ANOTHER LOOK AT NONPARAMETRIC ESTIMATION FOR TREND RENEWAL PROCESSES
نویسندگان
چکیده
منابع مشابه
Estimation of parameters for trend-renewal processes
Methods of estimating unknown parameters of a trend function for trend-renewal processes are investigated in the case when the renewal distribution function is unknown. If the renewal distribution is unknown, then the likelihood function of the trend-renewal process is unknown and consequently the maximum likelihood method cannot be used. In such a situation we propose three other methods of es...
متن کاملNonparametric estimation and consistency for renewal processes
In reliability or medical studies, we may only observe each ongoing renewal process for a certain period of time. When the underlying distribution F is arithmetic, Vardi (Ann. Statist. 10 (1982b), 772-785) developed the RT algorithm for nonparametric estimation. In this paper we extend the study to the nonarithmetic case and show that the choice of an arbitrary constant in the RT algorithm can ...
متن کاملAnother Look at the Hypocrisy of Chaucer’s Pardoner
For us, readers of Chaucer living in an age when appeal to religious passions and sentiments as a means for the realization of worldly objectives by some charlatans has grown significantly, reviewing the theme of religious hypocrisy treated in The Canterbury Tales can be useful in a way that it proves a helpful means for recognizing and dealing with the hypocrites. The Pardoner of the Tales is ...
متن کاملAnother look at HMQV
The HMQV protocols are ‘hashed variants’ of the MQV key agreement protocols. They were introduced at CRYPTO 2005 by Krawczyk, who claimed that the HMQV protocols have very significant advantages over their MQV counterparts: (i) security proofs under reasonable assumptions in the (extended) Canetti-Krawczyk model for key exchange; and (ii) superior performance in some situations. In this paper w...
متن کاملAnother Look at Tightness
We examine a natural, but non-tight, reductionist security proof for deterministic message authentication code (MAC) schemes in the multi-user setting. If security parameters for the MAC scheme are selected without accounting for the non-tightness in the reduction, then the MAC scheme is shown to provide a level of security that is less than desirable in the multi-user setting. We find similar ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of the Operations Research Society of Japan
سال: 2016
ISSN: 0453-4514,2188-8299
DOI: 10.15807/jorsj.59.312