A Multi-Attribute Resource and Query

Total Page:16

File Type:pdf, Size:1020Kb

A Multi-Attribute Resource and Query DISSERTATION ENHANCING COLLABORATIVE PEER-TO-PEER SYSTEMS USING RESOURCE AGGREGATION AND CACHING: A MULTI-ATTRIBUTE RESOURCE AND QUERY AWARE APPROACH Submitted by H. M. N. Dilum Bandara Department of Electrical and Computer Engineering In partial fulfillment of the requirements For the Degree of Doctor of Philosophy Colorado State University Fort Collins, Colorado Fall 2012 Doctoral Committee: Advisor: Anura P. Jayasumana V. Chandrasekar Daniel F. Massey Indrajit Ray Copyright by H. M. N. Dilum Bandara 2012 All Rights Reserved ABSTRACT ENHANCING COLLABORATIVE PEER-TO-PEER SYSTEMS USING RESOURCE AGGREGATION AND CACHING: A MULTI-ATTRIBUTE RESOURCE AND QUERY AWARE APPROACH Resource-rich computing devices, decreasing communication costs, and Web 2.0 technologies are fundamentally changing the way distributed applications communicate and collaborate. With these changes, we envision Peer-to-Peer (P2P) systems that will allow for the integration and collaboration of peers with diverse capabilities to a virtual community thereby empowering it to engage in greater tasks beyond what can be accomplished by individual peers, yet are beneficial to all the peers. Collaborations involving application-specific resources and dynamic quality of service goals will stress current P2P ar- chitectures that are designed for best-effort environments with pair-wise interactions among nodes with similar resources. These systems will share a variety of resources such as processor cycles, storage capac- ity, network bandwidth, sensors/actuators, services, middleware, scientific algorithms, and data. However, very little is known about the specific characteristics of real-world resources and queries as well as their impact on resource aggregation in these collaborative P2P systems. We developed resource discovery, caching, and distributed data fusion solutions that are more suitable for collaborative P2P systems while characterizing real-world resource, query, and user behavior. The contributions of this research are: (1) a detailed analysis of real-world resource, query, and user characteristics and their impact on resource dis- covery solutions, (2) a tool to generate large synthetic traces of multi-attribute resources and range que- ries, (3) resource and query aware P2P-based multi-attribute resource discovery solution that is both effi- cient and load balanced, (4) a community-based caching solution that enhances both the communitywide and system-wide lookup performance in large-scale P2P systems, and (5) demonstrated the applicability of NDN (Named Data Networking) for DCAS (Distributed Collaborative Adaptive Sensing) systems by developing a distributed multi-user, multi-application, and multi-sensor data fusion solution based on ii CASA (Collaborative Adaptive Sensing of the Atmosphere). Proposed solutions and the analysis are ap- plicable to a wide variety of contexts such as DCAS systems, P2P clouds, grid/cloud computing, GENI (Global Environment for Network Innovations), and mobile social networks. Next, each of the five con- tributions is described briefly. First, we derived an equation to capture the cost of multi-attribute resource advertising and query- ing. The nature of parameters in the equation under different systems is determined by analyzing datasets from PlanetLab, SETI@home, EGI grid, and a distributed campus computing facility. These datasets ex- hibit several noteworthy features that affect the performance. The attributes of both the resources and que- ries are highly skewed and correlated. Attribute values have different marginal distributions and change at different rates. Queries are less specific where each query tends to specify only a small subset of the available attributes and large ranges of attribute values. These properties of resources and queries are then used to qualitatively and quantitatively evaluate the fundamental design choices for P2P-based multi- attribute resource discovery. Design choices are evaluated based on the cost of advertising/querying, load balancing, and routing table size. Compared to uniform queries, real-world queries are relatively easier to resolve using unstructured, superpeer, and single-attribute-dominated-query-based structured P2P solu- tions. However, they introduce significant load balancing issues to existing designs. Cost of RD in struc- tured P2P systems is effectively O(N) (N is the number of nodes) as most range queries are less specific. Second, a set of mechanisms is presented to generate realistic synthetic traces of multi-attribute resources (with both static and dynamic attributes) and range queries using the statistical behavior learned from real-world datasets. Such traces are useful in large-scale performance studies of resource discovery solutions, job schedulers, etc., in collaborative P2P systems as well as grid, cloud, and volunteer compu- ting. Random vectors of static attributes are generated using empirical copulas that capture the entire de- pendence structure of multivariate distribution of attributes. Time series of dynamic attributes are ran- domly drawn from a library of multivariate time-series segments extracted from the datasets. These segments are identified by detecting the structural changes in time series corresponding to a selected at- tribute. Time series corresponding to rest of the attributes are split at the same breakpoints and randomly iii drawn together to preserve their contemporaneous correlation. Correlation among static and dynamic at- tributes is preserved by grouping the time-series segments based on their static