Modelling Information Warfare as a Game

Size: px
Start display at page:

Download "Modelling Information Warfare as a Game"

Transcription

1 Modellng Informaton Warfare as a ame Jorma Jormakka and Jarmo V. E. Mölsä Department of echnology Natonal Defence College P.O. ox 7 FI-0086 Helsnk Fnland E-mal: orma.ormakka@ml.f Communcatons Laboratory Helsnk Unversty of echnology P.O. ox 3000 FI-005 HU Fnland E-mal: armo.molsa@tkk.f Abstract ame theory s one of the possble ways to study nformaton warfare wth mathematcal models. hs paper presents four example games whch llustrate the dfferent requrements for an effectve playng strategy n nformaton warfare. hese games study how a bold playng strategy can lead to domnaton how a mxed playng strategy can reduce domnaton how t can be useful to play a domnatng strategy only part of the tme and how excessve domnaton can lead to rebels where all playng partes lose. hs paper also descrbes meta-strateges whose goal s to modfy the perceved costs and condtons of a game. hs knd of percepton management s closely related to the Observe-Orent-Decde- Act (OODA) loop. Keywords: Informaton warfare game theory OODA-loop. Introducton hs paper presents four example games for modellng nformaton warfare. Wth the help of game theory the possblty for achevng and mantanng a domnatng poston n dfferent knds of nformaton warfare cases s nvestgated. In general the purpose of mathematcal modellng of nformaton warfare s to produce a quanttatve evaluaton of an attack or a defence strategy. hs paper concentrates on fndng quanttatve answers n descrbng the most effectve strateges for certan nformaton warfare scenaros. In nformaton warfare the fundamental weapon and target s nformaton whle the man goal s nformaton superorty (Hutchnson and Warren 00). An mportant ssue here s the possblty to modfy the enemy s percepton of costs and condtons related to warfare. hese percepton management ssues are closely related to the Observe-Orent-Decde-Act (OODA) loop whch descrbes the decson process and ts dependence on tmely and correct observatons (oyd 996). he OODA-loop emphaszes the orentaton phase whch s responsble for analysng and nterpretng the dfferent observatons to fnd out the most useful decson. he structure of ths paper s the followng. Frst an overvew of game theory s gven. hen some general observatons about modellng nformaton warfare as a game are descrbed. he frst game n ths paper shows the beneft of bold strateges n asymmetrc warfare. he second game ndcates the benefts of usng mxed defence strateges for mtgatng the domnance of a stronger party. he thrd game analyses the optmal dsturbance strategy when a domnator wants to prevent the usage of a communcaton network. he fourth game Journal of Informaton Warfare (005) 4 (): 5 ISSN prnt/issn onlne

2 Modellng Informaton Warfare as a ame ponts out that excessve domnance can result n rebels whch cause massve costs to all playng partes. All these four games are dependent on correct perceptons of costs and other condtons of the game. he next secton descrbes how meta-strateges can be used to modfy the costs and condtons perceved by an enemy. Fnally some related work s descrbed and the conclusons are gven. An Overvew of ame heory hs secton descrbes the most mportant ssues n game theory to make t easer to understand the games defned later n ths paper. For an extensve ntroducton to game theory see for example bbons (99). ame theory treats mult-person decson problems as games where each player chooses such decsons whch result n the best possble payoff for hmself/herself regardng the most probable decsons of the other players. All players are thus expected to be ratonal.e. they want to maxmze payoffs. It s not possble to predct the outcome of a play f some players are rratonal. Actually t should be common knowledge that all the players are ratonal: all the players know that all the players are ratonal and that all the players know that all the players know that all the players are ratonal and so on. he (normal-form) representaton of an n -player game specfes the players of the game the strateges for each player and the payoff functon for each player: = S K S ; u K u }. { n n Here S denotes the set of strateges avalable to the player n. A strategy s S s one complete plan of acton for a game. he payoff for the player s defned by the functon u s K s ) where s n s the strategy chosen by the player. ( n ames are generally dvded nto statc and dynamc games. A statc game s a smultaneousmove game and all players choose ther strateges smultaneously wthout knowng what strateges other players have chosen. A dynamc game s a sequental-move game and players choose ther strateges n sequence. Statc games can be combned n a dynamc fashon and a repeated game s one example of ths. ames can have dfferent propertes. In a cooperatve game players try to maxmze the ont payoff but n a non-cooperatve game all players concentrate only on maxmzng ther own payoff. In warfare however there s no cooperaton. In a game of complete nformaton the payoff functon of all players s common knowledge but n a game of ncomplete nformaton at least one player s not sure about the payoff functon of another player. In a game of perfect nformaton a player wth the move knows the full hstory of the game played so far (.e. what strateges other players have chosen) but n a game of mperfect nformaton at least one player wth the move does not know the full hstory of the game. he strateges n S are the pure strateges for the player. If player has M dfferent pure strateges ( S = s K s } ) then a mxed strategy for player s a probablty dstrbuton { M p = ( p K pm ) where 0 p m for m = K M and p + L + pm =. A mxed strategy ndcates one player s uncertanty about what another player wll do. A pure strategy s m can be represented as a mxed strategy by settng p m to (and the remanng terms n the probablty dstrbuton beng 0). Journal of Informaton Warfare 3

