Ting: Measuring and Exploiting Latencies Between All Tor Nodes. Frank Cangialosi Dave Levin Neil Spring University of Maryland
|
|
- Julius Warner
- 6 years ago
- Views:
Transcription
1 Ting: Measuring and Eploiting Latencies Between All Tor Nodes Frank Cangialosi Dave Levin Neil Spring Universit of Marland 1
2 Measuring latencies Ping Measurement Host Eternal Host Limited to the nodes we control 2
3 Measuring latencies Ping Measurement Host Eternal Host To gain broader insight, we can: 1. Control more nodes? 2. Estimate latencies? Limited to the nodes we control 3
4 Measuring latencies Ping Goal Measurement Host Eternal Host Limited to the nodes we control Latenc between arbitrar nodes 4
5 King technique [Gummadi et al, 2002] ns ns 5
6 King technique [Gummadi et al, 2002] ns ns 5
7 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Q ns ns 5
8 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries A Q ns Q A ns 5
9 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries ns ns 5
10 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Ping ns ns 5
11 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Ping Subtract latencies ns ns 5
12 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Subtract latencies ns ns 5
13 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Subtract latencies King does not directl measure the path between two hosts ns ns 5
14 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Subtract latencies King does not directl measure the path between two hosts ns ns 5
15 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Subtract latencies King does not directl measure the path between two hosts ns ns 5
16 King technique [Gummadi et al, 2002] Measure the RTT of recursive DNS queries Subtract latencies King does not directl measure the path between two hosts ns ns Onl 3% support recursive queries 5
17 TING a tool for measuring latenc between arbitrar Tor nodes 1 Accurate measures the full path between end hosts 2 Practical does not require modification of end hosts 6
18 What is Tor? Anonmit-enabling overla network Packets routed through series of relas, called a circuit Client Destination Clients choose their own circuits 7
19 What is Tor? Anonmit-enabling overla network Packets routed through series of relas, called a circuit Client Destination Clients choose their own circuits 7
20 Wh Tor? Large 6,536 relas in 77 countries (on October 29, 2015) Diverse 5,520 /24s, ~61% residential networks Growing [ 8
21 Tor-specific constraints 9
22 Tor-specific constraints 9
23 Tor-specific constraints 9
24 Tor-specific constraints Ping 9
25 Tor-specific constraints Ping Subtract latencies? 9
26 Tor-specific constraints Tor traffic ma be treated differentl 9
27 Tor-specific constraints Tor traffic ma be treated differentl % ICMP slower 0.6 CDF % TCP slower min(icmp) - min(tcp) (msec) 10
28 Tor-specific constraints Tor traffic ma be treated differentl 11
29 Tor-specific constraints Tor traffic ma be treated differentl 11
30 Tor-specific constraints Tor traffic ma be treated differentl Tor Cannot create one-hop circuits 11
31 Tor-specific constraints Tor traffic ma be treated differentl Tor Cannot create one-hop circuits 12
32 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits 13
33 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits 14
34 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits Must account for forwarding delas F 14
35 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits Must account for forwarding delas F Queuing / Scheduling Encrption & Decrption Contet Switches 14
36 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits Must account for forwarding delas F F F F Queuing / Scheduling Encrption & Decrption Contet Switches 14
37 Tor-specific constraints Tor traffic ma be treated differentl Cannot create one-hop circuits Must account for forwarding delas 15
38 Ting technique 16
39 Measurement Host s d Summar 17
40 Measurement Host s d Measure full path between and Summar w z 18
41 Measurement Host s d Measure full path between and Summar w z 18
42 Measurement Host s d Measure full path between and Summar w z 18
43 Measurement Host s d Measure full path between and Summar w z F F F F F F F F 18
44 Measurement Host s d Measure full path between and Summar w z F F F F F F F F 18
45 Measurement Host s d Isolate RTT between client and Summar w z F F F F 19
46 Measurement Host s d Isolate RTT between client and Summar w z F F F F 19
47 Measurement Host s d Isolate RTT between client and Summar w z F F F F F F 19
48 Measurement Host s d Isolate RTT between client and Summar w z F F F F F F 19
49 Measurement Host s d Isolate RTT between client and Summar w z F F F F F F 19
50 Measurement Host s d Isolate RTT between client and Summar w z F F F F F F 20
51 Measurement Host s d Isolate RTT between client and Summar w z Subtract latencies F F F F F F 20
52 Measurement Host s d Isolate RTT between client and Summar w z F F F F 20
53 Measurement Host s d Isolate RTT between client and Summar w z F F F 21
54 Measurement Host s d Isolate RTT between client and Summar w z F F F 21
55 Measurement Host s d Isolate RTT between client and Summar w z F F F F F 21
56 Measurement Host s d Isolate RTT between client and Summar w z F F F F F 21