attributes. Multi-attribute range queries are generated using a probabilistic finite state machine that preserves the popularity of at- tributes and correlations among attribute values. A tool is developed to automate the synthetic data gener- ation process. It is independent of the dataset hence data from any other platform may be used as the basis for trace statistics. Third, a resource and query aware P2P-based multi-attribute resource discovery solution is pre- sented that is both efficient and load balanced. The solution consists of five heuristics that can be execut- ed independently and distributedly. The first heuristic tries to maintain a minimum number of nodes in the overlay while pruning nodes that do not significantly contribute to the range-query resolution. Removing nonproductive nodes reduces the cost (e.g., hops and latency) of advertising resources and resolving que- ries. The second and third heuristics dynamically balance the key and query load distributions by transfer- ring keys to neighbors as well as by adding new neighbors when existing ones are insufficient. The last two heuristics, namely fragmentation and replication, form cliques of nodes that are placed orthogonal to the overlay ring. Such a node placement dynamically balances the highly skewed key and query loads while reducing the query cost. By applying these heuristics in the presented order, a resource discovery solution that better responds to real-world resource and query characteristics is developed. Efficacy of the solution is demonstrated using a simulation-based analysis under a variety of single and multi-attribute resource and query distributions derived from real workloads. Fourth, we developed a distributed caching solution that exploits P2P communities to improve the communitywide and system-wide lookup performance. The solution consists of a sub-overlay formation scheme and a Local-Knowledge-based Distributed Caching (LKDC) algorithm. Sub-overlays enable communities to forward queries through their members. While queries are forwarded, LKDC algorithm causes members to identify and cache resources of interests to them, resulting in faster resolution of que- ries for popular resources within each community. Distributed local caching requires global information (e.g., hop count and popularity of contents) that is difficult and costly to obtain. Moreover, the problem is iv NP-complete when the size of contents/resources varies. However, by relaxing the content size constraint (which is acceptable for the purpose of improving lookup performance), and by means of an analysis of globally optimal behavior and structural properties of the overlay, we developed the LKDC algorithm that not only relies on purely local information but also provides close-to-optimal caching performance. The caching solution automatically adapts to changing popularity and user interests. It works with any skewed distribution of queries in addition to introducing minimal modifications and overhead to the overlay net- work. For example, simulations based on Chord overlay show a 40% reduction in average path length using only 20 cache entries per node, and individual communities gained a 17-24% improvement com- pared to system-wide caching. Fifth, we present a proof of concept solution that demonstrates the applicability of NDN for mul- ti-user, multi-application, and multi-sensor DCAS systems such as CASA. In this example, a network of weather radars name data based on their geographic location and weather feature (e.g., reflectivity of clouds or wind velocity) independent of the radar(s) that generated them. This enables end users to speci- fy an area of interest for a particular weather feature while being oblivious to the placement of radars and associated computing facilities. Conversely, the DCAS system can use its knowledge about the underly- ing system to decide the best radar scanning and data processing strategies. Such sensor-independent names also
Recommended publications
  • Most Contagious 2011
    MOST CONTAGIOUS 2011 Cover image: Take This LoLLipop / Jason Zada most contagious / p.02 / mosT ConTAGIOUS 2011 / subsCripTion oFFer / 20% disCounT FuTure-prooFing your brain VALid unTiL 9Th JANUARY 2012 offering a saving of £200 gBP chapters / Contagious exists to find and filter the most innovative 01 / exercises in branding, technology, and popular culture, and movemenTs deliver this collective wisdom to our beloved subscribers. 02 / Once a year, we round up the highlights, identify what’s important proJeCTs and why, and push it out to the world, for free. 03 / serviCe Welcome to Most Contagious 2011, the only retrospective you’ll ever need. 04 / soCiaL It’s been an extraordinary year; economies in turmoil, empires 05 / torn down, dizzying technological progress, the evolution of idenTiTy brands into venture capitalists, the evolution of a generation of young people into entrepreneurs… 06 / TeChnoLogy It’s also been a bumper year for the Contagious crew. Our 07 / Insider consultancy division is now bringing insight and inspiration daTa to clients from Kraft to Nike, and Google to BBC Worldwide. We 08 / were thrilled with the success of our first Now / Next / Why event augmenTed in London in December, and are bringing the show to New York 09 / on February 22nd. Grab your ticket here. money We’ve added more people to our offices in London and New 10 / York, launched an office in India, and in 2012 have our sights haCk Culture firmly set on Brazil. Latin America, we’re on our way. Get ready! 11 / musiC 2.0 We would also like to take this opportunity to thank our friends, supporters and especially our valued subscribers, all over the 12 / world.