3 Modellng Informaton Warfare as a ame he expected payoff v for player n an n -player statc game = S K S ; u K u } when player ( n ) plays the mxed strategy p s the followng: where () s { n n M M n n v ( p K p ) n L = pkm ( ) k u s m K s nm () n m = mn = k= M s the number of pure strateges avalable to the player. For a two-player case M = M ( p p ) p m p m u ( s m s m ) m = m = v. () When modellng decson problems wth game theory t s often possble to dentfy one or more equlbrum condtons whch defne a strategcally stable predcton of the outcome of a play. In an equlbrum condton no player has nterest to change hs decson because ths would only result n a lower beneft for the player changng hs/her decson. In an n -player statc game = S K S ; u K u } of complete nformaton the mxed strateges { n n ( p K p ) are a Nash equlbrum f for each player n mxed strateges specfed for the other players. In other words max v ( p p K p p p+ K p n ) p s player s best response to the p solves for any player n. A Nash equlbrum provdes a local maxmum value for v n. Sngle-player strategy changes are thus not useful at a Nash equlbrum because any two Nash equlbrums (provded they exst) must dffer n the strateges of at least two players. So to change the outcome of a game from one Nash equlbrum to another at least two players must change ther strateges at the same tme. It has been shown that there exsts at least one Nash equlbrum possbly nvolvng mxed strateges for any normal-form statc game wth a fnte number of players and strateges. If a game has exactly one Nash equlbrum t s the unque soluton to the game. ame theory cannot necessarly predct the outcome of a game f there are more than one Nash equlbrums for the game. Especally when a game has multple Nash equlbrums wth conflctng payoffs ths game can have an outcome whch s not a Nash equlbrum. Credblty s a central ssue n dynamc sequental-move games. Only credble threats or promses can have an effect on how a game proceeds. In the context of warfare we wll concentrate on threats nstead of promses. In a two-player game one player can threat to change hs/her strategy f the other player does not act as requred by the stronger player. If the threat s not accepted the play wll end up n another Nash equlbrum whch provdes a worse outcome for the player not acceptng the threat. Credble threats about future behavour can thus have an nfluence on current behavour. he concept of a Nash equlbrum descrbes the possble outcomes of a statc game of complete nformaton but there are stronger equlbrum concepts for more complcated (rcher) types of games. For example a dynamc game of complete nformaton may have many Nash equlbrums but only sub-game perfect Nash equlbrums do not nvolve noncredble threats or promses. An example of a dynamc game s a repeated game ( ) where a statc game of complete nformaton (the stage game) s repeated tmes. he outcome of a sngle stage of ths 4 Journal of Informaton Warfare

4 Modellng Informaton Warfare as a ame dynamc game can however dffer from the Nash equlbrums of the basc statc stage game. If the stage game has multple Nash equlbrums a sub-game perfect outcome of (t) at a sngle stage t t < s not necessarly a Nash equlbrum of when credble threats about the future behavour are nvolved. Informaton Warfare as a ame A natural settng for modellng nformaton warfare s to have a game wth two players: an attacker and a defender. All players are expected to be ratonal here. he payoff for an attacker s the damage to a vctm. As a startng pont for the forthcomng games we wll frst gve some possble scenaros for nformaton warfare:. An army wth hgh technology attacks an opponent s Command Control Communcaton and Intellgence (C 3 I) system and tres to dsable t at the begnnng of a strategc strke. In addton to hacker warfare methods ths knd of an attack can nclude many other methods lke physcal destructon dsablng of sensors electronc warfare and so on. he goal of all of these attack methods s to cause loss of nformaton and delays n the OODA-loop whch causes wrong decsons to be taken (Kopp 00).. A group of attackers carres out a massve attack aganst a crtcal nformaton technology nfrastructure of a socety wth easly avalable tools such as Denal of Servce (DoS) tools vruses worms roans and password crackers. he goal s to produce chaos economc losses and psychologcal effects. 3. A group of terrorsts carres out a targeted well-planned and coordnated attack usng precson weapons such as new vruses worms and DoS tools. he attack ams n brngng down mportant organzatons and sabotagng busness operatons. hs knd of attack needs nformaton of the target before the attack can be made and the tme of the attack s lkely to be carefully chosen. he goal of a targeted attack s to cause economc losses to nfluence wllngness to fght or to support other actons lke terrorst operatons. 4. A group of attackers carres out long-term nformaton warfare to cause economc losses and slow down techncal development. All these scenaros nvolve more than one manfestatons of nformaton warfare: commandand-control (C ) ntellgence-based electronc psychologcal hacker economc and cyber warfare (Lbck 995). Each game here concentrates on a sngle manfestaton of nformaton warfare. Attack and defence strateges must not be too unspecfc. Only one strategy should be possble to play at a tme and there should be a lmted amount of clearly dfferent strateges. Otherwse the outcome of a game would be unknown f several strateges can be played at the same tme. he players of the games n ths paper can only choose one strategy at a tme. errorst ame: old Strategy Can Result n Domnaton he frst game n ths paper s the terrorst game. errorsm can be combned wth many nformaton warfare methods. he man contrbuton of ths game s to show that n a game wth more than one conflctng Nash equlbrums can only end up n domnaton. In asymmetrc warfare at least one of the players s expected to be n a weaker poston than the other players. Journal of Informaton Warfare 5

5 Modellng Informaton Warfare as a ame he terrorst game s a two-player statc game of complete nformaton where both players are ratonal. errorsts () capture hostages and threaten to blow up the hostages f the requrements of the terrorsts are not accepted. he government () proposes that terrorsts should surrender and be put to al. oth players have two strateges π and π. he strategy π means acceptng what the other player suggests: terrorsts surrender or the government accepts the requrements (e.g. pays the ransom). he strategy π means reectng what the other player suggests (terrorsts kll the hostages or the government reects to negotate). he payoffs are the followng: If both players play π both players get -: accepts requrements surrenders and s put to al but gets beneft from the accepted requrements. If both players play π both players get -0: reects klls hostages and terrorsts themselves. If player plays π and player plays π gets -5 and gets 0: reects surrenders and s put to al. If player plays π and player plays π gets and gets -5: gets free wth accepted requrements hostages released. Let us assume plays the mxed strategy ( pπ( p ) π ) where 0 p. hs means that plays π wth the probablty of p and π wth the probablty of ( p ). plays the mxed strategy ( pπ ( p) π ) where 0 p. he expected payoff v for s accordng to () v = p p 0( p )( p ) 5p ( p ) + ( p ) p = p ( 5 7p ) 0 + p and the expected payoff v for s v = p p 0( p )( p ) + 0p ( p ) 5( p ) p = p ( 5 6p ) 0 + 0p. ( he Nash equlbrum ponts p p ) for ths game are calculated by analysng the bestresponse correspondences p ( p ) (the value of p whch maxmzes v ( p ) ) and p ( p ) (the value of p whch maxmzes v ( p ) ). hese correspondences descrbe how the own optmal mxed strategy selecton probablty depends on the opponents probablty. p = 0 p = ): Frst we dentfy the pure strategy Nash equlbrums ( { } p ( 0) = and p ( ) = 0: Nash equlbrum pont s ( 0) p ( ) = 0 and p ( 0) = : Nash equlbrum pont s ( 0) he possble Nash equlbrums nvolvng mxed strateges can be found by dfferentatng the payoff functons: v 5 = 5 7p = 0 p = p 7 v p 5 = 5 6 p = 0 p =. 6 6 Journal of Informaton Warfare