57 Measurement Host s d Isolate RTT between client and Summar w z F F F F F 21
58 Measurement Host s d Isolate RTT between client and Summar w z F F F F F 22
59 Measurement Host s w d z Isolate RTT between client and Summar Subtract latencies F F F F F 22
60 1 2 3 Isolate RTT between client and Summar F F 22
61 1 2 3 = RTT(,) + F + F Summar F F 23
62 1 2 3 s d s d s d w z w z w z 24
63 1 2 3 min ( X * ) min ( X * ) min ( X * ) s d s d s d w z w z w z Minimum of multiple, independent samples of each circuit 25
64 Ting evaluation Implemented Ting using the Stem Tor controller No modifications to the Tor client How well does Ting work? How accurate? How man samples? How consistent? 26
65 Ting evaluation How well does Ting work? How accurate? How man samples? How consistent? 31 Tor relas 930 Total pairs 27
66 How accurate is Ting? Fraction of PlanetLab Pairs All Pairs Measured / Real 28
67 How accurate is Ting? Fraction of PlanetLab Pairs Ideal All Pairs Measured / Real 28
68 How accurate is Ting? Fraction of PlanetLab Pairs Ideal All Pairs Measured / Real 28
69 How accurate is Ting? Fraction of PlanetLab Pairs Ideal All Pairs Measured / Real Ting estimates tpicall within 10% of real 28
70 How accurate is Ting? Fraction of PlanetLab Pairs < 50 ms ms ms > 250 ms Ideal Measured / Real Ting estimates tpicall within 10% of real 29
71 How accurate is Ting? Fraction of PlanetLab Pairs < 50 ms ms ms > 250 ms Ideal Measured / Real Ting estimates tpicall within 10% of real 29
72 How accurate is Ting? Fraction of PlanetLab Pairs < 50 ms ms ms > 250 ms Ideal Measured / Real Relative error lower at higher latencies Forwarding delas create an additive error RTT(,) + F + F Ting estimates tpicall within 10% of real 29
73 How man samples does Ting need? Cumulative Fraction of Fraction Pairs Measured Min Within 1ms Within 1% Within 5% Within 10% Cumulative Samples Per Circuit 30
74 How man samples does Ting need? Cumulative Fraction of Fraction Pairs Measured Min Within 1ms Within 1% Within 5% Within 10% Cumulative Samples Per Circuit 30
75 How man samples does Ting need? Fraction of Pairs Onl ~15 samples needed to reach values within 5% of min Within 5% Cumulative Samples Per Circuit Ting remains accurate with few samples 31
76 How consistent are Ting measurements? 30 pairs of real Tor relas, measured once an hour over a week Latenc (ms) Pairs (Sorted in Increasing Order of Median Latenc) 32
77 How consistent are Ting measurements? 30 pairs of real Tor relas, measured once an hour over a week 50% var b < 5ms over a week Ting measurements need not be updated often
78 Evaluation summar How well does Ting work? Tpicall within 10% of real latenc Remains accurate with few samples Var b onl a few ms over time Ting s stabilit and accurac permit collection of an all-pairs RTT dataset
79 Evaluation summar How well does Ting work? Tpicall within 10% of real latenc Remains accurate with few samples Var b onl a few ms over time Ting s stabilit and accurac permit collection of an all-pairs RTT dataset
80 All-pairs RTT dataset 50 Tor relas outside of our control 1,225 pairs in all-pairs RTT dataset Geographic distribution Latenc distribution CDF Latenc (msec) 35
81 Applications 1 Speeding up deanonmization of Tor circuits 2 Improving Tor s path selection algorithm 3 Gain insight into non-tor nodes 36
82 Applications 1 Speeding up deanonmization of Tor circuits 37
83 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Client Malicious Destination 38
84 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Client Malicious Destination 38
85 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Client Malicious Destination 38
86 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination 38
87 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination Probe 38
88 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination Probe 38
89 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination Probe Time- and bandwidth-intensive 38
90 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination Probe Time- and bandwidth-intensive Done in an unguided fashion 38
91 Classic traffic-analsis attack [Murdoch and Danezis, 2005] Attacker s Goal: find all nodes in the circuit Client Malicious Destination Probe Time- and bandwidth-intensive Done in an unguided fashion 38
92 Classic traffic-analsis attack CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested 39
93 Classic traffic-analsis attack CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested 39
94 Faster deanonmization with Ting Appl what the attacker knows about latencies 40
95 Faster deanonmization with Ting Appl what the attacker knows about latencies e2e RTT 40
96 Faster deanonmization with Ting Appl what the attacker knows about latencies e2e RTT 40 Directl measured
97 Faster deanonmization with Ting Appl what the attacker knows about latencies e2e RTT Pre-measured with Ting 40 Directl measured
98 Faster deanonmization with Ting Appl what the attacker knows about latencies e2e RTT Client s RTT to the entr node is unknown Pre-measured with Ting 40 Directl measured
99 Faster deanonmization with Ting Appl what the attacker knows about latencies e2e RTT Client s RTT to the entr node is unknown Pre-measured with Ting 40 Directl measured
