Masked Causes of Failure in Series Systems:
A Likelihood Framework

(February 2026)
Abstract

We develop a general likelihood framework for estimating component reliability from series system data when the component cause of failure is masked. The framework applies to any parametric specification of component hazard functions, including covariate-dependent hazards. Three sufficient conditions on the masking mechanism—that the candidate set contains the true cause, that masking probabilities are symmetric across candidates, and that masking probabilities are independent of the component lifetime parameters—allow the unknown masking distribution to be eliminated from the likelihood. We present the resulting likelihood contributions for exact failures with masked cause, right-censored, left-censored, and interval-censored observations. The framework serves as a foundation for distribution-specific inference, and we provide a summary of instantiations for five common lifetime distribution families.

1 Introduction

Estimating the reliability of individual components within a series system is a fundamental problem in reliability engineering (Agustin, 2011). A series system fails when any one of its components fails, so the system lifetime is determined by the weakest component. In many practical settings, only the system-level failure time is observable—the specific component that caused the failure may be unknown or only partially identified. This masking of the failure cause arises naturally in industrial diagnostics, field warranty data, and accelerated life testing, where post-failure inspection is infeasible, costly, or imprecise.

A common diagnostic outcome is a candidate set: a subset of components that plausibly contains the failed component. When the candidate set is a proper subset of all components but not a singleton, the failure cause is partially masked. When the candidate set is the full component set, the cause is fully masked. When it is a singleton, the cause is exactly identified.

The purpose of this paper is to provide a self-contained reference for the likelihood framework for masked failure data in series systems. We present the likelihood under three sufficient conditions (C1–C2–C3) on the masking mechanism that allow the unknown distribution of candidate sets to be eliminated from the likelihood function. The resulting likelihood is expressed entirely in terms of component reliability and hazard functions, enabling maximum likelihood estimation for any parametric specification of component hazard functions.

The framework is deliberately general: we derive the general likelihood structure in terms of component hazard functions, without specializing to any particular distributional form. This work grew out of an earlier master’s project (Towell, 2023b) that developed the likelihood model for Weibull series systems with simulation studies; the present paper extracts and generalizes the core likelihood framework. Distribution-specific treatments—including derivations of score equations, Fisher information, and simulation studies—are deferred to companion papers that cite the present work. In Section 7, we provide hazard function specifications for five common families (Exponential, Weibull, Pareto, Log-normal, and Gamma), enabling practitioners to apply the framework directly.

1.1 Related Work

The C1–C2–C3 conditions and the basic masked-data likelihood have a substantial history in the reliability literature. Miyakawa (1984) introduced the conditions for analyzing incomplete competing risks data. Usher and Hodgson (1988) formulated the MLE problem for masked series system data under these conditions, and Usher et al. (1993) derived exact maximum likelihood estimates for exponential components. Guess et al. (1991) established that the conditions hold in many practical diagnostic scenarios and developed component reliability estimation under partial failure information. Sarhan (2001) extended reliability estimation to broader settings with masked system life data. Most of this prior work specialized to the Exponential or Weibull families.

The present paper does not claim the C1–C2–C3 conditions or the basic likelihood derivation as novel contributions. Rather, its role is to serve as a foundational reference that provides a unified treatment of the framework in a single self-contained document. The value lies in the unified presentation, the extension of the likelihood to all four censoring types (exact, right, left, and interval), the identifiability analysis, and the five-family instantiation table (Section 7). Companion papers and software packages can cite this work for the general theory while focusing on distribution-specific derivations and simulation studies.

Non-parametric competing risks methods—including the Kaplan–Meier estimator, the Nelson–Aalen cumulative hazard estimator, and the Cox proportional hazards partial likelihood—require observing which event type occurred in order to separate cause-specific hazard contributions. Masking eliminates precisely this information: the candidate set does not identify the cause, so partial likelihood and non-parametric estimators cannot be applied directly. The parametric structure of hj(t;𝜽j) is what makes the problem tractable under masking—it provides enough structure for the likelihood to separate component hazards even when the data cannot. Our framework is therefore parametric by necessity (for identifiability under masking), not merely by convenience.