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • How Can I Download a Torrent
    how can i download a torrent How To Download Torrent Files From Torrent Sites? Lately, if you have been hanging out with tech-savvy people, then you are bound to hear terms like BitTorrent , Torrenting Websites , and Torrent Clients . The primary reason behind the drastic increment in the popularity of Torrent files is that these files can be used to download Movies , Music , Books , Games , and Software for free. As you might have guessed by the title, this article is dedicated to new torrent users, and it will guide them to download their first torrent file. On the other hand, If you are a veteran reader of Techworm, then this guide won’t reveal any new information for you. However, you can contribute to the community by leaving a comment. What Is A Torrents? In simple terminology, Torrent is a file that stores metadata, and programs like uTorrent can use this meta info to download all sorts of content. A torrent file generally comes with the extension .torrent , and it’s hardly a few KB in size. In many instances, Torrent and BitTorrent are used synonymously. However, they are not the same. In reality, BitTorrent is a peer to peer (P2P) file-sharing protocol that relies on a swarm-like approach for sharing files. A seeder in torrent terminology is a person who is sharing the file; the more seeds, the more potential locations to download the file. While a person who is downloading the seeded file is a leech , if the number of leeches exceeds the number of seeds, it will make the file download slower, as more people are accessing the data at the same time.
    [Show full text]
  • New York University Annual Survey of American Law New York of American Law University Annual Survey
    nys69-2_cv_nys69-2_cv 9/22/2014 8:41 AM Page 2 (trap 04 plate) Vol. 69 No. 2 Vol. New York University Annual Survey of American Law New York University Annual Survey of American Law New York ARTICLES TOWARD ADEQUACY Sarah L. Brinton SHOULD EVIDENCE OF SETTLEMENT NEGOTIATIONS AFFECT ATTORNEYS’ FEES AWARDS? Seth Katsuya Endo A LOOK INSIDE THE BUTLER’S CUPBOARD: HOW THE EXTERNAL WORLD REVEALS INTERNAL STATE OF MIND IN LEGAL NARRATIVES Cathren Koehlert-Page NOTES EXPERTISE AND IMMIGRATION ADMINISTRATION: WHEN DOES CHEVRON APPLY TO BIA INTERPRETATIONS OF THE INA? Paul Chaffin WHAT MOTIVATES ILLEGAL FILE SHARING? EMPIRICAL AND THEORETICAL APPROACHES Joseph M. Eno 2013 Volume 69 Issue 2 2013 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 1 23-OCT-14 9:10 NEW YORK UNIVERSITY ANNUAL SURVEY OF AMERICAN LAW VOLUME 69 ISSUE 2 35568-nys_69-2 Sheet No. 1 Side A 10/28/2014 12:36:12 NEW YORK UNIVERSITY SCHOOL OF LAW ARTHUR T. VANDERBILT HALL Washington Square New York City 35568-nys_69-2 Sheet No. 1 Side B 10/28/2014 12:36:12 \\jciprod01\productn\n\nys\69-2\FRONT692.txt unknown Seq: 2 23-OCT-14 9:10 New York University Annual Survey of American Law is in its seventy-first year of publication. L.C. Cat. Card No.: 46-30523 ISSN 0066-4413 All Rights Reserved New York University Annual Survey of American Law is published quarterly at 110 West 3rd Street, New York, New York 10012.