100 Faster deanonmization with Ting Reason about what the client entr RTT would have to be e2e RTT Client s RTT to the entr node is unknown Pre-measured with Ting 40 Directl measured
101 Faster deanonmization with Ting Reason about what the client entr RTT would have to be Client s RTT to the entr node is unknown Pre-measured with Ting 41 Directl measured
102 Faster deanonmization with Ting Reason about what the client entr RTT would have to be Client s RTT to the entr node is unknown Pre-measured with Ting 41 Directl measured
103 Ruling out nodes without probing them Reason about what the client entr RTT would have to be Client s RTT to the entr node is unknown Pre-measured with Ting 42 Directl measured
104 Ruling out nodes without probing them Reason about what the client entr RTT would have to be Client s RTT to the entr node is unknown Pre-measured with Ting 42 Directl measured
105 Ruling out nodes without probing them Reason about what the client entr RTT would have to be Client s RTT to the entr node is unknown Pre-measured with Ting 42 Directl measured
106 Ruling out nodes without probing them Reason about what the client entr RTT would have to be Client s RTT would have to be negative Client s RTT to the entr node is unknown Pre-measured with Ting 42 Directl measured
107 Ruling out nodes without probing them Reason about what the client entr RTT would have to be Too-Large RTT Client s RTT would have to be negative Client s RTT to the entr node is unknown Pre-measured with Ting 42 Directl measured
108 Ruling out too-large RTTs CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested 43
109 Ruling out too-large RTTs CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested 43
110 Informed target selection Probe nodes according to probabilit that the are on the circuit Too-Large RTT Client s RTT would have to be negative Client s RTT to the entr node is unknown Pre-measured with Ting 44 Directl measured
111 Informed target selection Probe the more likel circuits first Client s RTT to the entr node is unknown Pre-measured with Ting 45 Directl measured
112 Informed target selection Probe the more likel circuits first Client s RTT to the entr node is unknown Pre-measured with Ting 45 Directl measured
113 Informed target selection Probe the more likel circuits first Client s RTT to the entr node is unknown Pre-measured with Ting 45 Directl measured
114 Informed target selection Probe the more likel circuits first Average Ting RTT Client s RTT to the entr node is unknown Pre-measured with Ting 45 Directl measured
115 Informed target selection Probe the more likel circuits first Average Ting RTT Client s RTT to the entr node is unknown Pre-measured with Ting 45 Directl measured
116 Informed target selection Probe the more likel circuits first Score Lower score implies higher likelihood Client s RTT to the entr node is unknown Pre-measured with Ting 46 Directl measured
117 Informed target selection Probe the more likel circuits first Score Lower score implies higher likelihood Client s RTT to the entr node is unknown Pre-measured with Ting 46 Directl measured
118 Informed target selection Probe the more likel circuits first Score Lower score implies higher likelihood Client s RTT to the entr node is unknown Pre-measured with Ting 47 Directl measured
119 Informed target selection Probe the more likel circuits first Score Lower score implies higher likelihood Client s RTT to the entr node is unknown Pre-measured with Ting 47 Directl measured
120 Faster deanonmization with Ting CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested Informed target selection decreases search time b a median of
121 Faster deanonmization with Ting CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested Informed target selection decreases search time b a median of
122 Faster deanonmization with Ting CDF RTT-unaware Ignore too-large RTTs + informed target selection Fraction of nodes tested Informed target selection decreases search time b a median of
123 Summar We lack a practical tool for measuring the latenc between two arbitrar hosts TING measures the latenc between Tor nodes is fast, accurate, and practical Source code and data available at: 49
124 Implementation Ting Client Test Relas Language: Pthon Tor Controller: Stem Tor patched SLOC: ~400 Tor (latest) PublishDescriptors 0 Restricted Eit Polic Uptime: > 1 month 50
Pinpointing Anomalies in Large-Scale Traceroute Measurements. Romain Fontugne & Kenjiro Cho November 10, 2016
Pinpointing Anomalies in Large-Scale Traceroute Measurements Romain Fontugne & Kenjiro Cho November 10, 2016 1 / 31 This presentation On going research work conducted at IIJ-II In collaboration with: Emile
More informationDIMES. A Measurement Study of the Origins of End to End Delay Variations Yuval Shavitt School of Electrical Engineering
DIMES A Measurement Study of the Origins of End to End Delay Variations Yuval Shavitt School of Electrical Engineering shavitt@eng.tau.ac.il http://www.netdimes.org http://www.eng.tau.ac.il/~shavitt DIMES
More informationPinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements
Pinpointing Delay and Forwarding Anomalies Using Large-Scale Traceroute Measurements Romain Fontugne 1, Emile Aben 2, Cristel Pelsser 3, Randy Bush 1 November 1, 2017 1 IIJ Research Lab, 2 RIPE NCC, 3