The remainder of this paper is organized as follows. Section 2 establishes the series system model and derives the system reliability, density, and hazard functions. Section 3 derives the distribution of the component cause of failure. Section 4 defines the observational model, including the masked data notation and a taxonomy of observation types. Section 5 presents the three conditions and derives the core likelihood contribution—the central result of this paper. Section 6 discusses maximum likelihood estimation in the general framework. Section 7 provides hazard function specifications for common parametric families. Sections 8 and 9 discuss extensions, relaxations, and concluding remarks. Table 1 summarizes the principal notation used throughout the paper.

Table 1: Summary of notation.
Symbol Description
m Number of components in the series system
Ti System lifetime (random variable) for the ith system
Tij Lifetime of component j in system i
Ki Component cause of system failure
hj(t;𝜽j) Hazard function of component j
Rj(t;𝜽j) Reliability function of component j
fj(t;𝜽j) Density function of component j
𝜽 Full parameter vector (𝜽1,,𝜽m)
Di=(si,ωi,ci,𝒙i) Observation tuple for system i
si Observed time (ti, τi, or interval (ai,bi))
ωi{E,R,L,I} Observation type label
ci{1,,m} Candidate set (possible failure causes)
βi Masking probability for observation i
,,, Index sets by observation type
(𝜽) Log-likelihood function

2 Series System Model

Consider a system composed of m components arranged in a series configuration. Each component and system has two possible states: functioning or failed. We assume throughout that all component lifetime distributions are absolutely continuous with respect to Lebesgue measure (i.e., each Tij has a density). We observe n independent systems (which need not be identically distributed, since systems may differ by covariates). The lifetime of the ith system is denoted by the random variable Ti and the lifetime of its jth component by Tij. We assume that the component lifetimes within a single system are statistically independent but not necessarily identically distributed.

Remark 1 (Component independence).

Component independence is a standard assumption in the series system and competing risks literature, but it rules out common-cause failures, load-sharing, and environmental coupling. The entire framework developed below—system reliability as a product of component reliabilities (Theorem 1), system hazard as a sum of component hazards (Theorem 3), and the cause-of-failure distribution (Theorem 6)—depends critically on this assumption. Extensions to dependent competing risks exist but require copula models or other dependence structures and face fundamental identifiability challenges: Tsiatis (1975) showed that, without independence, marginal component distributions are not identifiable from system lifetime data alone. Such extensions are beyond the scope of this paper.

A series system fails when any component fails, so the system lifetime is

Ti=min{Ti1,Ti2,,Tim}. (1)

The reliability function of the ith system is RTi(t)=Pr{Ti>t}, the probability that the system survives beyond time t. The probability density function (pdf) of Ti is fTi(t)=ddtRTi(t), and the hazard function is

hTi(t)=fTi(t)RTi(t), (2)

representing the instantaneous failure rate at time t given survival to time t.

Each component’s lifetime distribution is specified by its hazard function hj(t;𝜽j,𝒙i), where 𝜽j is a finite-dimensional parameter vector and 𝒙i is an optional covariate vector for the ith system. The cumulative hazard, reliability, and density follow:

Hj(t;𝜽j,𝒙i) =0thj(u;𝜽j,𝒙i)𝑑u, (3)
Rj(t;𝜽j,𝒙i) =exp{Hj(t;𝜽j,𝒙i)}, (4)
fj(t;𝜽j,𝒙i) =hj(t;𝜽j,𝒙i)Rj(t;𝜽j,𝒙i). (5)

This specification subsumes standard parametric families and accommodates non-standard hazard shapes (bathtub curves, piecewise-constant rates) and covariate-dependent hazards such as proportional hazards models. When covariates are absent, we suppress 𝒙i and write hj(t;𝜽j).

The overall parameter vector is

𝜽=(𝜽1,,𝜽m), (6)

belonging to a parameter space 𝛀.

Theorem 1 (System reliability).

The series system has a reliability function given by

RTi(t;𝜽)=j=1mRj(t;𝜽j). (7)
Proof.

Since the system fails when any component fails, {Ti>t}={Ti1>t,,Tim>t}. By the independence of component lifetimes,

RTi(t;𝜽)=Pr{Ti1>t}Pr{Tim>t}=j=1mRj(t;𝜽j).
Theorem 2 (System pdf).

The series system has a pdf given by

fTi(t;𝜽)=j=1mfj(t;𝜽j)k=1kjmRk(t;𝜽k). (8)
Proof.