    [Show full text]
  • Digital Fountain Erasure-Recovery in Bittorrent
    UNIVERSITÀ DEGLI STUDI DI BERGAMO Facoltà di Ingegneria Corso di Laurea Specialistica in Ingegneria Informatica Classe n. 35/S – Sistemi Informatici Digital Fountain Erasure Recovery in BitTorrent: integration and security issues Relatore: Chiar.mo Prof. Stefano Paraboschi Correlatore: Chiar.mo Prof. Andrea Lorenzo Vitali Tesi di Laurea Specialistica Michele BOLOGNA Matricola n. 56108 ANNO ACCADEMICO 2007 / 2008 This thesis has been written, typeset and prepared using LATEX 2". Printed on December 5, 2008. Alla mia famiglia “Would you tell me, please, which way I ought to go from here?” “That depends a good deal on where you want to get to,” said the Cat. “I don’t much care where —” said Alice. “Then it doesn’t matter which way you go,” said the Cat. “— so long as I get somewhere,” Alice added as an explanation. “Oh, you’re sure to do that,” said the Cat, “if you only walk enough.” Lewis Carroll Alice in Wonderland Acknowledgments (in Italian) Ci sono molte persone che mi hanno aiutato durante lo svolgimento di questo lavoro. Il primo ringraziamento va ai proff. Stefano Paraboschi e Andrea Vitali per la disponibilità, la competenza, i consigli, la pazienza e l’aiuto tecnico che mi hanno saputo dare. Grazie di avermi dato la maggior parte delle idee che sono poi confluite nella mia tesi. Un sentito ringraziamento anche a Andrea Rota e Ruben Villa per l’aiuto e i chiarimenti che mi hanno gentilmente fornito. Vorrei ringraziare STMicroelectronics, ed in particolare il gruppo Advanced System Technology, per avermi offerto le infrastrutture, gli spa- zi e tutto il necessario per svolgere al meglio il mio periodo di tirocinio.
    [Show full text]
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • Forescout Counteract® Endpoint Support Compatibility Matrix Updated: October 2018
    ForeScout CounterACT® Endpoint Support Compatibility Matrix Updated: October 2018 ForeScout CounterACT Endpoint Support Compatibility Matrix 2 Table of Contents About Endpoint Support Compatibility ......................................................... 3 Operating Systems ....................................................................................... 3 Microsoft Windows (32 & 64 BIT Versions) ...................................................... 3 MAC OS X / MACOS ...................................................................................... 5 Linux .......................................................................................................... 6 Web Browsers .............................................................................................. 8 Microsoft Windows Applications ...................................................................... 9 Antivirus ................................................................................................. 9 Peer-to-Peer .......................................................................................... 25 Instant Messaging .................................................................................. 31 Anti-Spyware ......................................................................................... 34 Personal Firewall .................................................................................... 36 Hard Drive Encryption ............................................................................. 38 Cloud Sync ...........................................................................................