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Authors: Radhika Mittal(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi(Microsoft), Amin Vahdat, Yaogong
More informationCopa: Practical Delay-Based Congestion Control
Copa: Practical Delay-Based Congestion Control Venkat Arun and Hari Balakrishnan MIT, CSAIL web.mit.edu/copa The Internet is more challenging than ever (Why are we still talking about congestion control
More informationAn Empirical Mixture Model for Large-Scale RTT Measurements
1 An Empirical Mixture Model for Large-Scale RTT Measurements Romain Fontugne 1,2 Johan Mazel 1,2 Kensuke Fukuda 1,3 1 National Institute of Informatics 2 JFLI 3 Sokendai June 9, 2015 Introduction RTT:
More informationRTTometer: Measuring Path Minimum RTT with Confidence
RTTometer: Measuring Path Minimum RTT with Confidence Amgad Zeitoun Zhiheng Wang Sugih Jamin Department of Electrical Engineering and Computer Science, The University of Michigan, Ann Arbor {azeitoun,zhihengw,jamin}@eecs.umich.edu
More informationQuantitative Trait Analysis in Sibling Pairs. Biostatistics 666
Quantitative Trait Analsis in Sibling Pairs Biostatistics 666 Outline Likelihood function for bivariate data Incorporate genetic kinship coefficients Incorporate IBD probabilities The data Pairs of measurements
More informationPeering vs. Transit. Adnan Ahmed University of Iowa. University of Iowa
Peering vs. Transit Adnan Ahmed Introduction Transit Provides connectivity to the Internet Traffic volume based fees Peering Bilateral exchange Settlement-free (no fee) 1. Introduction Related work Interconnection
More informationTCP-Friendly Equation-Based Congestion Control
TCP-Friendly Equation-Based Congestion Control (widmer@informatik.uni-mannheim.de) 09 December 2002 Overview Introduction to congestion control Equation-based congestion control (TFRC) Congestion control
More informationRecursives in the Wild:
Recursives in the Wild: Engineering Authoritative DNS Servers RON++ Meeting 2017-12-15 Utrecht Moritz Müller1,2, Giovane C. M. Moura1, Ricardo de O. Schmidt1,2, John Heidemann3 1SIDN Labs, 2University
More informationRecursives in the Wild:
Recursives in the Wild: Engineering Authoritative DNS Servers IMC 2017 2017-11-03 London Moritz Müller1,2, Giovane C. M. Moura1, Ricardo de O. Schmidt1,2, John Heidemann3 1SIDN Labs, 2University of Twente,
More informationEpisode 7. Modeling Network Traffic using Game Theory. Baochun Li Department of Electrical and Computer Engineering University of Toronto
Episode 7. Modeling Network Traffic using Game Theory aochun Li epartment of Electrical and Computer Engineering University of Toronto Networks, Crowds, and Markets, Chapter 8 Objective in this episode
More informationIAS 3.9 Bivariate Data
Year 13 Mathematics IAS 3.9 Bivariate Data Robert Lakeland & Carl Nugent Contents Achievement Standard.................................................. 2 Bivariate Data..........................................................
More informationEnhancements for RTT-Fair HighSpeed TCP
Enhancements for RTT-Fair HighSpeed TCP Damien Phillips, Jiankun Hu School of Computer Science and Information Technology, RMIT University GPO Box 2476V, Melbourne 31, Australia Email: {damphil, jiankun}@cs.rmit.edu.au
More informationBBR Congestion Control
BBR Congestion Control Neal Cardwell, Yuchung Cheng, C. Stephen Gunn, Soheil Hassas Yeganeh, Van Jacobson IETF 97: Seoul, Nov 2016 1 Congestion and bottlenecks 2 Delivery rate Congestion and bottlenecks
More informationComparing Two ROC Curves Independent Groups Design
Chapter 548 Comparing Two ROC Curves Independent Groups Design Introduction This procedure is used to compare two ROC curves generated from data from two independent groups. In addition to producing a
More informationTIMELY: RTT-based Congestion Control for the Datacenter
TIMELY: RTT-based Congestion Control for the Datacenter Radhika Mittal*(UC Berkeley), Vinh The Lam, Nandita Dukkipati, Emily Blem, Hassan Wassel, Monia Ghobadi*(Microsoft), Amin Vahdat, Yaogong Wang, David
More informationAnalyzing Spammers Social Networks for Fun and Profit
Chao Yang Robert Harkreader Jialong Zhang Seungwon Shin Guofei Gu Texas A&M University Analyzing Spammers Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Presentation:
More informationResponse Time-Optimized Distributed Cloud Resource Allocation
Response Time-Optimized Distributed Cloud Resource Allocation Matthias Keller Holger Karl Computer Networks Group Universität Paderborn Minimizing response times Latency-critical service Interactive, emergency
More informationPassive TCP Stream Estimation of RTT and Jitter Parameters. Jason But Urs Keller Grenville Armitage David Kennedy
Passive TCP Stream Estimation of RTT and Jitter Parameters Jason But Urs Keller Grenville Armitage David Kennedy Outline Passive Monitoring of TCP RTT and Jitter Estimation algorithm Accuracy of Algorithm
More informationLACNIC Annual Meeting Monday, May 25, 2009 Bill Woodcock Research Director Packet Clearing House
Introduction to Peering & Internet Exchange Points LACNIC Annual Meeting Monday, May 25, 2009 Bill Woodcock Research Director Packet Clearing House ISP Lifecycle: Simple Aggregator Single Transit Provider
More informationPosition Paper: How Certain is Recommended Trust-Information?
