziritas}@sd.uo.gr Nikos Paragios MAS, Eole Centrale

More information

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2

ELG 5372 Error Control Coding. Claude D Amours Lecture 2: Introduction to Coding 2 ELG 5372 Error Control Coding Claude D Amours Leture 2: Introdution to Coding 2 Deoding Tehniques Hard Deision Reeiver detets data before deoding Soft Deision Reeiver quantizes reeived data and deoder

More information

arxiv: v1 [cs.db] 30 Jun 2012

arxiv: v1 [cs.db] 30 Jun 2012 Mining Statistially Signifiant Substrings using the Chi-Square Statisti Mayank Sahan mayasa@se.iitk.a.in Det. of Comuter Siene and Engineering Indian Institute of Tehnology, Kanur INDIA Arnab Bhattaharya

More information

INTUITIONISTIC FUZZY SOFT MATRIX THEORY IN MEDICAL DIAGNOSIS USING MAX-MIN AVERAGE COMPOSITION METHOD

INTUITIONISTIC FUZZY SOFT MATRIX THEORY IN MEDICAL DIAGNOSIS USING MAX-MIN AVERAGE COMPOSITION METHOD Journal of Theoretial and lied Information Tehnology 10 th Setember 014. Vol. 67 No.1 005-014 JTIT & LLS. ll rights reserved. ISSN: 199-8645 www.atit.org E-ISSN: 1817-3195 INTUITIONISTI FUZZY SOFT MTRIX

More information

EE451/551: Digital Control. Relationship Between s and z Planes. The Relationship Between s and z Planes 11/10/2011

EE451/551: Digital Control. Relationship Between s and z Planes. The Relationship Between s and z Planes 11/10/2011 /0/0 EE45/55: Digital Control Chater 6: Digital Control System Design he Relationshi Between s and Planes As noted reviously: s j e e e e r s j where r e and If an analog system has oles at: s n jn a jd

More information

BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES

BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING CODES Luis Pérez-Freire, Teddy Furon To cite this version: Luis Pérez-Freire, Teddy Furon. BLIND DECODER FOR BINARY PROBABILISTIC TRAITOR TRACING

More information

CSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 11: Bayesian learning continued. Geoffrey Hinton

CSC321: 2011 Introduction to Neural Networks and Machine Learning. Lecture 11: Bayesian learning continued. Geoffrey Hinton CSC31: 011 Introdution to Neural Networks and Mahine Learning Leture 11: Bayesian learning ontinued Geoffrey Hinton Bayes Theorem, Prior robability of weight vetor Posterior robability of weight vetor

More information

A General Approach for Analysis of Actuator Delay Compensation Methods for Real-Time Testing

A General Approach for Analysis of Actuator Delay Compensation Methods for Real-Time Testing The th World Conferene on Earthquake Engineering Otober -7, 8, Beijing, China A General Aroah for Analysis of Atuator Delay Comensation Methods for Real-Time Testing Cheng Chen and James M. Riles Post-dotoral

More information

On Some Coefficient Estimates For Certain Subclass of Analytic And Multivalent Functions

On Some Coefficient Estimates For Certain Subclass of Analytic And Multivalent Functions IOSR Journal of Mathematis (IOSR-JM) e-issn: 78-578, -ISSN: 9-765X. Volume, Issue 6 Ver. I (Nov. - De.06), PP 58-65 www.iosrournals.org On Some Coeffiient Estimates For Certain Sublass of nalyti nd Multivalent

More information

Maintaining prediction quality under the condition of a growing knowledge space. A probabilistic dynamic model of knowledge spaces quality evolution

Maintaining prediction quality under the condition of a growing knowledge space. A probabilistic dynamic model of knowledge spaces quality evolution Maintaining redition quality under the ondition of a growing knowledge sae Christoh Jahnz ORCID: 0000-0003-3297-7564 Email: jahnz@gmx.de Intelligene an be understood as an agent s ability to redit its

More information

USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS

USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS Journal of Engineering Studies and Researh Volume 19 (2013) No. 1 47 USING GENETIC ALGORITHMS FOR OPTIMIZATION OF TURNING MACHINING PROCESS DUSAN PETKOVIC 1, MIROSLAV RADOVANOVIC 1 1 University of Nis,

More information

False Negative probabilities in Tardos codes

False Negative probabilities in Tardos codes False Negative probabilities in Tardos odes Antonino Simone Boris Škorić Abstrat Forensi watermarking is the appliation of digital watermarks for the purpose of traing unauthorized redistribution of ontent.