    [Show full text]
  • The Hidden Locality in Swarms
    13-th IEEE International Conference on Peer-to-Peer Computing The hidden locality in swarms John S. Otto and Fabian´ E. Bustamante Northwestern University {jotto,fabianb}@eecs.northwestern.edu Abstract—People use P2P systems such as BitTorrent to share We overcome the challenges of local peer discovery by an unprecedented variety and amount of content with others leveraging diurnal patterns and applying client-side techniques around the world. The random connection pattern used by to improve overall peer discovery. BitTorrent has been shown to result in reduced performance for users and costly cross-ISP traffic. Although several client-side Through an analysis of swarm population dynamics, we systems have been proposed to improve the locality of BitTorrent show that locality is present in swarms – if one looks at the traffic, their effectiveness is limited by the availability of local right time. For popular content swarms, 50% of ISPs seen in peers. the swarm have at least five local peers online during the ISP’s We show that sufficient locality is present in swarms – if peak hour. During an ISP’s peak hour, the relative fraction of one looks at the right time. We find that 50% of ISPs have at least five local peers online during the ISP’s peak hour, local peers – and therefore the local peer discovery rate – is typically in the evening, compared to only 20% of ISPs during typically 50% higher than the daily average. the median hour. To better discover these local peers, we show We evaluate client-side techniques that boost the peer how to increase the overall peer discovery rate by over two orders discovery rate by two orders of magnitude, enabling peers of magnitude using client-side techniques: leveraging additional to quickly discover online local peers.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • How to Download Torrent Anonymously How to Download Torrent Anonymously
    how to download torrent anonymously How to download torrent anonymously. Completing the CAPTCHA proves you are a human and gives you temporary access to the web property. What can I do to prevent this in the future? If you are on a personal connection, like at home, you can run an anti-virus scan on your device to make sure it is not infected with malware. If you are at an office or shared network, you can ask the network administrator to run a scan across the network looking for misconfigured or infected devices. Another way to prevent getting this page in the future is to use Privacy Pass. You may need to download version 2.0 now from the Chrome Web Store. Cloudflare Ray ID: 66b6c3aaaba884c8 • Your IP : 188.246.226.140 • Performance & security by Cloudflare. Download Torrents Anonymously: 6 Safe And Easy Ways. Who doesn’t want to know how to download torrents anonymously? The thing is, in order to download torrents anonymously you don’t need to have a lot of technical know-how. All you need to download torrents anonymously is some grit and a computer with an internet connection. The technology world never remains the same. In fact, new development and discoveries come to the surface of this industry every day. They also come into the attention of online users every year. Moreover, this allows us to do much more than we could do in the past, in faster and easier ways. A highly relevant aspect to mention at this stage is that: Now we can also download torrents anonymously from best torrent sites.
    [Show full text]
  • The Effect of Film Sharing on P2P Networks on Box Office Sales
    The effect of film sharing on P2P networks on box office sales Kęstutis Černiauskas Faculty of Computing Blekinge Institute of Technology SE-371 79 Karlskrona Sweden i This thesis is submitted to the Faculty of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master in Informatics (120 credits). Contact Information: Author(s): Kęstutis Černiauskas E-mail: [email protected] University advisor: Sara Eriksén Department Faculty of Computing Internet : www.bth.se Blekinge Institute of Technology Phone : +46 455 38 50 00 SE-371 79 Karlskrona, Sweden Fax : +46 455 38 50 57 ii ABSTRACT Context. Online piracy is widespread, controversial and poorly understood social phenomena that affects content creators, owners, and consumers. Online piracy, born from recent, rapid ITC changes, raises legal, ethical, and business challenges. Content owners, authors and content consumers should benefit from better understanding of online piracy. Improved, better adapted to marketplace and ITC changes content distribution models should benefit content owners and audiences. Objectives. Investigate online piracy effect on pirated product sales. Improve understanding of online piracy behaviors and process scale. Methods. This observational study investigated movie-sharing effect on U.S. box office. Movie sharing was observed over BitTorrent network, the most popular peer-to-peer file-sharing network. Relationship between piracy and sales was analyzed using linear regression model. Results. File sharing was found to have a slightly positive correlation with U.S. box office sales during first few weeks after film release, and no effect afterwards. Most of newly released movies are shared over BitTorrent network.
    [Show full text]
  • Good Money Still Going Bad: Digital Thieves and the Hijacking of the Online Ad Business
    GOOD MONEY STILL GOING BAD: DIGITAL THIEVES AND THE HIJACKING OF THE ONLINE AD BUSINESS A FOLLOW-UP TO THE 2014 REPORT ON THE PROFITABILITY OF AD-SUPPORTED CONTENT THEFT MAY 2015 @4saferinternet A safer internet is a better internet CONTENTS CONTENTS ......................................................................................................................................................................................................................ii TABLE OF REFERENCES ..................................................................................................................................................................................iii Figures.........................................................................................................................................................................................................................iii Tables ...........................................................................................................................................................................................................................iii ABOUT THIS REPORT ..........................................................................................................................................................................................1 EXECUTIVE SUMMARY ..................................................................................................................................................................................... 2 GOOD MONEY STILL GOING BAD
    [Show full text]