On signature-based expressions of system reliability

被引:35
|
作者
Marichal, Jean-Luc [1 ]
Mathonet, Pierre [1 ]
Waldhauser, Tamas [1 ,2 ]
机构
[1] Univ Luxembourg, Math Res Unit, FSTC, L-1359 Luxembourg, Luxembourg
[2] Univ Szeged, Bolyai Inst, H-6720 Szeged, Hungary
关键词
System signature; System reliability; Coherent system; Order statistic; COHERENT SYSTEMS; LATTICE POLYNOMIALS; COMPONENTS;
D O I
10.1016/j.jmva.2011.05.007
中图分类号
O21 [概率论与数理统计]; C8 [统计学];
学科分类号
020208 ; 070103 ; 0714 ;
摘要
The concept of signature was introduced by Samaniego for systems whose components have i.i.d. lifetimes. This concept proved to be useful in the analysis of theoretical behaviors of systems. In particular, it provides an interesting signature-based representation of the system reliability in terms of reliabilities of k-out-of-n systems. In the non-i.i.d. case, we show that, at any time, this representation still holds true for every coherent system if and only if the component states are exchangeable. We also discuss conditions for obtaining an alternative representation of the system reliability in which the signature is replaced by its non-i.i.d. extension. Finally, we discuss conditions for the system reliability to have both representations. (C) 2011 Elsevier Inc. All rights reserved.
引用
收藏
页码:1410 / 1416
页数:7
相关论文
共 50 条
  • [31] A Nanoscale Nuclear Magnetic Resonance System for Signature-Based Detection of Biomolecules
    Gomez, Pablo
    Litvinov, Dmitri
    Khizroev, Sakhrat
    JOURNAL OF NANOELECTRONICS AND OPTOELECTRONICS, 2008, 3 (02) : 123 - 132
  • [32] High performance payload signature-based Internet traffic classification system
    Lee, Sung-Ho
    Park, Jun-Sang
    Yoon, Sung-Ho
    Kim, Myung-Sup
    2015 17TH ASIA-PACIFIC NETWORK OPERATIONS AND MANAGEMENT SYMPOSIUM APNOMS, 2015, : 491 - 494
  • [33] Combined Behavior- and Signature-Based Internet Worm Detection System
    Altaher, Altyeb
    Ramadass, Sureswaran
    Meulenberg, Andrew
    Abdat, Mustafa
    Ali, Ammar
    INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (10): : 4213 - 4222
  • [34] Secure anonymous signature-based transactions
    Van Herreweghen, E
    COMPUTER SECURITY - ESORICS 2000, PROCEEDINGS, 2000, 1895 : 55 - 71
  • [35] Parsimony in signature-based target identification
    Baum, CE
    ULTRA-WIDEBAND, SHORT-PULSE ELECTROMAGNETICS 5, 2002, : 605 - 614
  • [36] A novel signature-based packet classification
    Chen, YT
    Yang, YH
    GLOBECOM '01: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6, 2001, : 2275 - 2279
  • [37] Signature-Based Methods for Data Streams
    Corinna Cortes
    Daryl Pregibon
    Data Mining and Knowledge Discovery, 2001, 5 : 167 - 182
  • [38] Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature
    Tezuka, Masayuki
    Tanaka, Keisuke
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 317 - 336
  • [39] An Architecture for Blockchain-Enabled Collaborative Signature-based Intrusion Detection System
    Laufenberg, Daniel
    Li, Lei
    Shahriar, Hossain
    Han, Meng
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 169 - 169
  • [40] Signature-based Algorithms to Compute Grobner Bases
    Eder, Christian
    Perry, John
    ISSAC 2011: PROCEEDINGS OF THE 36TH INTERNATIONAL SYMPOSIUM ON SYMBOLIC AND ALGEBRAIC COMPUTATION, 2011, : 99 - 106