More information

Solutions of burnt-bridge models for molecular motor transport

Solutions of burnt-bridge models for molecular motor transport PHYSICAL REVIEW E 75, 0390 2007 Solutions of burnt-bridge models for moleular motor transort Alexander Yu. Morozov, Ekaterina Pronina, and Anatoly B. Kolomeisky Deartment of Chemistry, Rie University,

More information

EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL

EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL MATHEMATICS OF OPERATIONS RESEARCH Vol. 28, No. 3, August 2003,. 497 523 Printed in U.S.A. EXTENDED MATRIX CUBE THEOREMS WITH APPLICATIONS TO -THEORY IN CONTROL AHARON BEN-TAL, ARKADI NEMIROVSKI, and CORNELIS

More information

Tardos codes for real

Tardos codes for real Tardos codes for real Teddy Furon, athieu esoubeaux To cite this version: Teddy Furon, athieu esoubeaux. Tardos codes for real. IEEE Worksho on Information Forensics and Security, ec 2014, Atlanta, United

More information

Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption

Message Partitioning and Limited Auxiliary Randomness: Alternatives to Honey Encryption Message Partitioning and Liited Auxiliary Randoness: Alternatives to Honey Enrytion AirEad Ghassai, Daniel Cullina, and Negar Kiyavash Deartent of ECE and Deartent of ISE, Coordinated Siene Laboratory

More information

2.2 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES

2.2 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES Essential Miroeonomis -- 22 BUDGET-CONSTRAINED CHOICE WITH TWO COMMODITIES Continuity of demand 2 Inome effets 6 Quasi-linear, Cobb-Douglas and CES referenes 9 Eenditure funtion 4 Substitution effets and

More information

Application of Drucker-Prager Plasticity Model for Stress- Strain Modeling of FRP Confined Concrete Columns

Application of Drucker-Prager Plasticity Model for Stress- Strain Modeling of FRP Confined Concrete Columns Available online at www.sienediret.om Proedia Engineering 14 (211) 687 694 The Twelfth East Asia-Paifi Conferene on Strutural Engineering and Constrution Aliation of Druker-Prager Plastiity Model for Stress-

More information

Methods of evaluating tests

Methods of evaluating tests Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed

More information

NONLINEAR MODEL: CELL FORMATION

NONLINEAR MODEL: CELL FORMATION ational Institute of Tehnology Caliut Deartment of Mehanial Engineering OLIEAR MODEL: CELL FORMATIO System Requirements and Symbols 0-Integer Programming Formulation α i - umber of interell transfers due

More information

The Effectiveness of the Linear Hull Effect

The Effectiveness of the Linear Hull Effect The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports

More information

arxiv: v2 [cs.ai] 16 Feb 2016

arxiv: v2 [cs.ai] 16 Feb 2016 Cells in Multidimensional Reurrent Neural Networks arxiv:42.2620v2 [s.ai] 6 Feb 206 Gundram Leifert Tobias Sauß Tobias Grüning Welf Wustlih Roger Labahn University of Rostok Institute of Mathematis 805

More information

Simple Cyclic loading model based on Modified Cam Clay

Simple Cyclic loading model based on Modified Cam Clay Simle li loading model based on Modified am la Imlemented in RISP main rogram version 00. and higher B Amir Rahim, The RISP onsortium Ltd Introdution This reort resents a simle soil model whih rovides

More information

silicon wafers p b θ b IR heater θ h p h solution bath cleaning filter bellows pump

silicon wafers p b θ b IR heater θ h p h solution bath cleaning filter bellows pump An Analysis of Cometitive Assoiative Net for Temerature Control of RCA Cleaning Solutions S Kurogi y, H Nobutomo y, T Nishida y, H Sakamoto y, Y Fuhikawa y, M Mimata z and K Itoh z ykyushu Institute of

More information

Any AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer

Any AND-OR formula of size N can be evaluated in time N 1/2+o(1) on a quantum computer Any AND-OR formula of size N an be evaluated in time N /2+o( on a quantum omuter Andris Ambainis, ambainis@math.uwaterloo.a Robert Šalek salek@ees.berkeley.edu Andrew M. Childs, amhilds@uwaterloo.a Shengyu