Position Paper: How Certain is Recommended Trust-Information? Uwe Roth University of Luxembourg FSTC Campus Kirchberg 6, rue Richard Coudenhove-Kalergi L-1359 Luxembourg uwe.roth@uni.lu ABSTRACT Nowadays
More informationDebloating the Linux WiFi Stack
Debloating the Linux WiFi Stack Toke Høiland-Jørgensen Karlstad University toke.hoiland-jorgensen@kau.se 1 QCA, 9th Dec 2016 Toke Høiland-Jørgensen Outline A history of bloat fixes in Linux The issues
More information#40plusfitness Online Training: October 2017
#40plusfitness Online Training: October 2017 Are you building strong a strong foundation? If you ve been a member of this group for awhile, you ll have noticed that I m a big fan of planks, squats, rows
More informationA Model Officer: An Agent-based Model of Policing
A Model Officer: An Agent-based Model of Policing Sarah Wise* 1 and Tao Cheng 1 Department of Civil, Environmental, and Geomatic Engineering University College London November 7, 2014 Summary The way police
More information56:134 Process Engineering
56:134 Process Engineering Homework #2 Solutions Your role as a process analyst is to reduce cycle time of the process in Figure 1. The duration of each activity is as follows: Release PCB1 2 minutes Release
More informationPredicting Reconviction Rates in Northern Ireland
Statistics and Research Branch Predicting Reconviction Rates in Northern Ireland Research and Statistical Bulletin 7/2005 Brian Francis, Juliet Harman, Leslie Humphres Predicting Reconviction Rates in
More informationQuantifying location privacy
Sébastien Gambs Quantifying location privacy 1 Quantifying location privacy Sébastien Gambs Université de Rennes 1 - INRIA sgambs@irisa.fr 10 September 2013 Sébastien Gambs Quantifying location privacy
More informationMEASUREMENT OF SKILLED PERFORMANCE
MEASUREMENT OF SKILLED PERFORMANCE Name: Score: Part I: Introduction The most common tasks used for evaluating performance in motor behavior may be placed into three categories: time, response magnitude,
More informationTowards Characterizing International Routing Detours
Towards Characterizing International Routing Detours Anant Shah Colorado State University akshah@cs.colostate.edu Romain Fontugne IIJ Research Lab romain@iij.ad.jp Christos Papadopoulos Colorado State
More informationPath Analysis, SEM and the Classical Twin Model
Path Analysis, SEM and the Classical Twin Model Michael Neale & Frühling Rijsdijk 2 Virginia Institute for Psychiatric and Behavioral Genetics Virginia Commonwealth University 2 MRC SGDP Centre, Institute
More information(12) Patent Application Publication (10) Pub. No.: US 2009/ A1
(19) United States US 2009.02451 05A1 (12) Patent Application Publication (10) Pub. No.: US 2009/0245105 A1 HO (43) Pub. Date: Oct. 1, 2009 (54) METHOD FOR NETWORK TRANSMISSION (30) Foreign Application
More informationJitter-aware time-frequency resource allocation and packing algorithm
Jitter-aware time-frequency resource allocation and packing algorithm The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As
More informationAnycast and BGP Stability
Anycast and BGP Stability A Closer Look at DNSMON Data Daniel.Karrenberg@ripe.net Daniel Karrenberg. NANOG MAY 2005. http://www.ripe.net 1 Other Studies Mark Kosters: "Life and Times of J-Root http://www.nanog.org/mtg-0410/pdf/kosters.pdf
More informationNarrative Study on Witnesses Involvement in Their Statements
Narrative Stud on Witnesses Involvement in Their Statements LUPING ZHANG China Universit of Political Science and Law ABSTRACT The present stud, based on Labov s narrative theor, focuses on how witnesses
More informationSpeed Accuracy Trade-Off
Speed Accuracy Trade-Off Purpose To demonstrate the speed accuracy trade-off illustrated by Fitts law. Background The speed accuracy trade-off is one of the fundamental limitations of human movement control.
More informationDTI C TheUniversityof Georgia
DTI C TheUniversityof Georgia i E L. EGCTE Franklin College of Arts and Sciences OEC 3 1 1992 1 Department of Psychology U December 22, 1992 - A Susan E. Chipman Office of Naval Research 800 North Quincy
More informationA METHOD TO ENHANCE INFORMATIZED CAPTION FROM IBM WATSON API USING SPEAKER PRONUNCIATION TIME-DB
A METHOD TO ENHANCE INFORMATIZED CAPTION FROM IBM WATSON API USING SPEAKER PRONUNCIATION TIME-DB Yong-Sik Choi, YunSik Son and Jin-Woo Jung Department of Computer Science and Engineering, Dongguk Universit,
More informationThe National DAFNE Audit
The National DAFNE Audit Data Quality and Centre Performance David Hopkins King s College Hospital, London DAFNE Collaborative 26 th June 2015 Why audit matters Audit has been at the centre of DAFNE since
More informationEarly Learning vs Early Variability 1.5 r = p = Early Learning r = p = e 005. Early Learning 0.
The temporal structure of motor variability is dynamically regulated and predicts individual differences in motor learning ability Howard Wu *, Yohsuke Miyamoto *, Luis Nicolas Gonzales-Castro, Bence P.
More informationUsing Bayesian Networks to Analyze Expression Data. Xu Siwei, s Muhammad Ali Faisal, s Tejal Joshi, s
Using Bayesian Networks to Analyze Expression Data Xu Siwei, s0789023 Muhammad Ali Faisal, s0677834 Tejal Joshi, s0677858 Outline Introduction Bayesian Networks Equivalence Classes Applying to Expression
More informationTable of Contents. Table of Contents
Table of Contents Table of Contents Chapter 1 EPON OAM Settings... 1 1.1 OAM Overview... 1 1.1.1 OAM Protocol s Attributes... 1 1.1.2 OAM Mode... 2 1.1.3 Components of the OAM Packet... 3 1.2 EPON OAM
More informationArtificial Intelligence Lecture 7
Artificial Intelligence Lecture 7 Lecture plan AI in general (ch. 1) Search based AI (ch. 4) search, games, planning, optimization Agents (ch. 8) applied AI techniques in robots, software agents,... Knowledge
More informationLearning : may be defined as a relatively permanent change in behavior that is the result of practice. There are four basic kinds of learning
LEARNING Learning : may be defined as a relatively permanent change in behavior that is the result of practice. There are four basic kinds of learning a. Habituation, in which an organism learns that to
More informationThe Color Consensus Mechanism Beige Paper: Color Prism
The Color Consensus Mechanism Beige Paper: Color Prism Version 0.9-1 November 24, 2018 The Color Platform Team 1.0 Purpose The purpose of this paper is to explain the Color Consensus Mechanism at length
More informationMinimizing Uncertainty in Property Casualty Loss Reserve Estimates Chris G. Gross, ACAS, MAAA
Minimizing Uncertainty in Property Casualty Loss Reserve Estimates Chris G. Gross, ACAS, MAAA The uncertain nature of property casualty loss reserves Property Casualty loss reserves are inherently uncertain.