6 Modellng Informaton Warfare as a ame 5 5 he Nash equlbrums are thus the followng ponts: ( p p) (0)(0)( ). hese 6 7 ponts reflect the ntersecton ponts of the best-response correspondences shown n the Fg.. he payoffs ( v 5 0 v ) at the equlbrum ponts are: ( 50)( 5)( ). 7 6 Fgure : he ntersectons of the best-response correspondences are the Nash equlbrums. he two Nash equlbrum ponts wth pure strateges ( π π ) and ( π π ) gve the best payoffs for v and v respectvely. hus the thrd equlbrum pont s not n nterest for nether player. As such however these results do not yet provde any unque soluton to ths statc game. A bold strategy (as defned n gamblng theory n Dubns 965) can however result n a unque soluton n the long term when the statc terrorst game s repeated. Let us assume that s bold and always plays π. states that t wll not negotate wth. Player may not beleve that wll play boldly and may try π for fntely many tmes but f stcks on to playng π wll eventually fnsh wth a fnte negatve gan and wll have to start playng π n order to mnmze the losses. hs famlar real-lfe game can only end up n domnaton where accepts that always plays π and wll accept losng on ths game or n blowng up the hostages and terrorsts. hen ratonal player must always play π. A bold ratonal player always wns over the less bold ratonal player n the long term when the terrorst game s repeated. hs can be formulated as the followng Proposton. Proposton. Let = { S K S n; u K un} be a non-cooperatve n-player statc game whch s repeated. S s the set of strateges and u s the payoff functon of the player. Let the set E of Nash equlbrums satsfy the followng two crtera:. here are players and and two equlbrum ponts x y E such that u ( x) u ( z) and u ( y) u ( z) for any z E. hus there s no unque soluton to ths statc game because t s not possble for players and to acheve the best possble payoff at the same tme. hs s a typcal case for example n asymmetrc warfare.. Let the strategy of the player n x be x and the strategy of the player n y be y. Let z be the outcome of the statc game. If z E and the strategy of the player s x Journal of Informaton Warfare 7

7 Modellng Informaton Warfare as a ame then z = x and f the strategy of the player s y z = y. In other words f the game ends up n a Nash equlbrum then only ether of the players and wll get the maxmum payoff. he repeated game can only end up to the player domnatng the player or the player domnatng the player or both and beng domnated by some player k or to a pont outsde E. A pont outsde E wll result for example f players and both nsst on playng ther best-response strategy. Proof. hs proposton does not say anythng that s not already known from Nash equlbrum ponts but t s gven because of the conclusons we can draw from t. If the soluton s not one of the equlbrum ponts some player has a reason to change hs strategy. hus the players try to get to a soluton whch s n the set E. As the player s ratonal and the game s non-cooperatve he wll try to get the best gan and force others to play x = ( x... x n ). He can only play x but the only equlbrum pont where hs strategy s x s x. hus the other ratonal players can only play the strategy they play n x. If the player succeeds he wll domnate over. If some other player succeeds he wll domnate over. he last possblty s that the result s not an equlbrum pont whch happens for example f nether player nor player accept domnaton. In ths case player wll choose x and player wll choose y but due to conflctng Nash equlbrums ths combnaton wll result n an outcome whch s not n the set E. Domnaton strategy seems acceptable n the repeated terrorst game but n general the acceptablty of the soluton depends on what sde one s. he cause for asymmetrc warfare s often domnaton n the frst place. Domnaton strateges are not necessarly stable. When the cost of acceptng domnaton s on the same range as the estmated cost of fghtng aganst t we should expect a crss to appear. Evldoer ame: Mxed Defence Strateges Can Reduce Domnaton he second game n ths paper s the evldoer game. In ths game an evl hacker tres to attack and compromse a vctm network or host. hs can be seen as a relevant (sub)goal for many forms of nformaton warfare especally for C hacker and cyber warfare. he man contrbuton of ths game s to show that usng mxed defence strateges can result n better tolerance aganst domnatve attack strateges when no generc defence strategy s avalable. he evldoer game s a statc game wth complete nformaton where both players are ratonal. here are two players an attacker A and a vctm. he goal of the attacker s to cause damage to the vctm by crashng hosts nstallng malcous software gettng remote access wth root-prvleges causng Denal-of-Servce and so on. o acheve the goal the attack must fnd a prmary attack whch cannot be drectly detected (e.g. no fngerprnt avalable for a new explot). he attacker has two strateges π A and π A where π A means overloadng the vctm wth many secondary attacks at the same tme wth the prmary attack to cause delays n the OODA-loop of the vctm and make the detecton of the prmary attack more dffcult. he strategy π A means tryng only the prmary attack. he vctm also has two strateges π and π where π means detectng and alertng on all suspcous network 8 Journal of Informaton Warfare

