首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
数学   6篇
无线电   1篇
  2018年   1篇
  2008年   1篇
  2005年   1篇
  2002年   1篇
  1993年   1篇
  1988年   1篇
  1981年   1篇
排序方式: 共有7条查询结果,搜索用时 6 毫秒
1
1.
本文证明了在单峰偏好域上Maskin单调性与防策略条件是等价的,并进一步证明了Maskin单调性与联盟防策略是等价的.从而推广了Muller-Satterthwaite(1977)在无限制强序域上得到的结论.在此基础上,利用Mollin(1980)在单峰偏好域上提出的防策略社会选择函数特征化定理,证明了在单峰偏好域上能够突破Muller-Satterthwaite不可能性定理所预示的消极结论.  相似文献   
2.
In circuit-switched networks call streams are characterized by their mean and peakedness (two-moment method). The GI/M/C/0 system is used to model a single link, where the GI-stream is determined by fitting moments appropriately. For the moments of the overflow traffic of a GI/M/C/0 system there are efficient numerical algorithms available. However, for the moments of the freed carried traffic, defined as the moments of a virtual link of infinite capacity to which the process of calls accepted by the link (carried arrival process) is virtually directed and where the virtual calls get fresh exponential i.i.d. holding times, only complex numerical algorithms are available. This is the reason why the concept of the freed carried traffic is not used. The main result of this paper is a numerically stable and efficient algorithm for computing the moments of freed carried traffic, in particular an explicit formula for its peakedness. This result offers a unified handling of both overflow and carried traffics in networks. Furthermore, some refined characteristics for the overflow and freed carried streams are derived.  相似文献   
3.
Let X(ω) be a random element taking values in a linear space X endowed with the partial order ≤; let G0 be the class of nonnegative order-preserving functions on X such that, for each g∈G0, E[g(X)] is defined; and let G1?G0 be the subclass of concave functions. A version of Markov's inequality for such spaces in P(X ≥ x) ≤ infG0E[g(X)]/g(x). Moreover, if E(X) = ξ is defined and if Jensen's inequality applies, we have a further inequality P(X≥x) ≤ infG1E[g(X)]/g(x) ≤ infG1g(ξ)/g(x). Applications are given using a variety or orderings of interest in statistics and applied probability.  相似文献   
4.
The risk influence function is defined as the directional derivative of the risk of the Bayes rule. The properties of this function are studied and the relationship between unimodal prior distribution and the shape of the frequentist risk of the corresponding Bayes procedure is examined.  相似文献   
5.
The treatment of kurtosis in textbooks is both sparse and contradictory with applications rarely discussed. To address this, an easily understood definition of kurtosis is introduced and important applications are demonstrated. Two different approaches to teaching kurtosis are presented based on a financial application.  相似文献   
6.
It is shown that: If (X1, X2) is a permutation invariant central convex unimodal random vector and if A is a symmetric (about 0) permutation invariant convex set then P{(aX1, X2/a) A} is nondecreasing as a varies from )+ to 1 and is non-increasing as a varies from 1 to ∞ (that is, P{(a1X1, a2X2) ε A} is a Schur-concave function of (log a1, log a2). Some extensions of this result for the n-dimensional case are discussed. Applications are given for elliptically contoured distributions and scale parameter families.  相似文献   
7.
Two traffic streams Φ1, Φ2 are offered a link. The calls of Φi require exponential holding times with parameter μ and are accepted if less than Ci trunks are occupied. Approximating the Φi by appropriate renewal processes meeting their first two moments, defined as the moments of the numbers of calls in virtual links of infinite capacity to which the traffic streams as freed traffics are virtually directed and where the calls get fresh exponential i.i.d. holding times with parameter μ, stable recursive algorithms of complexity O(max (C1,C2)) are derived for the first two defined as above moments of the individual overflow and freed carried traffics. The results offer a unified handling of both overflow and carried traffics in circuit switched networks with trunk reservation, providing a basis for new two-moment network dimensioning algorithms.This work was supported by a grant from the Siemens AG.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号