共查询到20条相似文献,搜索用时 15 毫秒
1.
Multi-expert operational risk management 总被引:3,自引:0,他引:3
Beroggi G.E.G. Waliace W.A. 《IEEE transactions on systems, man and cybernetics. Part C, Applications and reviews》2000,30(1):32-44
Operational risk management is the process of monitoring, evaluating, and changing courses of actions with potential detrimental consequences in real time. In this paper, we extend the decision models proposed in the literature for individual risk managers to account for situations where multiple risk managers are involved. For this purpose, two dynamic and adaptive preference aggregation models for cardinal and ordinal assessments are proposed and discussed. The mechanical aspects of the models are then validated using field data collected from experienced operational risk managers in an individual-expert setting. Sensitivity analysis indicates that the models have enough flexibility to be adapted to account for behavioral considerations. The paper closes with a research agenda 相似文献
2.
3.
4.
针对不断增长的高速数据、高音质音频和视频数据等移动应用新需求,提出了一种新的基于业务的无线接入点(AP)转发模式智能切换方法.通过在无线局域网的AP内加入特定的邻近AP状态表和智能切换模块来动态地决定转发模式,以减小传输时延,提高用户对不同业务的体验感,达到对现有切换方式进行优化的目的.此方法在无线局域网实验室环境中进... 相似文献
5.
6.
7.
8.
A. H. Edmiston 《BT Technology Journal》2007,25(1):68-78
Operational risk management is a reflection of the need for enterprises to demonstrate that they are prepared for all eventualities,
through monitoring day-to-day operational risks.
IT is an area that is critical to modern enterprises and consequently carries with it the capacity to cripple those same enterprises
— business disruption as a result of IT failure is a major area of operational risk. Modern IT in many enterprises, especially
large ones such as BT, is distributed and heterogeneous. This presents challenges to collecting and correlating management,
monitoring and audit data in a timely manner. It also highlights the need to take an end-to-end view, with data collected
from a number of sources and presented as an integrated picture of the health of a business solution. In an eBusiness environment,
there is also a need to manage, monitor and audit the IT interfaces with customers, suppliers and partners.
This paper looks at operational risk in an IT context and provides an overview of the contribution made by systems and applications
monitoring to successful operational risk management. This paper has concentrated on using monitoring to address the downside
of risk and reflects a culture in many organisations to eliminate or minimise risk. However, risk has an upside whereby an
enterprise can gain competitive advantage through ‘right setting’ risk tolerance — this advantage can only be gained when
the organisation begins to understand and articulates its risk appetite. Monitoring can contribute significantly to the upside
through supplying the information required to manage and control the risk exposure to perform within the accepted risk appetite,
facilitate risk taking and imbue a better risk culture in the organisation. 相似文献
9.
A fair protocol for signing contracts 总被引:16,自引:0,他引:16
Ben-Or M. Goldreich O. Micali S. Rivest R.L. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》1990,36(1):40-46
Two parties, A and B, want to sign a contract C over a communication network. To do so, they must simultaneously exchange their commitments to C. Since simultaneous exchange is usually impossible in practice, protocols are needed to approximate simultaneity by exchanging partial commitments in piece-by-piece manner. During such a protocol, one party or another may have a slight advantage; a fair protocol keeps this advantage within acceptable limits. A new protocol is proposed. It is fair in the sense that, at any stage in its execution, the conditional probability that one party cannot commit both parties to the contract given that the other party can, is close to zero. This is true even if A and B have vastly different computing powers and is proved under very weak cryptographic assumptions 相似文献
10.
In this letter, we provide the lower and upper bounds of Erlang capacity of multiaccess systems supporting several different radio access technologies in the multiservice scenario, by considering two extreme operation methods; separate and common operation. In a numerical example with GSM/EDGE-like and WCDMA-like subsystems, it is shown that the common operation method can provide up to 60% Erlang capacity improvement over the separate operation method when using a near optimum so-called service-based user assignment scheme, with the combined effects of the assignment and the trunking gains. Even in the worst-case, the common operation method still can provide about 15% capacity improvement over the separate operation method, which mainly comes from the trunking gain. 相似文献
11.
12.
13.
《Solid-State Circuits, IEEE Journal of》1977,12(3):310-311
A low-cost internally compensated integrated-circuit operational amplifier occupying a small die area can be fabricated if the compensation capacitor value is low. This objective is attained when the amplifier-input-stage transconductance is reduced to a minimum provided the frequency response remains unchanged. A new technique, transconductance cancellation, meets the objective without extra devices or components. 相似文献
14.
保证电力系统正常运行的继电保护,当继电保护发生隐患时,会对电力系统产生极大的不利影响.本文针对继电保护隐患的运行风险在线评估问题进行分析. 相似文献
15.
D. Brown 《BT Technology Journal》2007,25(1):208-214
’Uncertainty creates winners and losers. Organisations that want to survive have to adapt.’ Kees van der Heijden, Professor
of General and Strategic Management at the Graduate Business School of Strathclyde University, Glasgow [1].
Horizon scanning is the practice of monitoring the business environment, and tracking the changes in the environment that
could have an impact on individual businesses. Understanding change in the business environment is a key element to understanding
and managing business risk. 相似文献
16.
17.
《Solid-State Circuits, IEEE Journal of》1969,4(4):184-191
The characteristics of recently developed integrated-circuit components are reviewed and some new devices are described. Their impact on the design of monolithic operational amplifiers is also discussed. Emphasis is placed on realizing particularly good dc characteristics-especially low input current. However, techniques for obtaining higher operating speeds are also covered. 相似文献
18.
Performance analysis of a preemptive and priority reservation handoff scheme for integrated service-based wireless mobile networks 总被引:2,自引:0,他引:2
We propose an analytical model for integrated real-time and non-real-time services in a wireless mobile network with priority reservation and preemptive priority handoff schemes. We categorize the service calls into four different types, namely, real-time and non-real-time service originating calls, and real-time and non real-time handoff service request calls. Accordingly, the channels in each cell are divided into three parts: one is for real-time service calls only, the second is for non-real-time service calls only, and the last one is for overflow of handoff requests that cannot be served in the first two parts. In the third group, several channels are reserved exclusively for real-time service handoffs so that higher priority can be given to them. In addition, a realtime service handoff request has the right to preempt non-real-time service in the preemptive priority handoff scheme if no free channels are available, while the interrupted non-real-time service call returns to its handoff request queue. The system is modeled using a multidimensional Markov chain and a numerical analysis is presented to estimate blocking probabilities of originating calls, forced termination probability, and average transmission delay. This scheme is also simulated under different call holding time and cell dwell time distributions. It is observed that the simulation results closely match the analytical model. Our scheme significantly reduces the forced termination probability of real-time service calls. The probability of packet loss of non-real-time transmission is shown to be negligibly small, as a non-real-time service handoff request in waiting can be transferred from the queue of the current base station to another one. 相似文献
19.
20.
《Solid-State Circuits, IEEE Journal of》1983,18(4):389-394
A macromodel for integrated all-MOS operational amplifiers is developed with reference to circuits where the settling behavior of the op amps is of particular concern. Expressions for the values of the elements of the macromodel are obtained from typical measured characteristics. It is shown that the proposed macromodel can satisfactorily predict both small-signal and large-signal behavior of the op amps. 相似文献