8 Modellng Informaton Warfare as a ame traffc but some of ths traffc may have to allowed to pass through due to the hgh probablty of false alarms. π means detectng and blockng only the most mportant attacks. As the prmary attack wll succeed ntally the vctm may however be able to detect the attack afterwards wth a delay by payng attenton to the avalable alerts. he payoffs u A and u for the attacker and the vctm respectvely are the followng: u A ( π A π ) = 4and u ( π A π ) = 5 : the vctm does not detect the prmary attack at all because the vctm s overloaded by the large amount of alerts from the secondary attacks. u A ( π A π ) = 3and u ( π A π ) = : the vctm does not detect the prmary attack but some of the secondary attacks may cause alerts. hese alerts can be used as an ndcaton about a larger attack and sgns about ntrusons nto mportant hosts can be searched more carefully. here s a low probablty for dentfyng the successful prmary attack. ua( π A π ) = 0and u( π A π ) = 0 : the vctm detects all suspcous network traffc. As there s only a low volume of alerts the vctm has tme to analyse all data carefully and the ntruson s detected after a delay. u π π ) 30 and u π π ) = 0 : the vctm does not detect the prmary attack. A( A = ( A Let us assume that the attacker plays the mxed strategy ( pπ A ( p) π A) where 0 p and that the vctm plays the mxed strategy ( qπ ( q) π ) where 0 q. he expected payoff v A for A s accordng to () v A = p( 5q ) + 5 4q and the expected payoff v for s v = q( 5p) 3+ p. he best response correspondences p (q) and q ( p) for the attacker and the vctm respectvely have one ntersecton at p = /5 and q = /5 whch s the unque mxed strategy Nash equlbrum for ths evldoer game. he evldoer game has thus a unque outcome. hs result has the followng effect on the selecton of attack and defence strateges. If a specfc defence strategy s not generc but nstead works well only aganst a specfc attack strategy then changng the defence strategy more or less randomly results n better tolerance aganst the domnatve attack strateges. he attacker has thus more dffcultes n domnatng a vctm when the vctm s usng mxed defence strateges. In ths specfc evldoer game the attacker should overload the vctm n 40 % of the attacks and use only a sngle prmary attack mechansm n 60 % of the attacks. he vctm on the other hand should try to detect all possble suspcous network behavour 40 % of the tme and concentrate only on detectng and blockng the maor attacks 60 % of the tme. he mxed strategy Nash equlbrum reflects the mutual uncertanty about the other player s strategy. Vandal game: Domnaton Can Have a Lmted me Span he thrd game n ths paper s the vandal game. In ths game a vandal tres to dsturb the usage of a communcaton network for example by ntatng a floodng Denal of Servce (DoS) attack overloadng the target network or by ammng a wreless network. he man contrbuton of ths game s to show that domnaton can have a lmted tme span. If the vctm network s unusable for a too long tme legtmate users wll start usng another Journal of Informaton Warfare 9

9 Modellng Informaton Warfare as a ame network for communcaton purposes. hs new network s selected so that the vandal cannot dsturb t at least not wth the same attack methods. he vandal game s an n -player statc game of complete knowledge where all the players are ratonal. In ths game all the players are usng the servces of a communcaton network. he player V s the vandal who does not maxmze hs gan from havng good servce wth low costs but nstead maxmzes the harm to other users. he player L n s a legtmate user of the network. All legtmate users are dentcal. In total there are thus n players. All the players have two strateges π and π where π means usng the network and π means beng dle. If the vandal s usng the network then the network s expected to be overloaded and cannot be used for legtmate purposes. he payoffs for the vandal and the legtmate user are the followng: If V plays π V wll get 0. If V plays π V wll get m f there are m legtmate users playng π. If L n plays π If V plays π and If V plays π and L L L wll get 0. n plays π n plays π L wll get. L wll get -. Let us assume that the player V plays the mxed strategy ( pπ ( p) π ) and that the player L n plays a mxed strategy ( plπ( pl ) π ) where 0 p L. he expected payoff v V for the vandal s vv = ( n ) p p L and the expected payoff v L for the legtmate user L s v = p p + p ) p = p ( ). L L ( L L p We can concentrate on analysng the best-response correspondences between the vandal and only one legtmate user because all legtmate users are here expected to behave n a smlar fashon. hs results n a two-dmensonal presentaton for the best-response correspondences p ( pl) and p L ( p) and they do not have only a sngle ntersecton pont but nstead an nfnte set of ntersecton ponts because the correspondences overlap partally. he Nash equlbrums for ths vandal game are thus the followng: When p s n the range [..] p L s 0 and the expected payoff s 0 for all players. he soluton of the game s that the vandal cannot wn snce the other players stop usng the servce. Intally of course there wll be a loss for the legtmate users because network servce s not avalable but the legtmate users wll fnd another communcaton mechansm. When studed as a dynamc game the vandal should not always play π because legtmate users wll stop usng the communcaton network. If the vandal plays π only part of the tme (here less than 50% of the tme) he can gan. An mportant queston s how often to play π so that legtmate users wll not stop usng the communcaton network. 0 Journal of Informaton Warfare

10 Modellng Informaton Warfare as a ame Rebel game: Extreme Domnaton Can Result n Rebellons Let us look at a game lke the terrorst game whch has several Nash equlbrum ponts and whch therefore leads to a domnatng soluton f played repeatedly wth a bold strategy. In ths rebel game the domnatng soluton s expected to cause extremely hgh costs to the weaker party. hese hgh costs wll eventually be seen unbearable by the weaker party whch wll eventually start to rebel. he man contrbuton of ths game s to show that t s useful for a domnatng party to prevent extremely hgh costs for the weaker party. Otherwse the weaker party may start to rebel whch wll result n substantal costs to the domnatng party. If a game wth hgh costs to the weaker party s played several tmes we do not know the outcome. he purpose of the rebel game s to suggest a way to treat such games and to propose a soluton concept. If the game s played up to some fnte fnshng tme and the players optmze ther strateges up to the fnshng tme then the game can be treated as a sngle step game wth all the outcomes up to the fnshng tme and wth all strateges whch are sequences of one step strateges. Such a game has at least one Nash equlbrum pont. hs however s not a realstc soluton snce the players cannot calculate strateges up to the fnshng tme and cannot assume the opponent s calculatng strateges up to the fnshng tme and playng ratonally unless the fnshng tme s only few steps ahead. For nstance f there are two players and each has two strateges n one step then after 5 steps there are two to power ffty outcomes. Usng a computer for numercal evaluaton of such a game approaches the computng lmt and memory demands are reached even earler. Analytc solutons can be used to gve probablty dstrbutons for the gans or losses of the players n n steps even for a large n provded that the model s suffcently smple. Let us brefly descrbe one such method the generatng functon method. Let users A and have strateges π A π A π π whch they play wth probabltes p A pa p p respectvely. Let s n qa q ra r denote the probablty of A havng cost r A and havng cost r after a sequence of moves where A has played π A q A tmes and has played π q tmes n n steps. he order of playng the strateges has an mportance to the costs and s n qa q ra r s the sum of probabltes over all possble orderngs of playng the strateges. here s the recurson equaton: s n qa q ra r pa p sn q A+ q+ ra+ fa ( ) r + f ( ) = = = (3) he functons f A ( ) and f ( ) are the losses of A and on one step. We can solve t ndvdually for A and. In the case of A the cost of s not of nterest thus we must solve an equaton of the general type s n q q r = sn q q r + pn q q + c q f r q n s K K K K K K K ( ) n q... q + c... f ( r q n) In the generatng functon method (Jormakka 003) we try to fnd a functon = n( u K uk r) = sn q K q K r k= 0 n( u v) u wth some functons y y ( k n q... qk r) v x( k n q... qk r) x such that the recurson equaton s changed to the form. (4) Journal of Informaton Warfare

