299 research outputs found

    Factorization identities for reflected processes, with applications

    Get PDF
    We derive factorization identities for a class of preemptive-resume queueing systems, with batch arrivals and catastrophes that, whenever they occur, eliminate multiple customers present in the system. These processes are quite general, as they can be used to approximate Levy processes, diffusion processes, and certain types of growth-collapse processes; thus, all of the processes mentioned above also satisfy similar factorization identities. In the Levy case, our identities simplify to both the well-known Wiener-Hopf factorization, and another interesting factorization of reflected Levy processes starting at an arbitrary initial state. We also show how the ideas can be used to derive transforms for some well-known state-dependent/inhomogeneous birth-death processes and diffusion processes

    A Tandem Fluid Network with L\'evy Input in Heavy Traffic

    Get PDF
    In this paper we study the stationary workload distribution of a fluid tandem queue in heavy traffic. We consider different types of L\'evy input, covering compound Poisson, α\alpha-stable L\'evy motion (with 1<α<21<\alpha<2), and Brownian motion. In our analysis we separately deal with L\'evy input processes with increments that have finite and infinite variance. A distinguishing feature of this paper is that we do not only consider the usual heavy-traffic regime, in which the load at one of the nodes goes to unity, but also a regime in which we simultaneously let the load of both servers tend to one, which, as it turns out, leads to entirely different heavy-traffic asymptotics. Numerical experiments indicate that under specific conditions the resulting simultaneous heavy-traffic approximation significantly outperforms the usual heavy-traffic approximation

    Queues with random back-offs

    Get PDF
    We consider a broad class of queueing models with random state-dependent vacation periods, which arise in the analysis of queue-based back-off algorithms in wireless random-access networks. In contrast to conventional models, the vacation periods may be initiated after each service completion, and can be randomly terminated with certain probabilities that depend on the queue length. We examine the scaled queue length and delay in a heavy-traffic regime, and demonstrate a sharp trichotomy, depending on how the activation rate and vacation probability behave as function of the queue length. In particular, the effect of the vacation periods may either (i) completely vanish in heavy-traffic conditions, (ii) contribute an additional term to the queue lengths and delays of similar magnitude, or even (iii) give rise to an order-of-magnitude increase. The heavy-traffic asymptotics are obtained by combining stochastic lower and upper bounds with exact results for some specific cases. The heavy-traffic trichotomy provides valuable insight in the impact of the back-off algorithms on the delay performance in wireless random-access networks

    On simple ruin expressions in dependent Sparre Andersen risk models

    Get PDF
    In this note we provide a simple alternative probabilistic derivation of an explicit formula of Kwan and Yang (2007) for the probability of ruin in a risk model with a certain dependence between general claim interoccurrence times and subsequent claim sizes of conditionally exponential type. The approach puts the type of formula in a general context, illustrating the potential for similar simple ruin probability expressions in more general risk models with dependence

    Ruin excursions, the G/G/Infinity queue and tax payments in renewal risk models

    Get PDF
    In this paper we investigate the number and maximum severity of the ruin excursion of the insurance portfolio reserve process in the Cramer-Lundberg model with and without tax payments. We also provide a relation of the Cramer-Lundberg risk model with the G/G/infinity queue and use it to derive some explicit ruin probability formulae. Finally, the renewal risk model with tax is considered, and an asymptotic identity is derived that in some sense extends the tax identity of the Cramer-Lundberg risk model

    Large closed queueing networks in semi-Markov environment and its application

    Full text link
    The paper studies closed queueing networks containing a server station and kk client stations. The server station is an infinite server queueing system, and client stations are single-server queueing systems with autonomous service, i.e. every client station serves customers (units) only at random instants generated by a strictly stationary and ergodic sequence of random variables. The total number of units in the network is NN. The expected times between departures in client stations are (Nμj)1(N\mu_j)^{-1}. After a service completion in the server station, a unit is transmitted to the jjth client station with probability pjp_{j} (j=1,2,...,k)(j=1,2,...,k), and being processed in the jjth client station, the unit returns to the server station. The network is assumed to be in a semi-Markov environment. A semi-Markov environment is defined by a finite or countable infinite Markov chain and by sequences of independent and identically distributed random variables. Then the routing probabilities pjp_{j} (j=1,2,...,k)(j=1,2,...,k) and transmission rates (which are expressed via parameters of the network) depend on a Markov state of the environment. The paper studies the queue-length processes in client stations of this network and is aimed to the analysis of performance measures associated with this network. The questions risen in this paper have immediate relation to quality control of complex telecommunication networks, and the obtained results are expected to lead to the solutions to many practical problems of this area of research.Comment: 35 pages, 1 figure, 12pt, accepted: Acta Appl. Mat

    On simple ruin expressions in dependent Sparre Andersen risk models

    Get PDF
    In this note we provide a simple alternative derivation of an explicit formula of Kwan and Yang [14] for the probability of ruin in a risk model with a certain dependence between general claim inter-occurrence times and subsequent claim sizes of conditionally exponential type. The approach puts the type of formula in a general context, illustrating the potential for similar simple ruin probability expressions in more general risk models with dependence

    An approach to the use of indices-based analysis subject to money laundering and terrorist financing national risk assessment

    Get PDF
    The core aim of this study is to propose an approach to quantitate estimation of indices-based information subject to necessities of the National Risk Assessment (NRA) of money laundering and terrorist financing (ML/TF) risks. Mathematical formalization analysis for Ukraine based on 11 indices and indicators for years 2011-2015 subject to core areas of the overall situation in a country considered within its National Risk Assessment was carried out. Authors’ contribution covers scientific novelty that is a first-time analysis of a general situation in a jurisdiction in light of the National Risk Assessment’s requirements based on joint consideration of various indices and setting priority to areas of the overall country’s situation in the framework of conducted calculations. It was concluded that proposed approach is a valuable instrument for assessing priority of areas of the overall situation in the country for the National Risk Assessment’s purposes through a formalized mechanism ensuring high objectiveness. Practical significance of this study is a possibility to reach higher efficiency in allocation of available resources for the participants of the National Risk Assessment, to reduce some costs considering flexibility of the approach allowing consideration of significant volumes of information, its updating and comparison. This research could become a starting point for further research. Considering complexity of existing indices, there is a necessity to study a mechanism of their correlation and mutual influence, analyze elasticity and joint behavior, and discover the areas of preferable influence on large range of purposes not only limited to the MRA of ML/TF risks
    corecore