More information

ENHANCED BLIND DECODING of TARDOS CODES with NEW MAP-BASED FUNCTIONS

ENHANCED BLIND DECODING of TARDOS CODES with NEW MAP-BASED FUNCTIONS ENHANCED BLIND DECODING of TARDOS CODES with NEW MAP-BASED FUNCTIONS Mathieu Desoubeaux #1, Cédric Herzet 2, William Puech #, Gaëtan Le Guelvouit o # University of Montpellier 2 - LIRMM - 3495 - Montpellier

More information

Assessing the Performance of a BCI: A Task-Oriented Approach

Assessing the Performance of a BCI: A Task-Oriented Approach Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,

More information

Subject: Modeling of Thermal Rocket Engines; Nozzle flow; Control of mass flow. p c. Thrust Chamber mixing and combustion

Subject: Modeling of Thermal Rocket Engines; Nozzle flow; Control of mass flow. p c. Thrust Chamber mixing and combustion 16.50 Leture 6 Subjet: Modeling of Thermal Roket Engines; Nozzle flow; Control of mass flow Though onetually simle, a roket engine is in fat hysially a very omlex devie and diffiult to reresent quantitatively

More information

Real-time Hand Tracking Using a Sum of Anisotropic Gaussians Model

Real-time Hand Tracking Using a Sum of Anisotropic Gaussians Model Real-time Hand Traking Using a Sum of Anisotroi Gaussians Model Srinath Sridhar 1, Helge Rhodin 1, Hans-Peter Seidel 1, Antti Oulasvirta 2, Christian Theobalt 1 1 Max Plank Institute for Informatis Saarbrüken,

More information

3. THE SOLUTION OF TRANSFORMATION PARAMETERS

3. THE SOLUTION OF TRANSFORMATION PARAMETERS Deartment of Geosatial Siene. HE SOLUION OF RANSFORMAION PARAMEERS Coordinate transformations, as used in ratie, are models desribing the assumed mathematial relationshis between oints in two retangular

More information

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS

DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install

More information

Investigation of the Potential of Long Wave Radiation Heating to Reduce Energy Consumption for Greenhouse Heating

Investigation of the Potential of Long Wave Radiation Heating to Reduce Energy Consumption for Greenhouse Heating Investigation of the Potential of Long Wave Radiation Heating to Redue Energy Consumtion for Greenhouse Heating A. Kavga S. Pantelakis and Th. Panidis Deartment of Mehanial Engineering & Aeronautis University

More information

OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS

OPTIMIZED COOPERATIVE SPECTRUM-SENSING IN CLUSTERED COGNITIVE RADIO NETWORKS International Journal of Wireless & Mobile Networks (IJWMN) Vol. 5, No. 4, August 3 OPTIMIZE COOPERATIVE SPECTRUM-SENSING IN CLUSTERE COGNITIVE RAIO NETWORKS ABSTRACT Birsen Sirkei-Mergen and Wafa-Iqbal

More information

The Spread of Internet Worms and the Optimal Patch Release Strategies

The Spread of Internet Worms and the Optimal Patch Release Strategies Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 5 Proeedings Amerias Conferene on Information Systems (AMCIS) 5 The Sread of Internet Worms and the Otimal Path Release Strategies

More information

Hankel Optimal Model Order Reduction 1

Hankel Optimal Model Order Reduction 1 Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both

More information

arxiv: v1 [cs.gt] 21 Jul 2017

arxiv: v1 [cs.gt] 21 Jul 2017 RSU II ommuniation Cyber attaks Otimal Seure Multi-Layer IoT Network Design Juntao Chen, Corinne Touati, and Quanyan Zhu arxiv:1707.07046v1 [s.gt] 1 Jul 017 Abstrat With the remarkable growth of the Internet

More information

TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS

TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS TOWARD THE DEVELOPMENT OF A METHODOLOGY FOR DESIGNING HELICOPTER FLIGHT CONTROL LAWS BY INTEGRATING HANDLING QUALITIES REQUIREMENTS Jean-Charles Antonioli ONERA Air Base 70 366 Salon de Provene Frane Armin

More information

On a Networked Automata Spacetime and its Application to the Dynamics of States in Uniform Translatory Motion

