Results 11 to 20 of about 252,736 (238)
The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, and the time variation in network statistics like packet transmission rates and link qualities, necessitate the use of adaptive duty cycling ...
W. Chan +6 more
semanticscholar +3 more sources
Reversible jump, birth‐and‐death and more general continuous time Markov chain Monte Carlo samplers
O. Cappé, C. Robert, T. Rydén
semanticscholar +3 more sources
Calibration of Transition Intensities for a Multistate Model: Application to Long-Term Care
We consider a non-homogeneous continuous time Markov chain model for Long-Term Care with five states: the autonomous state, three dependent states of light, moderate and severe dependence levels and the death state.
Manuel L. Esquível +3 more
doaj +1 more source
Stochastic Modeling of a Measles Outbreak in Brazil
Development of mathematical models and its numerical implementations are essential tools in epidemiological modeling. Susceptible-Infected-Recovered (SIR) compartmental model, proposed by Kermack and McKendrick, in 1927, is a widely used deterministic ...
M. Lau, Z. G. Arenas
doaj +1 more source
ANALISIS MODEL EPIDEMIK SVEIR DENGAN CONTINUOUS TIME MARKOV CHAIN (CTMC) PADA PENYAKIT RUBELLA
Penyakit rubella yang dikenal dengan sebutan campak Jerman adalah penyakit menular yang disebabkan oleh virus rubella. Penelitian ini mempelajari model dinamika penyebaran penyakit rubella menggunakan model SVEIR yang merupakan modifikasi dari model yang
Nur Eliska, Hadi Sumarno, Paian Sianturi
doaj +1 more source
Bitcoin Selfish Mining Modeling and Dependability Analysis [PDF]
Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments.
Chencheng Zhou +3 more
doaj +1 more source
A scaling analysis of a cat and mouse Markov chain [PDF]
Motivated by an original on-line page-ranking algorithm, starting from an arbitrary Markov chain $(C_n)$ on a discrete state space ${\cal S}$, a Markov chain $(C_n,M_n)$ on the product space ${\cal S}^2$, the cat and mouse Markov chain, is ...
Litvak, Nelly, Robert, Philippe
core +8 more sources
Markov Model of Cyber Attack Life Cycle Triggered by Software Vulnerability [PDF]
Software vulnerability life cycles illustrate changes in detection processes of software vulnerabilities during using computer systems. Unfortunately, the detection can be made by cyber-adversaries and a discovered software vulnerability may be ...
Romuald Hoffmann
doaj +1 more source
Optimal control of multiple Markov-switching stochastic systems with numerical applications
In this article the authors set up an optimal control framework for a hybrid stochastic system with dual or multiple Markov switching diffusion processes, while Markov chains governing these switching diffusions are not identical as assumed in the ...
Jianmin Shi
doaj +1 more source
Continuous-time controlled Markov chains
The authors consider continuous-time Markov decision processes with a denumerable state space and Borel action space where the cost and the transition rates are allowed to be unbounded. In the class of deterministic stationary policies they first give very weak conditions under which the existence of \(\varepsilon\)-optimal \((\varepsilon\geq 0 ...
Guo, Xianping +1 more
openaire +3 more sources