More informationPART - A 1. Define Artificial Intelligence formulated by Haugeland. The exciting new effort to make computers think machines with minds in the full and literal sense. 2. Define Artificial Intelligence
More informationThe PlaNet-PTN Module: a Single Layer Design Tool for Packet Transport Networks
The PlaNet-PTN Module: a Single Layer Design Tool for Packet Transport Networks Technical Report UTD/EE/1/2009 May 2009 Miguel Razo, Arie Litovsky, Wanjun Huang, Arularasi Sivasankaran, Limin Tang, Hars
More informationNANO: Network Access Neutrality Observatory
NANO: Network Access Neutrality Observatory Mukarram Bin Tariq, Murtaza Motiwala, Nick Feamster, Mostafa Ammar Georgia Tech 1 Net Neutrality 2 Net Neutrality 2 Net Neutrality 2 Example: BitTorrent Blocking
More informationDealing with Ambiguity in Plan Recognition under Time Constraints
Dealing with Ambiguity in Plan Recognition under Time Constraints Moser S. Fagundes, Felipe Meneguzzi, Rafael H. Bordini, Renata Vieira Pontifical Catholic University of Rio Grande do Sul Plan Recognition
More informationShoreTel Network Services Portfolio FAQ
FREQUENTLY ASKED QUESTIONS ShoreTel Network Services Portfolio FAQ You have questions. We have answers. What is the ShoreTel Network Services Portfolio? Leveraging the proven methodology and best practices
More informationAnalysis of Visual Properties in American Sign Language
Analysis of Visual Properties in American Sign Language Rain G. Bosworth Karen R. Dobkins Dept of Psychology University of California, San Diego La Jolla, CA Charles E. Wright Dept of Cognitive Science
More informationSeamless Audio Splicing for ISO/IEC Transport Streams
Seamless Audio Splicing for ISO/IEC 13818 Transport Streams A New Framework for Audio Elementary Stream Tailoring and Modeling Seyfullah Halit Oguz, Ph.D. and Sorin Faibish EMC Corporation Media Solutions
More informationSongbirds possess a spontaneous ability to discriminate syntactic rules
Songbirds possess a spontaneous ability to discriminate syntactic rules Kentaro Abe and Dai Watanabe Supplementary Figures 1 4 and Legends 1 Supplementary Fig. 1. (a) SMSD-test on a single bird (S24).
More informationOn Studying the Impact of the Internet Delays on Audio Transmission
On Studying the Impact of the Internet Delays on Audio Transmission Lopamudra Roychoudhuri, Ehab Al-Shaer, Hazem Hamed and Gregory B. Brewster Multimedia Networking Research Laboratory School of Computer
More informationDetermining the Optimal Search Area for a Serial Criminal
Determining the Optimal Search Area for a Serial Criminal Mike O Leary Department of Mathematics Towson University Joint Mathematics Meetings Washington DC, 2009 Mike O Leary (Towson University) Optimal
More informationDisease Management. E-Learning Module C:
E-Learning Module C: Disease Management This Module requires the learner to have read Chapter 3 of the Fundamentals Program Guide and the other required readings associated with the topic. Revised: August
More informationPower Management for Networks to Reduce Energy Consumption
Power Management for Networks to Reduce Energy Consumption David Wetherall Intel Research & University of Washington Joint work with: Sylvia Ratnasamy (Intel Research) Sergiu Nedevschi (UC Berkeley) Lucian
More informationAn Empirical Study on Dependence Clusters for Effort-Aware Fault-Proneness Prediction
An Empirical Study on Dependence Clusters for Effort-Aware Fault-Proneness Prediction Yibiao Yang Nanjing University, China Syed Islam University of East London, UK Mark Harman University College London,
More informationInference Methods for First Few Hundred Studies
Inference Methods for First Few Hundred Studies James Nicholas Walker Thesis submitted for the degree of Master of Philosophy in Applied Mathematics and Statistics at The University of Adelaide (Faculty
More informationPopulation. Sample. AP Statistics Notes for Chapter 1 Section 1.0 Making Sense of Data. Statistics: Data Analysis:
Section 1.0 Making Sense of Data Statistics: Data Analysis: Individuals objects described by a set of data Variable any characteristic of an individual Categorical Variable places an individual into one
More informationInternational Journal of Research in Science and Technology. (IJRST) 2018, Vol. No. 8, Issue No. IV, Oct-Dec e-issn: , p-issn: X
CLOUD FILE SHARING AND DATA SECURITY THREATS EXPLORING THE EMPLOYABILITY OF GRAPH-BASED UNSUPERVISED LEARNING IN DETECTING AND SAFEGUARDING CLOUD FILES Harshit Yadav Student, Bal Bharati Public School,
More informationSUPPLEMENTAL MATERIAL
1 SUPPLEMENTAL MATERIAL Response time and signal detection time distributions SM Fig. 1. Correct response time (thick solid green curve) and error response time densities (dashed red curve), averaged across
More informationMeasurement Denoising Using Kernel Adaptive Filters in the Smart Grid
Measurement Denoising Using Kernel Adaptive Filters in the Smart Grid Presenter: Zhe Chen, Ph.D. Associate Professor, Associate Director Institute of Cyber-Physical Systems Engineering Northeastern University
More informationComplete a large project that embodies the major course topics Project should be simple but expandable The project should include:
CSE 466: Course Project Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: Multiple device communication Deal with constrained
More informationExploration and Exploitation in Reinforcement Learning