On a Networked Automata Spacetime and its Application to the Dynamics of States in Uniform Translatory Motion On a Networked Automata Saetime and its Aliation to the Dynamis of States in Uniform Translatory Motion Othon Mihail Deartment of Comuter Siene, University of Liverool, Liverool, UK Othon.Mihail@liverool.a.uk

More information

NUMERICAL SIMULATIONS OF METAL ONTO COMPOSITES CASTING

NUMERICAL SIMULATIONS OF METAL ONTO COMPOSITES CASTING NUMERICAL SIMULATIONS OF METAL ONTO COMPOSITES CASTING E. Marklund 1, D. Mattsson 2, M. Svanberg 2 and M. Wysoki 1* 1 Swerea SICOMP AB, Box 14, SE-431 22 Mölndal, Sweden 2 Swerea SICOMP AB, Box 271, SE-941

More information

SYNTHESIS AND OPTIMIZATION OF EPICYCLIC-TYPE AUTOMATIC TRANSMISSIONS BASED ON NOMOGRAPHS

SYNTHESIS AND OPTIMIZATION OF EPICYCLIC-TYPE AUTOMATIC TRANSMISSIONS BASED ON NOMOGRAPHS Al-Qadisiya Journal For Engineering Sienes Vol. 4 o. 3 Year 0 SYTHESIS AD OPTIMIZATIO OF EPICYCLIC-TYPE AUTOMATIC TASMISSIOS BASED O OMOGAPHS E. L. Esmail K. H. Salih Leturer Assistant Leturer Deartment

More information

Concerning the Numbers 22p + 1, p Prime

Concerning the Numbers 22p + 1, p Prime Conerning the Numbers 22p + 1, p Prime By John Brillhart 1. Introdution. In a reent investigation [7] the problem of fatoring numbers of the form 22p + 1, p a, was enountered. Sine 22p + 1 = (2P - 2*

More information

Experimental study with analytical validation of thermo-hydraulic performance of plate heat exchanger with different chevron angles

Experimental study with analytical validation of thermo-hydraulic performance of plate heat exchanger with different chevron angles Exerimental study with analytial validation of thermo-hydrauli erformane of late heat exhanger with different hevron angles Arunahala U C, Ajay R K and Sandee H M Abstrat The Plate heat exhanger is rominent

More information

The Holey Grail A special score function for non-binary traitor tracing

The Holey Grail A special score function for non-binary traitor tracing The Holey Grail A special score function for non-binary traitor tracing B. Škorić, J.-J. Oosterwijk, J. Doumen Abstract We study collusion-resistant traitor tracing in the simple decoder approach, i.e.

More information

Tuple decoders for traitor tracing schemes

Tuple decoders for traitor tracing schemes Tuple deoders for traitor traing shees Jan-Jaap Oosterwijk a,b, Jeroen Douen b, Thijs Laarhoven a a Eindhoven University of Tehnology, P.O. Box 53, 5600 MB Eindhoven, The Netherlands; b Irdeto B.V., P.O.

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion

Millennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six

More information

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1

Case I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1 MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues

More information

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates

Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Multi-version Coding for Consistent Distributed Storage of Correlated Data Updates Ramy E. Ali and Vivek R. Cadambe 1 arxiv:1708.06042v1 [s.it] 21 Aug 2017 Abstrat Motivated by appliations of distributed

More information

Broadcast Channels with Cooperating Decoders

Broadcast Channels with Cooperating Decoders To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider

More information

Takeshi Kurata Jun Fujiki Katsuhiko Sakaue. 1{1{4 Umezono, Tsukuba-shi, Ibaraki , JAPAN. fkurata, fujiki,

Takeshi Kurata Jun Fujiki Katsuhiko Sakaue. 1{1{4 Umezono, Tsukuba-shi, Ibaraki , JAPAN. fkurata, fujiki, Ane Eiolar Geometry via Fatorization Method akeshi Kurata Jun Fujiki Katsuhiko Sakaue Eletrotehnial Laboratory {{4 Umezono, sukuba-shi, Ibaraki 305-8568, JAPAN fkurata, fujiki, sakaueg@etl.go.j Abstrat

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1

Computer Science 786S - Statistical Methods in Natural Language Processing and Data Analysis Page 1 Computer Siene 786S - Statistial Methods in Natural Language Proessing and Data Analysis Page 1 Hypothesis Testing A statistial hypothesis is a statement about the nature of the distribution of a random

More information

Close range effects on a concrete wall of an underwater explosion A numerical approach

Close range effects on a concrete wall of an underwater explosion A numerical approach Close range effets on a onrete wall of an underwater exlosion A numerial aroah O. Loiseau, K. Cheval & B. Autrusson Institut de Radiorotetion et de Sûreté Nuléaire (IRSN), BP 17, 92262 Fontenay-Aux-Roses

More information

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION

On the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION 5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.

