Markov Process Analysis of PCM Line Monitors
نویسندگان
چکیده
منابع مشابه
analysis of ruin probability for insurance companies using markov chain
در این پایان نامه نشان داده ایم که چگونه می توان مدل ریسک بیمه ای اسپیرر اندرسون را به کمک زنجیره های مارکوف تعریف کرد. سپس به کمک روش های آنالیز ماتریسی احتمال برشکستگی ، میزان مازاد در هنگام برشکستگی و میزان کسری بودجه در زمان وقوع برشکستگی را محاسبه کرده ایم. هدف ما در این پایان نامه بسیار محاسباتی و کاربردی تر از روش های است که در گذشته برای محاسبه این احتمال ارائه شده است. در ابتدا ما نشا...
15 صفحه اولOperational Semantics of Process Monitors
CSPE is a specification language for runtime monitors that can directly express concurrency in a bottom-up manner that composes the system from simpler, interacting components. It includes constructs to explicitly flag failures to the monitor, which unlike deadlocks and livelocks in conventional process algebras, propagate globally and aborts the whole system’s execution. Although CSPE has a tr...
متن کاملMonitors, Mammals, and Wallace’s Line
Although varanid lizards have achieved parity with mammals in many parts of the world, they exploit very different metabolic strategies and sensory mechanisms, and are properly regarded as convergent on the lifestyle of small predatory mammals. In parts of island southeast Asia and in Australia small monitors appear to fill ecological niches occupied by cats, mustelids and viverrids in other pa...
متن کاملEvaluation of five in-line hematocrit monitors.
Monitoring the hematocrit is essential during cardiopulmonary bypass for efficacious administration of blood products. The purpose of this study was to evaluate five cardiopulmonary bypass in-line monitors designed to display continuous hematocrit or hemoglobin values. The devices were evaluated for accuracy using an in vitro circuit primed with human blood while randomizing hematocrit, blood f...
متن کاملGenerating In-Line Monitors for Rabin Automata
A promising solution to the problem of securing potentially malicious mobile code lies in the use of program monitors. Such monitors can be in-lined into an untrusted program to produce an instrumented code that provably satisfies the security policy. It is well known that enforcement mechanisms based on Schneider’s security automata only enforce safety properties [1]. Yet subsequent studies sh...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Communications
سال: 1974
ISSN: 0096-2244
DOI: 10.1109/tcom.1974.1092172