Exploration and Exploitation in Reinforcement Learning Melanie Coggan Research supervised by Prof. Doina Precup CRA-W DMP Project at McGill University (2004) 1/18 Introduction A common problem in reinforcement
More informationcaspa Comparison and Analysis of Special Pupil Attainment
caspa Comparison and Analysis of Special Pupil Attainment Analysis and bench-marking in CASPA This document describes of the analysis and bench-marking features in CASPA and an explanation of the analysis
More informationAdaptive Feedback Cancellation for the RHYTHM R3920 from ON Semiconductor
Adaptive Feedback Cancellation for the RHYTHM R3920 from ON Semiconductor This information note describes the feedback cancellation feature provided in in the latest digital hearing aid amplifiers for
More informationOhio Academic Standards Addressed By Zoo Program WINGED WONDERS: SEED DROP
Ohio Academic Standards Addressed By Zoo Program WINGED WONDERS: SEED DROP Program description: Discover whether all seeds fall at the same rate. Do small or big seeds fall more slowly? Students will use
More informationParameter Identification using δ Decisions for Hybrid Systems in Biology
CMACS/AVACS Worshop Paraeter Identification using δ Decisions for Hbrid Sstes in Biolog Bing Liu Joint wor with Soonho Kong, Sean Gao, Ed Clare Biological Sste Bolins et al. SIGGRAPH, 26 2 Coputational
More informationIMAGINATION, LANGUAGE AND AUTISM: INSIGHTS FROM EYE MOVEMENTS. Heather Ferguson, University of Kent
IMAGINATION, LANGUAGE AND AUTISM: INSIGHTS FROM EYE MOVEMENTS Heather Ferguson, University of Kent Pragmatic anomalies The peanut was in love The peanut was salted The role of context A woman saw a dancing
More informationWDHS Curriculum Map Probability and Statistics. What is Statistics and how does it relate to you?
WDHS Curriculum Map Probability and Statistics Time Interval/ Unit 1: Introduction to Statistics 1.1-1.3 2 weeks S-IC-1: Understand statistics as a process for making inferences about population parameters
More informationIn Class Problem Discovery of Drug Side Effect Using Study Designer
In Class Problem Discovery of Drug Side Effect Using Study Designer November 12, 2015 Version 30 Tutorial 25: In Class problem Discovery of drug side effect Gatifloxacin. https://www.youtube.com/watch?v=2die3bc3dzg
More informationApplication of Recursive Partitioning Methodology in Route Choice
Application of Recursive Partitioning Methodology in Route Choice Deepa M. J. Anu P. Alex Manju V. S. M.Tech student Assistant Professor Associate Professor College of Engineering Trivandrum 1 Abstract
More informationProduct Discounts: Aerohive
Exhibit B Pricing s: Aerohive Switches 30 $0-$50,000 51 51 $50,001- $100,000 51 51 $100,001- $200,000 51 51 $200,001- $300,000 51 51 $300,001- $500,000 51 51 $500,001- Plus 51 51 Routers 30 $0-$50,000
More informationTime Experiencing by Robotic Agents
Time Experiencing by Robotic Agents Michail Maniadakis 1 and Marc Wittmann 2 and Panos Trahanias 1 1- Foundation for Research and Technology - Hellas, ICS, Greece 2- Institute for Frontier Areas of Psychology
More informationOBSTACLE COURSE RACE TRAINING PROGRAMME
OBSTACLE COURSE RACE TRAINING PROGRAMME DURATION 6 weeks ACTIVITY 5 sessions and 2 rest days per week for the 6 week duration. Your sessions are outlined below SESSION 1 SESSION 2 SESSION 3 SESSION 4 SESSION
More informationA Simulation of Sutton and Barto s Temporal Difference Conditioning Model
A Simulation of Sutton and Barto s Temporal Difference Conditioning Model Nick Schmansk Department of Cognitive and Neural Sstems Boston Universit Ma, Abstract A simulation of the Sutton and Barto [] model
More informationVMMC Installation Guide (Windows NT) Version 2.0
VMMC Installation Guide (Windows NT) Version 2.0 The Shrimp Project Department of Computer Science Princeton University February 1999 About this Document Welcome to VMMC! This document describes how to
More informationBiology. Chapter 11 Notes: Mendel and Heredity
Interest Grabber Section 11-1 Biolog Chapter 11 Notes: Genetics Analzing Inheritance Offspring resemble their parents. Offspring inherit genes for characteristics from their parents. To learn about inheritance,
More informationConnected Mathematics Project 3
An Alignment of Connected Mathematics Project 3 Grade 6, 2014 To 2012 , 2014 Introduction This alignment demonstrates the effectiveness of Connected Mathematics 3 Project (CMP3) when balanced with Math
More information5 REASONS TO CHOOSE THE E-LINK 1000EXR OVER COMPETING 70/80 GIGABIT WIRELESS SOLUTIONS
5 REASONS TO CHOOSE THE E-LINK 1000EXR OVER COMPETING 70/80 GIGABIT WIRELESS SOLUTIONS EXECUTIVE SUMMARY 70/80 GHz e-band products are being touted by many global mobile operators as an integral component
More informationRocky K. C. Chang, Edmond Chan, Waiting Fok, and Weichao Li. The Hong Kong Polytechnic University Hung hom, Kowloon, Hong Kong
Rocky K. C. Chang, Edmond Chan, Waiting Fok, and Weichao Li The Hong Kong Polytechnic University Hung hom, Kowloon, Hong Kong APRICOT 2010 1 Problem statement Measurement system Measurement methodology
More informationComplete a large project that embodies the major course topics Project should be simple but expandable The project should include:
CSE 466: Course Project Complete a large project that embodies the major course topics Project should be simple but expandable The project should include: Multiple device communication Deal with constrained
More informationLearning. Learning is a relatively permanent change in behavior acquired through experience or practice.
