Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Entire DC Network

Task Scheduling And Simulation, Martin Lee Mayne May 2006

Task Scheduling And Simulation, Martin Lee Mayne

Undergraduate Honors Capstone Projects

Scheduling is a problem that is not only common computer science, but which also comes up in a variety of real world situations. Whether multi-threading computer processes, scheduling airport traffic, optimizing assembly line production and manufacturing, or ensuring that enough employees are on the floor at a given time, scheduling is important for increasing efficiency, reducing costs, optimizing production, and meeting deadlines. Scheduling has been used throughout history and has increased in efficacy through the years. Modem computerized scheduling techniques are typically much better than human calculations and often produce surprising insights and results which would have been otherwise passed …


Modeling And Simulation Of Value -At -Risk In The Financial Market Area, Xiangyin Zheng Apr 2006

Modeling And Simulation Of Value -At -Risk In The Financial Market Area, Xiangyin Zheng

Doctoral Dissertations

Value-at-Risk (VaR) is a statistical approach to measure market risk. It is widely used by banks, securities firms, commodity and energy merchants, and other trading organizations. The main focus of this research is measuring and analyzing market risk by modeling and simulation of Value-at-Risk for portfolios in the financial market area. The objectives are (1) predicting possible future loss for a financial portfolio from VaR measurement, and (2) identifying how the distributions of the risk factors affect the distribution of the portfolio. Results from (1) and (2) provide valuable information for portfolio optimization and risk management.

The model systems chosen …


A Selective Approach To Bandwidth Overbooking, Feng Huang Mar 2006

A Selective Approach To Bandwidth Overbooking, Feng Huang

Theses and Dissertations

Overbooking is a technique used by network providers to increase bandwidth utilization. If the overbooking factor is chosen appropriately, additional virtual circuits can be admitted without degrading quality of service for existing customers. Most existing implementations use a single factor to accept a linear fraction of traffic requests. High values of this factor may cause the degradation of quality of service whereas low overbooking factors will result in underutilization of bandwidth. Network providers often select overbooking factors based only on aggregate average virtual circuit utilization. This paper proposes a selective overbooking scheme based on trunk size and usage profile. Experiments …


Simulating A Pipelined Reconfigurable Mesh On A Linear Array With A Reconfigurable Pipelined Bus System, Mathura Gopalan Jan 2006

Simulating A Pipelined Reconfigurable Mesh On A Linear Array With A Reconfigurable Pipelined Bus System, Mathura Gopalan

Computer Science Theses

Due to the unidirectional nature of propagation and predictable delays, optically pipelined buses have been gaining more attention. There have been many models proposed over time that use reconfigurable optically pipelined buses. The reconfigurable nature of the models makes them capable of changing their component’s functionalities and structure that connects the components at every step of computation. There are both one dimensional as well as k –dimensional models that have been proposed in the literature. Though equivalence between various one dimensional models and equivalence between different two dimensional models had been established, so far there has not been any attempt …


A Comparison For Longitudinal Data Missing Due To Truncation, Rong Liu Jan 2006

A Comparison For Longitudinal Data Missing Due To Truncation, Rong Liu

Theses and Dissertations

Many longitudinal clinical studies suffer from patient dropout. Often the dropout is nonignorable and the missing mechanism needs to be incorporated in the analysis. The methods handling missing data make various assumptions about the missing mechanism, and their utility in practice depends on whether these assumptions apply in a specific application. Ramakrishnan and Wang (2005) proposed a method (MDT) to handle nonignorable missing data, where missing is due to the observations exceeding an unobserved threshold. Assuming that the observations arise from a truncated normal distribution, they suggested an EM algorithm to simplify the estimation.In this dissertation the EM algorithm is …