32 results on '"Gaofeng Da"'
Search Results
2. Joint Cyber Risk Assessment of Network Systems with Heterogeneous Components.
3. On the signature of complex system: A decomposed approach.
4. Ensuring confidentiality and availability of sensitive data over a network system under cyber threats.
5. Component Level Versus System Level k-Out-of-n Assembly Systems.
6. Multi-Pollutant Formation and Control in Pressurized Oxy-Combustion: SOx, NOx, Particulate Matter, and Mercury
7. Multivariate dependence among cyber risks based on L-hop propagation
8. Cyber Epidemic Models with Dependences.
9. On the Lorenz ordering of order statistics from exponential populations and some applications.
10. On sample ranges from two sets of heterogenous random variables.
11. A New Approach to Modeling and Analyzing Security of Networked Systems.
12. Cyber Epidemic Models with Dependences.
13. On computing signatures of coherent systems.
14. Stochastic comparisons in multivariate mixed model of proportional reversed hazard rate with applications.
15. On comparisons of population and subpopulations in frailty models
16. A new approach to modeling and analyzing security of networked systems.
17. An efficient algorithm for computing the signatures of systems with exchangeable components and applications
18. On the signature of complex system: A decomposed approach
19. Ensuring confidentiality and availability of sensitive data over a network system under cyber threats
20. ON THE QUASI-STATIONARY DISTRIBUTION OF SIS MODELS
21. Component Level Versus System Level -Out-of- Assembly Systems
22. COMPARISONS OF SERIES AND PARALLEL SYSTEMS WITH HETEROGENEOUS COMPONENTS
23. Further results for parallel systems with two heterogeneous exponential components
24. On Computing Signatures of k-out-of-n Systems Consisting of Modules
25. ORDERING CONSECUTIVE k-OUT-OF-n:F SYSTEMS
26. Right Spread Order of the Second-Order Statistic from Heterogeneous Exponential Random Variables
27. On hazard rate ordering of parallel systems with two independent components
28. Stochastic comparisons in multivariate mixed model of proportional reversed hazard rate with applications
29. On reversed hazard rate in general mixture models
30. A new approach to modeling and analyzing security of networked systems
31. On Bivariate Signatures for Systems with Independent Modules
32. On computing signatures of coherent systems
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.