3,960 research outputs found

    The Influence of Dependence on Data Network Models of Burstiness

    Get PDF
    The Influence of Dependence on Data Network Models of Burstines

    Data Network Models of Burstiness

    Get PDF
    Data Network Models of Burstines

    Bayesian Networks for Max-linear Models

    Full text link
    We study Bayesian networks based on max-linear structural equations as introduced in Gissibl and Kl\"uppelberg [16] and provide a summary of their independence properties. In particular we emphasize that distributions for such networks are generally not faithful to the independence model determined by their associated directed acyclic graph. In addition, we consider some of the basic issues of estimation and discuss generalized maximum likelihood estimation of the coefficients, using the concept of a generalized likelihood ratio for non-dominated families as introduced by Kiefer and Wolfowitz [21]. Finally we argue that the structure of a minimal network asymptotically can be identified completely from observational data.Comment: 18 page

    Detecting a conditional extrme value model

    Full text link
    In classical extreme value theory probabilities of extreme events are estimated assuming all the components of a random vector to be in a domain of attraction of an extreme value distribution. In contrast, the conditional extreme value model assumes a domain of attraction condition on a sub-collection of the components of a multivariate random vector. This model has been studied in \cite{heffernan:tawn:2004,heffernan:resnick:2007,das:resnick:2008a}. In this paper we propose three statistics which act as tools to detect this model in a bivariate set-up. In addition, the proposed statistics also help to distinguish between two forms of the limit measure that is obtained in the model.Comment: 21 pages, 4 figure

    Method for fabricating a low stress x-ray mask using annealable amorphous refractory compounds

    Get PDF
    X‐ray masks have been fabricated by depositing a compressively stressed refractory material on a wafer, annealing to a zero stress state, and then forming the membrane. Amorphous TaSiN and TaSi alloys deposited with a magnetron sputter tool have been extensively characterized in terms of resistivity, composition, defectivity, surface roughness, and crystalline state. Optimization in terms of these parameters has resulted in base line selection of absorber films of the following compositions: Ta_(61)Si_(17)N_(21) and Ta_(75)Si_(23). The process is shown to be extendable to an entire class of amorphous annealable refractory materials. Careful studies of deposition and annealing conditions have resulted in a 4× reduction of image placement to the 30 nm maximum vector level. Finally, the importance of stress gradients is experimentally verified

    Estimation of conditional laws given an extreme component

    Full text link
    Let (X,Y)(X,Y) be a bivariate random vector. The estimation of a probability of the form P(YyX>t)P(Y\leq y \mid X >t) is challenging when tt is large, and a fruitful approach consists in studying, if it exists, the limiting conditional distribution of the random vector (X,Y)(X,Y), suitably normalized, given that XX is large. There already exists a wide literature on bivariate models for which this limiting distribution exists. In this paper, a statistical analysis of this problem is done. Estimators of the limiting distribution (which is assumed to exist) and the normalizing functions are provided, as well as an estimator of the conditional quantile function when the conditioning event is extreme. Consistency of the estimators is proved and a functional central limit theorem for the estimator of the limiting distribution is obtained. The small sample behavior of the estimator of the conditional quantile function is illustrated through simulations.Comment: 32 pages, 5 figur

    Trust and reputation policy-based mechanisms for self-protection in autonomic communications

    Get PDF
    Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called “cheating services” act as “attacks”, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily

    Nature of Phase Transitions of Superconducting Wire Networks in a Magnetic Field

    Full text link
    We study II-VV characteristics of periodic square Nb wire networks as a function of temperature in a transverse magnetic field, with a focus on three fillings 2/5, 1/2, and 0.618 that represent very different levels of incommensurability. For all three fillings, a scaling behavior of II-VV characteristics is found, suggesting a finite temperature continuous superconducting phase transition. The low-temperature II-VV characteristics are found to have an exponential form, indicative of the domain-wall excitations.Comment: 5 pages, also available at http://www.neci.nj.nec.com/homepages/tang.htm
    corecore