More information

A MULTIRATE APPROACH TO DDS ALGORITHM VERSUS TAYLOR-SERIES EXPANSION TECHNIQUE

A MULTIRATE APPROACH TO DDS ALGORITHM VERSUS TAYLOR-SERIES EXPANSION TECHNIQUE A ULTIRATE APPROACH TO DDS ALGORITH VERSUS TAYLOR-SERIES EXPANSION TECHNIQUE Ewa Hermanowiz 1 and iroslaw Rojewski Faulty of Eletronis, Teleommuniations and Informatis, Gdansk University of Tehnology,

More information

Maximum entropy generation rate in a heat exchanger at constant inlet parameters

Maximum entropy generation rate in a heat exchanger at constant inlet parameters Maximum entroy generation rate in a heat exhanger at onstant inlet arameters Rafał LASKOWSKI, Maiej JAWORSKI Online: htt://www.jmee.tu.koszalin.l/download_artile/jmee_7 7986.df Cite this artile as: Laskowski

More information

Complexity of Regularization RBF Networks

Complexity of Regularization RBF Networks Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw

More information

The Effect of Gauge Measurement Capability and Dependency Measure of Process Variables on the MC p

The Effect of Gauge Measurement Capability and Dependency Measure of Process Variables on the MC p Journal of Industrial and Systems Engineering Vol. 4, No., 59-76 Sring The Effet of Gauge easurement Caability and Deendeny easure of Proess Variables on the C Daood Shishebori, Ali Zeinal Hamadani Deartment

More information

Summary of EUV Optics Contamination Modeling Meeting

Summary of EUV Optics Contamination Modeling Meeting Summary of EUV Otis Contamination Modeling Meeting IEUVI Otis Contamination/Lifetime TWG San Jose, CA, USA February 28, 2008 Andrea Wüest, SEMATECH Shannon Hill, NIST Lennie Klebanoff, Sandia Nat. Lab.

More information

Emergence of Superpeer Networks: A New Perspective

Emergence of Superpeer Networks: A New Perspective Emergene o Suereer Networs: A New Persetive Bivas Mitra Deartment o Comuter Siene & Engineering Indian Institute o Tehnology, Kharagur, India Peer to Peer arhiteture Node Node Node Internet Node Node All

More information

The Constrainedness of Search. constrainedness. Surprisingly, we can often characterize. an ensemble of problems using just two parameters:

The Constrainedness of Search. constrainedness. Surprisingly, we can often characterize. an ensemble of problems using just two parameters: In Proeedings of AAAI-96. Amerian Assoiation for Artiial Intelligene, 1996. The Constrainedness of Searh Ian P. Gent and Ewan MaIntyre and Patrik Prosser Deartment of Comuter Siene University of Strathlyde

More information

Theory of the Integer and Fractional Quantum Hall Effects

Theory of the Integer and Fractional Quantum Hall Effects Theory of the Integer and Frational Quantum all Effets Shosuke SASAKI Center for Advaned igh Magneti Field Siene, Graduate Shool of Siene, Osaka University, - Mahikaneyama, Toyonaka, Osaka 56-, Jaan Prefae

More information

SOLVED QUESTIONS 1 / 2. in a closed container at equilibrium. What would be the effect of addition of CaCO 3 on the equilibrium concentration of CO 2?

SOLVED QUESTIONS 1 / 2. in a closed container at equilibrium. What would be the effect of addition of CaCO 3 on the equilibrium concentration of CO 2? SOLVED QUESTIONS Multile Choie Questions. and are the veloity onstants of forward and bakward reations. The equilibrium onstant k of the reation is (A) (B) (C) (D). Whih of the following reations will

More information

A Queueing Model for Call Blending in Call Centers

A Queueing Model for Call Blending in Call Centers A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl

More information

CS 687 Jana Kosecka. Uncertainty, Bayesian Networks Chapter 13, Russell and Norvig Chapter 14,

