4,235 research outputs found

    Regularity of multifractal spectra of conformal iterated function systems

    Full text link
    We investigate multifractal regularity for infinite conformal iterated function systems (cIFS). That is we determine to what extent the multifractal spectrum depends continuously on the cIFS and its thermodynamic potential. For this we introduce the notion of regular convergence for families of cIFS not necessarily sharing the same index set, which guarantees the convergence of the multifractal spectra on the interior of their domain. In particular, we obtain an Exhausting Principle for infinite cIFS allowing us to carry over results for finite to infinite systems, and in this way to establish a multifractal analysis without the usual regularity conditions. Finally, we discuss the connections to the λ\lambda-topology introduced by Roy and Urbas{\'n}ki.Comment: 16 pages; 3 figure

    A Business Goal Driven Approach for Understanding and Specifying Information Security Requirements

    Get PDF
    In this paper we present an approach for specifying and prioritizing\ud information security requirements in organizations. It is important\ud to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to\ud satisfy the most important ones. We propose to link explicitly security\ud requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a\ud basis for comparing the importance of different security requirements.\ud A conceptual framework is presented, where the relationships between\ud business vision, critical impact factors and valuable assets (together with\ud their security requirements) are shown

    Understanding and Specifying Information Security Needs to Support the Delivery of High Quality Security Services

    Get PDF
    In this paper we present an approach for specifying and prioritizing information security requirements in organizations. It is important to prioritize security requirements since hundred per cent security is\ud not achievable and the limited resources available should be directed to satisfy the most important ones. We propose to explicitly link security requirements with the organization’s business vision, i.e. to provide business\ud rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements.\ud Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance. We validate our approach by way of a focus group session

    How to Bootstrap Aalen-Johansen Processes for Competing Risks? Handicaps, Solutions and Limitations

    Full text link
    Statistical inference in competing risks models is often based on the famous Aalen-Johansen estimator. Since the corresponding limit process lacks independent increments, it is typically applied together with Lin's (1997) resampling technique involving standard normal multipliers. Recently, it has been seen that this approach can be interpreted as a wild bootstrap technique and that other multipliers, as e.g. centered Poissons, may lead to better finite sample performances, see Beyersmann et al. (2013). Since the latter is closely related to Efron's classical bootstrap, the question arises whether this or more general weighted bootstrap versions of Aalen-Johansen processes lead to valid results. Here we analyze their asymptotic behaviour and it turns out that such weighted bootstrap versions in general possess the wrong covariance structure in the limit. However, we explain that the weighted bootstrap can nevertheless be applied for specific null hypotheses of interest and also discuss its limitations for statistical inference. To this end, we introduce different consistent weighted bootstrap tests for the null hypothesis of stochastically ordered cumulative incidence functions and compare their finite sample performance in a simulation study.Comment: Keywords: Aalen-Johansen Estimator; Bootstrap; Competing risk; Counting processes; Cumulative incidence function; Left-truncation; Right-censoring; Weighted Bootstra
    • …
    corecore