11 Modellng Informaton Warfare as a ame n( u v) = g ( n u v) + n ( u v) + n ( u v) (5) he functon n ( u ) descrbes the contrbuton of the boundares. Notce v that g ( n u v) s not always a functon can also be a lnear operator. he equaton for the generatng functon s solved and n ( u v) s expanded nto a power seres out of whch the probabltes are extracted. he form of the soluton for s n qa q ra r s typcally a partton wth some restrctons. Parttons are also slow to evaluate numercally but n many cases one can fnd lmts or bounds whch can be effectvely evaluated. We wll not go nto the mathematcal detals of the method here. he theory s explaned n (Jormakka 003). When the probabltes are solved we can draw a few conclusons. If a sngle step game wth domnaton s played n tmes the probablty of player's cost exceedng a gven lmt can be obtaned from the probabltes s n qa q ra r. Assumng that a player has set a maxmum lmt to tolerable losses ths gves the probablty of a player startng to play rratonally n the sngle step game for fghtng aganst an ntolerable stuaton. he game has been named the rebel game because there s an easy perodc soluton where A plays a domnatng strategy and causes losses of value R on each step. Assumng that has the lmt M for tolerable costs he s lkely to rebel after n=m/r steps. Assumng that ths rebellon ncdence levels the costs of and A to zero and A agan starts playng the domnatng strategy we have a perodc sequence of rebels. In the perodc soluton plays rratonally on some steps and therefore t s not a good ratonal soluton. We may have the followng ratonal solutons: ) he mmedate costs to are so hgh that he can play only one strategy n each step. hat s the mmedate cost of one step exceeds M. hen t s ratonal for to accept all the tme the domnaton strategy played by A. ) A does not play a domnaton strategy but nstead he plays a mxed far strategy. hen 's losses never grow to M and hs ratonal behavor on the sngle step game s also ratonal n the mult-step game. hs requres A to be cooperatve. 3) A and play strateges whch are almost ratonal on the sngle step game but stll never lead to ntolerable losses to ether player. hen the players are almost non-cooperatve. he thrd soluton seems ntutvely to be a possble soluton concept for ths knd of a game. he players are almost ratonal and non-cooperatve on each sngle step. hey do not optmze moves over any sequence of steps whch s realstc. her motvaton s to avod ntolerable losses and the strategy should guarantee t. A rather smple mathematcal model guaranteeng that the probablty of losses hgher than M are mpossble can be made by multplyng the probabltes by ( r M ) where =A and scalng the equaton correspondngly by c n so that probabltes sum to one: s n q = A q ra r c n ra M A )( r M ) pa p sn q A+ q + ra+ f A( ) r + f ( ) ( (6) here s a natural connecton wth the rebel game and asymmetrc nformaton warfare. In asymmetrc warfare one of the partes s often a group of people who feel for some reason havng suffered ntolerable damage and s ready for acts lookng rratonal f the whole hstory Journal of Informaton Warfare

12 Modellng Informaton Warfare as a ame s not consdered. Domnaton strategy s not the soluton as the rebel game shows. It seems mpossble to mpose so hgh costs on one step that the soluton ) be realstc. he soluton ) makes lttle sense to A. Probably balancng between the extremes as n 3) s the only practcal soluton. Appled n nformaton warfare we should conclude that nether hgh penaltes nor gong along wth demands of cyber warrors s a workng soluton. he goal should be to remove the possblty of ntolerable losses to ether sde. Mathematcal models typcally gve only nsght but n ths case there may be a chance for rough estmaton of the tme before rratonal playng behavor happens and how much weaker should a strategy be of a domnatng strategy n order to brng a stable soluton. Meta-Strateges: Modfyng Observatons and Orentaton of the Enemy A wdely used model for descrbng the decson processes n warfare s the OODA-loop (oyd 996). he one who s able to get nsde the opponent s OODA-loop wll control how fast the opponent s able to react to new stuatons and also what decsons the opponent s makng. hs s nformaton superorty and the essental goal for nformaton warfare. Here we wll shortly descrbe how t s possble to model the modfcaton of the opponent s OODA-loop as a game of nformaton warfare. All the complete-knowledge games descrbed so far rely on accurate knowledge of the payoff functons. In real-lfe any player must observe and make as realstc assumptons about these payoffs (costs) as possble. If the observatons about an opponent s costs are unrealstc a player can end up choosng a non-optmal strategy. In the OODA-loop language ths s expressed as makng a wrong decson. o combne game theory and the OODA-loop we can end up n a meta-strategy whch defnes how to affect the strategy selecton process (decson process) of the enemy. he prmary goal of ths knd of a meta-strategy s to make threats look credble.e. lure the opponent to make wrong observatons about the costs of the attacker. If an opponent beleves some threats from an attacker ths opponent wll play accordng to these false observatons and the attacker s allowed to enter at least partally nsde the OODA-loop of the opponent. As a result the qualty and speed of the opponent s decsons wll be decreased. In a complete knowledge game wth realstc payoff functons the possble results of an nformaton warfare game are mostly known n advance. Only choosng a sutable metastrategy wll make t possble to modfy these pre-determned results. Related work Hacker warfare whch s one manfestaton of nformaton warfare can be modelled by usng attack trees (Cohen 998; Schneer 000). Attack tree modellng s a method smlar to usng rsk trees n rsk assessment. An attack tree classfes dfferent attack types and defnes a rsk for each attack type to be the product of the assocated probablty and the cost of a successful attack. It seems however mpossble to assgn probabltes to varous attack types. It s naturally possble to estmate the probabltes of partcular attack types usng some large set of analysed cases but such probabltes do not predct the stuaton n specal cases. he success probablty of usng an explot s strongly tme dependent: a vulnerablty s frst known only to a few then publc scrpts explotng ths vulnerablty wll be avalable and fnally the assocated securty patch wll be nstalled on most vulnerable computers and the explot wll no longer be useful. hs tme dependency assocated wth lack of knowledge makes buldng and updatng a detaled attack tree practcally mpossble. hus an attack tree grows bg wth too many unknown probabltes lke n Cohen (998). Journal of Informaton Warfare 3