CS 687 Jana Kosecka. Uncertainty, Bayesian Networks Chapter 13, Russell and Norvig Chapter 14, CS 687 Jana Koseka Unertainty Bayesian Networks Chapter 13 Russell and Norvig Chapter 14 14.1-14.3 Outline Unertainty robability Syntax and Semantis Inferene Independene and Bayes' Rule Syntax Basi element:

More information

Adaptive neuro-fuzzy inference system-based controllers for smart material actuator modelling

Adaptive neuro-fuzzy inference system-based controllers for smart material actuator modelling Adaptive neuro-fuzzy inferene system-based ontrollers for smart material atuator modelling T L Grigorie and R M Botez Éole de Tehnologie Supérieure, Montréal, Quebe, Canada The manusript was reeived on

More information

Singular Event Detection

Singular Event Detection Singular Event Detetion Rafael S. Garía Eletrial Engineering University of Puerto Rio at Mayagüez Rafael.Garia@ee.uprm.edu Faulty Mentor: S. Shankar Sastry Researh Supervisor: Jonathan Sprinkle Graduate

More information

Lightpath routing for maximum reliability in optical mesh networks

Lightpath routing for maximum reliability in optical mesh networks Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer

More information

DEB-oriented Modelling and Control of Coal-Fired Power Plant

DEB-oriented Modelling and Control of Coal-Fired Power Plant Prerints of the 9th World Congress he International Federation of Automati Control Cae own, South Afria. August 4-9, 4 DEB-oriented Modelling and Control of Coal-Fired Power Plant Li Sun*. Junyi Dong*.

More information

The Procedure of Finding the Stress-Energy. Tensor and Equations of Vector Field of Any Form

The Procedure of Finding the Stress-Energy. Tensor and Equations of Vector Field of Any Form Advaned Studies in Theoretial Phsis Vol. 8, 14, no. 18, 771-779 HIKARI Ltd, www.m-hikari.om htt://d.doi.org/1.1988/ast.14.4711 The Proedure of Finding the Stress-Energ Tensor and Equations of Vetor Field

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

WEIGHTED MAXIMUM OVER MINIMUM MODULUS OF POLYNOMIALS, APPLIED TO RAY SEQUENCES OF PADÉ APPROXIMANTS

WEIGHTED MAXIMUM OVER MINIMUM MODULUS OF POLYNOMIALS, APPLIED TO RAY SEQUENCES OF PADÉ APPROXIMANTS WEIGHTED MAXIMUM OVER MINIMUM MODULUS OF POLYNOMIALS, APPLIED TO RAY SEQUENCES OF PADÉ APPROXIMANTS D.S. LUBINSKY Abstrat. Let a 0; " > 0. We use otential theory to obtain a shar lower bound for the linear

More information

7 Max-Flow Problems. Business Computing and Operations Research 608

7 Max-Flow Problems. Business Computing and Operations Research 608 7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates

More information

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III

AI*IA 2003 Fusion of Multiple Pattern Classifiers PART III AI*IA 23 Fusion of Multile Pattern Classifiers PART III AI*IA 23 Tutorial on Fusion of Multile Pattern Classifiers by F. Roli 49 Methods for fusing multile classifiers Methods for fusing multile classifiers

More information

Optimal control of inverted pendulum system using PID controller, LQR and MPC

Optimal control of inverted pendulum system using PID controller, LQR and MPC IOP Conferene Series: aterials Siene and Engineering PAPER OPEN ACCESS Otimal ontrol of inverted endulum system using PID ontroller, LQR and PC To ite this artile: Elisa Sara Varghese et al 7 IOP Conf.

More information

Supplementary Materials

Supplementary Materials Supplementary Materials Neural population partitioning and a onurrent brain-mahine interfae for sequential motor funtion Maryam M. Shanehi, Rollin C. Hu, Marissa Powers, Gregory W. Wornell, Emery N. Brown

More information

max min z i i=1 x j k s.t. j=1 x j j:i T j

max min z i i=1 x j k s.t. j=1 x j j:i T j AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be

More information

A new Automatic Formant Tracking approach based on scalogram maxima detection using complex wavelets

A new Automatic Formant Tracking approach based on scalogram maxima detection using complex wavelets A new Automati Formant Traking aroah based on salogram maxima detetion using omlex wavelets Imen Jemaa, Kais Ouni, Yves Larie, Slim Ouni, Jean-Paul Haton To ite this version: Imen Jemaa, Kais Ouni, Yves

