An efficient algorithm for exact computation of system and survival signatures using binary decision diagrams
System and survival signatures are important and popular tools for studying and analysing the reliability of systems. However, it is difficult to compute these signatures for systems with complex reliability structure functions and large numbers of components. This paper presents a new algorithm tha...
| Main Author: | Reed, Sean |
|---|---|
| Format: | Article |
| Published: |
Elsevier
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/42221/ |
Similar Items
Improving reliability calculation with augmented binary decision diagrams
by: Herrmann, Johannes u
Published: (2010)
by: Herrmann, Johannes u
Published: (2010)
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Prime implicants for modularised non-coherent fault trees using binary decision diagrams
by: Remenyte-Prescott, Rasa, et al.
Published: (2007)
by: Remenyte-Prescott, Rasa, et al.
Published: (2007)
Computation of Probability Coefficients using Binary Decision Diagram and their Application in Test Vector Generation
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
by: Singh, Ashutosh Kumar, et al.
Published: (2009)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Committal deniable signatures over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Development of BDD models for decision support in phased mission systems
by: Zhang, Yang
Published: (2016)
by: Zhang, Yang
Published: (2016)
New proxy signatures with message recovery using pairing
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
A new proxy signature scheme as secure as EIGamal signature
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Using reliability analysis to support decision making
in phased mission systems
by: Zhang, Yang, et al.
Published: (2017)
by: Zhang, Yang, et al.
Published: (2017)
Genome-wide identification of signatures of positive selection in African admixed zebu cattle
by: Bahbahani, Hussain
Published: (2015)
by: Bahbahani, Hussain
Published: (2015)
A memory efficient algorithm for network reliability
by: Herrmann, Johannes, et al.
Published: (2009)
by: Herrmann, Johannes, et al.
Published: (2009)
Signatures of selection and introgression in the genus Gallus
by: Lawal, Raman Akinyanju
Published: (2018)
by: Lawal, Raman Akinyanju
Published: (2018)
Lightweight verification and fine-grained access control in named data networking based on schnorr signature and hash functions
by: Wu, Shanglun, et al.
Published: (2021)
by: Wu, Shanglun, et al.
Published: (2021)
Creativity in teaching: what can teachers learn from artists?
by: Hall, Christine, et al.
Published: (2016)
by: Hall, Christine, et al.
Published: (2016)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
An Efficient Method for Generating Optimal OBDD of Boolean Functions
by: Singh, Ashutosh, et al.
Published: (2008)
by: Singh, Ashutosh, et al.
Published: (2008)
Directional fractal signature analysis of trabecular bone: evaluation of different methods to detect early osteoarthritis in knee radiographs
by: Wolski, Marcin, et al.
Published: (2009)
by: Wolski, Marcin, et al.
Published: (2009)
Identification by PCR signature-tagged mutagenesis of attenuated Salmonella Pullorum mutants and corresponding genes in a chicken embryo model
by: Geng, Shizhong, et al.
Published: (2017)
by: Geng, Shizhong, et al.
Published: (2017)
A New "F-Lueg" Cryptosystem and its Security
by: Choo, Mun Yoong
Published: (2002)
by: Choo, Mun Yoong
Published: (2002)
Using multi-valued decision diagram to solve the expected hop count problem
by: Herrmann, Johannes u, et al.
Published: (2009)
by: Herrmann, Johannes u, et al.
Published: (2009)
Comparing Simulations and Graphical Representations of Complexities of Benchmark and Large-Variable Circuits
by: Prasad, P., et al.
Published: (2010)
by: Prasad, P., et al.
Published: (2010)
A pairing-based blind signature scheme with message recovery
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
On augmented OBDD and performability for sensor networks
by: Herrmann, Johannes, et al.
Published: (2010)
by: Herrmann, Johannes, et al.
Published: (2010)
Digital signature-based secure communication in cognitive radio networks
by: Parvin, Sazia, et al.
Published: (2011)
by: Parvin, Sazia, et al.
Published: (2011)
‘Everyone can imagine their own Gellert’: the democratic artist and ‘inclusion’ in primary and nursery classrooms
by: Thomson, Pat, et al.
Published: (2015)
by: Thomson, Pat, et al.
Published: (2015)
A three-step classification framework to handle complex data distribution for radar UAV detection
by: Ren, Jianfeng, et al.
Published: (2020)
by: Ren, Jianfeng, et al.
Published: (2020)
Metabolic signature in stage A/B heart failure: A study in asymptomatic Type 2 Diabetes
by: Brady, Emer M.
Published: (2024)
by: Brady, Emer M.
Published: (2024)
A Model For Binary Response Variable With Time-Censored Observations
by: H.A. Adlan, Hanan
Published: (2000)
by: H.A. Adlan, Hanan
Published: (2000)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Computing performability for wireless sensor networks
by: Herrmann, Johannes U., et al.
Published: (2012)
by: Herrmann, Johannes U., et al.
Published: (2012)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Reliability and availability for substation communication systems using IEC61850
by: Das, Narottam, et al.
Published: (2013)
by: Das, Narottam, et al.
Published: (2013)
Secure e-transactions using mobile agents with agent broker
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Direct and exact methods for the synthesis of discrete-time proportional-integral-derivative controllers
by: Cuoghi, S., et al.
Published: (2013)
by: Cuoghi, S., et al.
Published: (2013)
Low-dose salinomycin induces anti-leukemic responses in AML and MLL
by: Roulston, Gary D.R., et al.
Published: (2016)
by: Roulston, Gary D.R., et al.
Published: (2016)
In-process measurement and monitoring of a polymer laser sintering powder bed with fringe projection
by: Southon, Nicholas, et al.
Published: (2018)
by: Southon, Nicholas, et al.
Published: (2018)
Robust diagnostic and estimation for binary logistic regression model in the presence of multicollinearity and high leverage points
by: Ariffin @ Mat Zin, Syaiba Balqish
Published: (2018)
by: Ariffin @ Mat Zin, Syaiba Balqish
Published: (2018)
Similar Items
-
Improving reliability calculation with augmented binary decision diagrams
by: Herrmann, Johannes u
Published: (2010) -
Improvement of a convertible undeniable partially blind signature scheme
by: Han, Song, et al.
Published: (2006) -
Prime implicants for modularised non-coherent fault trees using binary decision diagrams
by: Remenyte-Prescott, Rasa, et al.
Published: (2007) -
Computation of Probability Coefficients using Binary Decision Diagram and their Application in Test Vector Generation
by: Singh, Ashutosh Kumar, et al.
Published: (2009) -
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)