13 Modellng Informaton Warfare as a ame In the area of network securty game theory has been used to model msbehavour and selfshness n ad hoc networks (Mchard 003; Urp 003). Penetraton nto a computer system has been studed wth the help of game theory n Sallhammar (004). Conclusons hs paper used game theory to model four dfferent nformaton warfare cases. he results from these games ndcated that dfferent strateges are effectve n achevng and mantanng a domnatng poston n the long term when a sngle step game s repeated many tmes. In the terrorst game whch has two conflctng results a bold strategy was requred to force an enemy to beleve that a player wll not accept any threats. In the evldoer game t was shown that mxed strateges can mtgate the domnatve poston of the attacker especally when any defence strategy s effectve only aganst a specfc attack strategy. Changng the defence strategy somehow randomly wll ncrease the probablty of mtgatng attacks. In the vandal game where there s no cost for carryng out a DoS attack an attacker should overload a network only part of the tme so that the defender wll not stop usng a network completely. Fnally the rebel game ndcated that causng excessve damages to a weaker party can result n rebellons where both partes wll suffer large damages. Mantanng a domnatng poston requres the stronger player to lmt the long term costs to the weaker party. If the weaker party feels that t has suffered too much there wll be lttle dfference how much t wll lose the next tme. Here understandng the hstory of the play s requred to treat actons as ratonal n the sense of game theory. In a dynamc game such as a repeated game only credble threats can have an effect on current behavour. hs fact can be exploted n meta-strateges whch try to modfy the opponent s observatons and perceptons of the payoff functons and strateges n the game. hs percepton management s closely related to the OODA-loop. Meta-strateges are one possblty for gettng nsde the opponent s OODA-loop and controllng the observatons and orentatons and the resultng decson process as a whole. References oyd J. R. (996). he Essence of Wnnng and Losng Presentaton sldes January 996 Cohen F. et al. (998). A Prelmnary Classfcaton Scheme for Informaton System hreats Attacks and Defenses: A Cause and Effect Model and Some Analyss based on hat Model Sanda Natonal Laboratores. Dubns L. and Savage L. (965). How to amble f You Must; Inequaltes for Stochastc Processes Mcraw-Hll. bbons R. (99). A Prmer n ame heory Pearson Educaton Essex UK. Hutchnson W. and Warren M. (00). Prncples of Informaton Warfare. Journal of Informaton Warfare (): -6. Jormakka J. (003). Combnatoral Decson heory wth Applcatons n Hacker Warfare Modellng echncal Report (preprnt) Department of echnology Natonal Defence College Helsnk Fnland. Publcaton Seres (). 4 Journal of Informaton Warfare

14 Modellng Informaton Warfare as a ame Kopp C. (00). Shannon Hypergames and Informaton Warfare. Journal of Informaton Warfare (): Lbck M. (995). What s Informaton Warfare? Natonal Defense Unversty. Mchard P. and Molva R. (003). A ame heoretcal Approach to Evaluate Cooperaton Enforcement Mechansms n Moble Ad hoc Networks. In: Proceedngs of the WOpt 03 workshop March 003 Sopha-Antpols France. Sallhammar K. and Knapskog S. J. (004). Usng ame heory n Stochastc Models for Quantfyng Securty. In Proceedngs of the Nnth Nordc Workshop on Secure I Systems November 004 Espoo Fnland. Schneer. (000). Secrets & Les Wley New York. Urp A. and onuccell M. and ordano S. (003). Modellng cooperaton n moble ad hoc networks: a formal descrpton of selfshness. In: Proceedngs of the WOpt 03 workshop March 003 Sopha-Antpols France. Journal of Informaton Warfare 5

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT

UNIT 11 TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT UNIT TWO-PERSON ZERO-SUM GAMES WITH SADDLE POINT Structure. Introducton Obectves. Key Terms Used n Game Theory.3 The Maxmn-Mnmax Prncple.4 Summary.5 Solutons/Answers. INTRODUCTION In Game Theory, the word

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Test 2. ECON3161, Game Theory. Tuesday, November 6 th

Test 2. ECON3161, Game Theory. Tuesday, November 6 th Test 2 ECON36, Game Theory Tuesday, November 6 th Drectons: Answer each queston completely. If you cannot determne the answer, explanng how you would arrve at the answer may earn you some ponts.. (20 ponts)

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes

Fall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes 5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Comparison of Two Measurement Devices I. Fundamental Ideas.