More information

STA 250: Statistics. Notes 7. Bayesian Approach to Statistics. Book chapters: 7.2

STA 250: Statistics. Notes 7. Bayesian Approach to Statistics. Book chapters: 7.2 STA 25: Statistics Notes 7. Bayesian Aroach to Statistics Book chaters: 7.2 1 From calibrating a rocedure to quantifying uncertainty We saw that the central idea of classical testing is to rovide a rigorous

More information

ASYMPTOTIC ANALYSIS OF ITERATIVE CHANNEL ESTIMATION AND MULTIUSER DETECTION WITH SOFT FEEDBACK IN MULTIPATH CHANNELS

ASYMPTOTIC ANALYSIS OF ITERATIVE CHANNEL ESTIMATION AND MULTIUSER DETECTION WITH SOFT FEEDBACK IN MULTIPATH CHANNELS 6th uroean Signal Proessing Conferene USIPCO 8, Lausanne, Switzerland, August 5-9, 8, oyright by URASIP ASYPTOTIC ANALYSIS OF ITRATIV CHANNL STIATION AND ULTIUSR DTCTION WITH SOFT FDBAC IN ULTIPATH CHANNLS

More information

Flow Characteristics of High-Pressure Hydrogen Gas in the Critical Nozzle

Flow Characteristics of High-Pressure Hydrogen Gas in the Critical Nozzle Flow Charateristis of High-Pressure Hydrogen Gas in the Critial Nozzle Shigeru MATSUO *1, Soihiro KOYAMA *2, Junji NAGAO *3 and Toshiaki SETOGUCHI *4 *1 Saga University, Det. of Mehanial Engineering, 1

More information

The Laws of Acceleration

The Laws of Acceleration The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the

More information

, given by. , I y. and I z. , are self adjoint, meaning that the adjoint of the operator is equal to the operator. This follows as A.

, given by. , I y. and I z. , are self adjoint, meaning that the adjoint of the operator is equal to the operator. This follows as A. Further relaxation 6. ntrodution As resented so far the theory is aable of rediting the rate of transitions between energy levels i.e. it is onerned with oulations. The theory is thus erfetly aetable for

More information

Fundamental Theorem of Calculus

Fundamental Theorem of Calculus Chater 6 Fundamental Theorem of Calulus 6. Definition (Nie funtions.) I will say that a real valued funtion f defined on an interval [a, b] is a nie funtion on [a, b], if f is ontinuous on [a, b] and integrable

More information

On the Designs and Challenges of Practical Binary Dirty Paper Coding

On the Designs and Challenges of Practical Binary Dirty Paper Coding On the Designs and Challenges of Pratial Binary Dirty Paper Coding 04 / 08 / 2009 Gyu Bum Kyung and Chih-Chun Wang Center for Wireless Systems and Appliations Shool of Eletrial and Computer Eng. Outline

More information

Control Theory association of mathematics and engineering

Control Theory association of mathematics and engineering Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology

More information

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017

CMSC 451: Lecture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 CMSC 451: Leture 9 Greedy Approximation: Set Cover Thursday, Sep 28, 2017 Reading: Chapt 11 of KT and Set 54 of DPV Set Cover: An important lass of optimization problems involves overing a ertain domain,

More information

Chapter 8 Hypothesis Testing

Chapter 8 Hypothesis Testing Leture 5 for BST 63: Statistial Theory II Kui Zhang, Spring Chapter 8 Hypothesis Testing Setion 8 Introdution Definition 8 A hypothesis is a statement about a population parameter Definition 8 The two

More information

Applications of Complex Analysis to Celestial Navigation

Applications of Complex Analysis to Celestial Navigation Aliations of Comlex Analysis to Celestial Navigation Robin G. Stuart Valhalla, New York, USA Abstrat Maing oints on the shere by stereograhi rojetion to oints on the lane of omlex numbers transforms the

More information

An Efficient Implementation of Linear-Phase FIR Filters for Rational Sampling Rate Conversion

An Efficient Implementation of Linear-Phase FIR Filters for Rational Sampling Rate Conversion An Effiient Imlementation of inear-pase FIR Filters for Rational Samling Rate Conversion Priyati Guta 1, Amita Verma 2, Ravikant Sarma 3 Deartment of Eletronis and Communiation Engineering, Green ills

More information

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret

Parallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat

More information