Learning Learning is a relatively permanent change in behavior acquired through experience or practice. What is Learning? Learning is the process that allows us to adapt (be flexible) to the changing conditions
More informationThought and Knowledge
Thought and Knowledge Chapter 9 p294-307 Thought and knowledge Problem solving Goal-directed cognitive activity Start at initial state and aim for goal Active effort to generate solutions Overcome obstacles
More information1- Cochlear Impedance Telemetry
INTRA-OPERATIVE COCHLEAR IMPLANT MEASURMENTS SAMIR ASAL M.D 1- Cochlear Impedance Telemetry 1 Cochlear implants used presently permit bi--directional communication between the inner and outer parts of
More informationExperimental approach
What is lumosity? Lumosity is a web-based cognitive training platform that has grown to include over 600 million cognitive training task results from over 35 million individuals, comprising the largest
More informationBimodal bilingualism: focus on hearing signers
Simultaneous production of ASL and English costs the speaker, but benefits the listener Bimodal bilingualism: focus on hearing signers Unimodal bilinguals: Two spoken languages Bimodal bilinguals: A signed
More informationCaptive Portals over PvD
Captive Portals over PvD draft-bruneau-intarea-provisioning-domains Basile Bruneau, Pierre Pfister, David Schinazi, Tommy Pauly, Eric Vyncke CAPPORT IETF 99, July 2017, Prague 1 Review of PvD Document
More informationTowards Desynchronization of Multi-hop Topologies
Towards Desynchronization of Multi-hop Topologies Julius Degesys and Radhika Nagpal School of Engineering and Applied Sciences, Harvard University E-mail: {degesys,rad}@eecs.harvard.edu Abstract In this
More informationTCP IN NETWORKS WITH ABRUPT DELAY VARIATIONS AND RANDOM LOSS
TCP N NETWORKS WTH ABRUPT DELAY VARATONS AND RANDOM LOSS Alhussein A. Abouzeid, Sumit Roy Department of Electrical Engineering University of Washington, Box 352500 Seattle, WA 98195-2500 e-mail:{hussein,roy}@ee.washington.edu
More informationHerd Behavior By CommonLit Staff 2014
Name: Class: Herd Behavior By CommonLit Staff 2014 Herd behavior is a term used to describe the phenomenon of complying with the conduct of others. The following article discusses the roots of herd behavior
More information3. Read the study by Grant. Underline psychology key words and add them to your glossary. 4. Make detailed notes on the study
Getting ready to study Psychology: 1. Read the study by Loftus and Palmer. Underline psychology key words and look up what they mean. Get yourself a small exercise book and start to make a glossary. 2.
More informationFASTER s Education Brochure and Industry Guide
FASTER s Education Brochure and Industry Guide Schedule for the 4 day course Active Fitness & FASTER Health and Fitness Education Brochure and Industry Guide by Copyright John Hardy MSc Faster Health and
More informationPoDL Tutorial. Dogs at the IEEE?
PoDL Tutorial Dogs at the IEEE? Agenda What is PoDL? Quick Overview of PoDL Operation Walk Through the Draft PoDL = PoE for Single-Pair Ethernet 100BASE-T1 + PoDL: 100M and power over a single 24ga twisted
More informationGYMTOP USB PROFESSIONAL 20143
GYMTOP USB PROFESSIONAL 20143 CONTENTS 1 x Gymtop USB 1 x CD Please note: please see PC requirements below. ABOUT THIS PRODUCT Can help develop users motor skills including planning Gymtop uses proprioceptors
More informationHow do you design an intelligent agent?
Intelligent Agents How do you design an intelligent agent? Definition: An intelligent agent perceives its environment via sensors and acts rationally upon that environment with its effectors. A discrete
More informationUnit 06 - Overview. Click on the any of the above hyperlinks to go to that section in the presentation.
Unit 06 - Overview How We Learn and Classical Conditioning Operant Conditioning Operant Conditioning s Applications, and Comparison to Classical Conditioning Biology, Cognition, and Learning Learning By
More information