Comparison of Two Measurement Devices I. Fundamental Ideas. Comparson of Two Measurement Devces I. Fundamental Ideas. ASQ-RS Qualty Conference March 16, 005 Joseph G. Voelkel, COE, RIT Bruce Sskowsk Rechert, Inc. Topcs The Problem, Eample, Mathematcal Model One

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Modelling Service Time Distribution in Cellular Networks Using Phase-Type Service Distributions

Modelling Service Time Distribution in Cellular Networks Using Phase-Type Service Distributions Modellng Servce Tme Dstrbuton n Cellular Networks Usng Phase-Type Servce Dstrbutons runa Jayasurya, Davd Green, John senstorfer Insttute for Telecommuncaton Research, Cooperatve Research Centre for Satellte

More information

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance

problems palette of David Rock and Mary K. Porter 6. A local musician comes to your school to give a performance palette of problems Davd Rock and Mary K. Porter 1. If n represents an nteger, whch of the followng expressons yelds the greatest value? n,, n, n, n n. A 60-watt lghtbulb s used for 95 hours before t burns

More information

Priority based Dynamic Multiple Robot Path Planning

Priority based Dynamic Multiple Robot Path Planning 2nd Internatonal Conference on Autonomous obots and Agents Prorty based Dynamc Multple obot Path Plannng Abstract Taxong Zheng Department of Automaton Chongqng Unversty of Post and Telecommuncaton, Chna

More information

Weighted Penalty Model for Content Balancing in CATS

Weighted Penalty Model for Content Balancing in CATS Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001

GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS. Ismet Sahin. B.S., Cukurova University, M.S., University of Florida, 2001 GAME THEORETIC FLOW AND ROUTING CONTROL FOR COMMUNICATION NETWORKS by Ismet Sahn B.S., Cukurova Unversty, 996 M.S., Unversty of Florda, 00 Submtted to the Graduate Faculty of School of Engneerng n partal

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

TODAY S wireless networks are characterized as a static

TODAY S wireless networks are characterized as a static IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 10, NO. 2, FEBRUARY 2011 161 A Spectrum Decson Framework for Cogntve Rado Networks Won-Yeol Lee, Student Member, IEEE, and Ian F. Akyldz, Fellow, IEEE Abstract

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Introduction to Coalescent Models. Biostatistics 666

Introduction to Coalescent Models. Biostatistics 666 Introducton to Coalescent Models Bostatstcs 666 Prevously Allele frequences Hardy Wenberg Equlbrum Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles

More information

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton

More information

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( ) Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and

More information

Shunt Active Filters (SAF)

Shunt Active Filters (SAF) EN-TH05-/004 Martt Tuomanen (9) Shunt Actve Flters (SAF) Operaton prncple of a Shunt Actve Flter. Non-lnear loads lke Varable Speed Drves, Unnterrupted Power Supples and all knd of rectfers draw a non-snusodal

More information

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET)

A Novel Optimization of the Distance Source Routing (DSR) Protocol for the Mobile Ad Hoc Networks (MANET) A Novel Optmzaton of the Dstance Source Routng (DSR) Protocol for the Moble Ad Hoc Networs (MANET) Syed S. Rzv 1, Majd A. Jafr, and Khaled Ellethy Computer Scence and Engneerng Department Unversty of Brdgeport

More information

Microeconomics 2 Game Theory Lecture notes. 1. Simultaneous-move games: Solution in (iterated) strict dominance and rationalizable strategies

Microeconomics 2 Game Theory Lecture notes. 1. Simultaneous-move games: Solution in (iterated) strict dominance and rationalizable strategies Sapenza Unversty of Rome. Ph.D. Program n Economcs a.y. 202-204 Mcroeconomcs 2 Game Theory Lecture notes. Smultaneous-move games: Soluton n (terated) strct domnance and ratonalzable strateges. Smultaneous-move

More information

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm

Network Reconfiguration in Distribution Systems Using a Modified TS Algorithm Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty

More information

4.3- Modeling the Diode Forward Characteristic

4.3- Modeling the Diode Forward Characteristic 2/8/2012 3_3 Modelng the ode Forward Characterstcs 1/3 4.3- Modelng the ode Forward Characterstc Readng Assgnment: pp. 179-188 How do we analyze crcuts wth juncton dodes? 2 ways: Exact Solutons ffcult!

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann, Kurt Gehs, Gero Mühl Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/

More information

Introduction to Coalescent Models. Biostatistics 666 Lecture 4

Introduction to Coalescent Models. Biostatistics 666 Lecture 4 Introducton to Coalescent Models Bostatstcs 666 Lecture 4 Last Lecture Lnkage Equlbrum Expected state for dstant markers Lnkage Dsequlbrum Assocaton between neghborng alleles Expected to decrease wth dstance

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks

An Attack-Defense Game Theoretic Analysis of Multi-Band Wireless Covert Timing Networks Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the IEEE INFOCOM 2010 proceedngs Ths paper was presented as part of the man Techncal

More information

Estimating Mean Time to Failure in Digital Systems Using Manufacturing Defective Part Level

Estimating Mean Time to Failure in Digital Systems Using Manufacturing Defective Part Level Estmatng Mean Tme to Falure n Dgtal Systems Usng Manufacturng Defectve Part Level Jennfer Dworak, Davd Dorsey, Amy Wang, and M. Ray Mercer Texas A&M Unversty IBM Techncal Contact: Matthew W. Mehalc, PowerPC

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) ,

VRT014 User s guide V0.8. Address: Saltoniškių g. 10c, Vilnius LT-08105, Phone: (370-5) , Fax: (370-5) , VRT014 User s gude V0.8 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Rational Secret Sharing without Broadcast

Rational Secret Sharing without Broadcast Ratonal Secret Sharng wthout Broadcast Amjed Shareef, Department of Computer Scence and Engneerng, Indan Insttute of Technology Madras, Chenna, Inda. Emal: amjedshareef@gmal.com Abstract We use the concept

More information

ECE315 / ECE515 Lecture 5 Date:

ECE315 / ECE515 Lecture 5 Date: Lecture 5 Date: 18.08.2016 Common Source Amplfer MOSFET Amplfer Dstorton Example 1 One Realstc CS Amplfer Crcut: C c1 : Couplng Capactor serves as perfect short crcut at all sgnal frequences whle blockng

More information

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce

Ad hoc Service Grid A Self-Organizing Infrastructure for Mobile Commerce Ad hoc Servce Grd A Self-Organzng Infrastructure for Moble Commerce Klaus Herrmann Berln Unversty of Technology Emal: klaus.herrmann@acm.org Web: http://www.vs.tu-berln.de/herrmann/ PTB-Semnar, 3./4. November

More information

Opportunistic Beamforming for Finite Horizon Multicast

Opportunistic Beamforming for Finite Horizon Multicast Opportunstc Beamformng for Fnte Horzon Multcast Gek Hong Sm, Joerg Wdmer, and Balaj Rengarajan allyson.sm@mdea.org, joerg.wdmer@mdea.org, and balaj.rengarajan@gmal.com Insttute IMDEA Networks, Madrd, Span

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources

POLYTECHNIC UNIVERSITY Electrical Engineering Department. EE SOPHOMORE LABORATORY Experiment 1 Laboratory Energy Sources POLYTECHNIC UNIERSITY Electrcal Engneerng Department EE SOPHOMORE LABORATORY Experment 1 Laboratory Energy Sources Modfed for Physcs 18, Brooklyn College I. Oerew of the Experment Ths experment has three

More information

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR

DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR DETERMINATION OF WIND SPEED PROFILE PARAMETERS IN THE SURFACE LAYER USING A MINI-SODAR A. Coppalle, M. Talbaut and F. Corbn UMR 6614 CORIA, Sant Etenne du Rouvray, France INTRODUCTION Recent mprovements

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

onlinecomponents.com

onlinecomponents.com PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58535-1 wth 408-4021 De Assembly 58535-2 29 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru.

EMA. Education Maintenance Allowance (EMA) Financial Details Form 2017/18. student finance wales cyllid myfyrwyr cymru. student fnance wales cylld myfyrwyr cymru Educaton Mantenance Allowance (EMA) Fnancal Detals Form 2017/18 sound advce on STUDENT FINANCE EMA Educaton Mantenance Allowance (EMA) 2017/18 /A How to complete

More information

Figure 1. DC-DC Boost Converter

Figure 1. DC-DC Boost Converter EE36L, Power Electroncs, DC-DC Boost Converter Verson Feb. 8, 9 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2)

PRO- CRIMPER III Hand Crimping Tool Assembly DESCRIPTION (Figures 1 and 2) PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 58495-1 408-9819 Wth De Assembly 58495-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

It can be smart to be dumb

It can be smart to be dumb It can be smart to be dumb Davd H. Wolpert, Mchael Harre 2 MS 269-, NASA Ames Research Center, Moffett Feld, CA, 94035, USA 2 The Centre for the Mnd and The School of Informaton Technologes, Sydney Unversty,

More information

A Preliminary Study of Information Collection in a Mobile Sensor Network

A Preliminary Study of Information Collection in a Mobile Sensor Network A Prelmnary Study of Informaton ollecton n a Moble Sensor Network Yuemng Hu, Qng L ollege of Informaton South hna Agrcultural Unversty {ymhu@, lqng1004@stu.}scau.edu.cn Fangmng Lu, Gabrel Y. Keung, Bo

More information

Reflections on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator Into a Skew Quad Rotator

Reflections on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator Into a Skew Quad Rotator JLAB-TN-4-23 4 August 24 Reflectons on Rotators, Or, How to Turn the FEL Upgrade 3F Skew Quad Rotator nto a Skew Quad Rotator D. Douglas ntroducton A prevous note [] descrbes a smple skew quad system that

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Webinar Series TMIP VISION

Webinar Series TMIP VISION Webnar Seres TMIP VISION TMIP provdes techncal support and promotes knowledge and nformaton exchange n the transportaton plannng and modelng communty. DISCLAIMER The vews and opnons expressed durng ths

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

Distributed Channel Allocation Algorithm with Power Control

Distributed Channel Allocation Algorithm with Power Control Dstrbuted Channel Allocaton Algorthm wth Power Control Shaoj N Helsnk Unversty of Technology, Insttute of Rado Communcatons, Communcatons Laboratory, Otakaar 5, 0150 Espoo, Fnland. E-mal: n@tltu.hut.f

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

CDMA Uplink Power Control as a Noncooperative Game

CDMA Uplink Power Control as a Noncooperative Game Wreless Networks 8, 659 670, 2002 2002 Kluwer Academc Publshers. Manufactured n The Netherlands. CDMA Uplnk Power Control as a Noncooperatve Game TANSU APCAN, TAMER BAŞAR and R. SRIKANT Coordnated Scence

More information

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications

Decomposition Principles and Online Learning in Cross-Layer Optimization for Delay-Sensitive Applications Techncal Report Decomposton Prncples and Onlne Learnng n Cross-Layer Optmzaton for Delay-Senstve Applcatons Abstract In ths report, we propose a general cross-layer optmzaton framework n whch we explctly

More information

PRO- CRIMPER* III Hand Crimping

PRO- CRIMPER* III Hand Crimping PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool 58448-2 408-9357 Wth De 58448-3 10 Mar 11 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually powered hand

More information

Multiagent Jamming-Resilient Control Channel Game for Cognitive Radio Ad Hoc Networks

Multiagent Jamming-Resilient Control Channel Game for Cognitive Radio Ad Hoc Networks Multagent Jammng-Reslent Control Channel Game for Cogntve Rado Ad Hoc Networks Brandon F. Lo and Ian F. Akyldz Broadband Wreless Networkng Laboratory, School of Electrcal and Computer Engneerng Georga

More information

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks

A Game Theoretic Approach for Distributed Resource Allocation and Orchestration of Softwarized Networks A Game Theoretc Approach for Dstrbuted Resource Allocaton and Orchestraton of Softwarzed Networks Salvatore D Oro, Laura Gallucco, Member, IEEE, Sergo Palazzo, Senor Member, IEEE, Govann Schembra Abstract

More information

PRO- CRIMPER* III Hand Crimping

PRO- CRIMPER* III Hand Crimping PRO- CRIMPER* III Hand Crmpng Instructon Sheet Tool Assembly 91338-1 408-8377 wth De Assembly 91338-2 22 JUL 09 PROPER USE GUIDELINES Cumulatve Trauma Dsorders can result from the prolonged use of manually

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks

Selective Sensing and Transmission for Multi-Channel Cognitive Radio Networks IEEE INFOCOM 2 Workshop On Cogntve & Cooperatve Networks Selectve Sensng and Transmsson for Mult-Channel Cogntve Rado Networks You Xu, Yunzhou L, Yfe Zhao, Hongxng Zou and Athanasos V. Vaslakos Insttute

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information