Differentiating the system reliability function,

fTi(t;𝜽)=ddtj=1mRj(t;𝜽j).

By the product rule applied recursively,

ddtj=1mRj(t;𝜽j)=j=1m(ddtRj(t;𝜽j))k=1kjmRk(t;𝜽k)=j=1mfj(t;𝜽j)k=1kjmRk(t;𝜽k).
Theorem 3 (System hazard).

The series system has a hazard function given by

hTi(t;𝜽)=j=1mhj(t;𝜽j). (9)
Proof.

By definition, hTi(t;𝜽)=fTi(t;𝜽)/RTi(t;𝜽). Substituting from Theorems 2 and 1,

hTi(t;𝜽)=j=1mfj(t;𝜽j)k=1kjmRk(t;𝜽k)j=1mRj(t;𝜽j)=j=1mfj(t;𝜽j)Rj(t;𝜽j)=j=1mhj(t;𝜽j).
Remark 2.

Combining the hazard and reliability representations, the system pdf admits the convenient form

fTi(t;𝜽)=hTi(t;𝜽)RTi(t;𝜽)={j=1mhj(t;𝜽j)}{j=1mRj(t;𝜽j)}, (10)

which we use extensively in subsequent derivations.

3 Component Cause of Failure

Whenever a series system fails, precisely one component is the cause (almost surely, since the component lifetime distributions are assumed to be absolutely continuous with respect to Lebesgue measure). We denote the component cause of failure of the ith system by the discrete random variable Ki, with support {1,,m}. The event Ki=j means that component j had the shortest lifetime among all components of the ith system.

Theorem 4 (Joint distribution of Ki and Ti).

The joint pdf of the component cause of failure Ki and the system lifetime Ti is

fKi,Ti(j,t;𝜽)=hj(t;𝜽j)l=1mRl(t;𝜽l). (11)
Proof.

The event {Ki=j,Ti=t} requires that component j fails at time t while all other components survive past time t. By the independence of component lifetimes,

fKi,Ti(j,t;𝜽)=fj(t;𝜽j)l=1ljmRl(t;𝜽l).

Since fj(t;𝜽j)=hj(t;𝜽j)Rj(t;𝜽j), substituting gives

fKi,Ti(j,t;𝜽)=hj(t;𝜽j)Rj(t;𝜽j)l=1ljmRl(t;𝜽l)=hj(t;𝜽j)l=1mRl(t;𝜽l).
Theorem 5 (Marginal probability of cause).

The probability that the jth component is the cause of failure is

Pr{Ki=j}=𝔼𝜽[hj(Ti;𝜽j)l=1mhl(Ti;𝜽l)]. (12)
Proof.

Marginalizing the joint pdf over the system lifetime,

Pr{Ki=j}=0fKi,Ti(j,t;𝜽)𝑑t=0hj(t;𝜽j)RTi(t;𝜽)𝑑t.

Since RTi(t;𝜽)=fTi(t;𝜽)/hTi(t;𝜽), we can rewrite this as

Pr{Ki=j}=0hj(t;𝜽j)hTi(t;𝜽)fTi(t;𝜽)𝑑t=𝔼𝜽[hj(Ti;𝜽j)l=1mhl(Ti;𝜽l)].
Theorem 6 (Conditional probability of cause given failure time).

Given that the system fails at time ti, the probability that the jth component is the cause is

Pr{Ki=jTi=ti}=hj(ti;𝜽j)l=1mhl(ti;𝜽l). (13)
Proof.

By the definition of conditional probability,

Pr{Ki=jTi=ti}=fKi,Ti(j,ti;𝜽)fTi(ti;𝜽)=hj(ti;𝜽j)l=1mRl(ti;𝜽l)hTi(ti;𝜽)l=1mRl(ti;𝜽l)=hj(ti;𝜽j)l=1mhl(ti;𝜽l).

Theorem 6 is a conditional version of Theorem 5; it is also the operationally important result, since the likelihood (Section 5) depends on the conditional cause probability given the observed failure time rather than on the marginal cause probability of Theorem 5. The conditional probability of cause is determined entirely by the ratio of the component’s hazard to the total system hazard at the observed failure time. In a well-designed series system, the designer aims to balance failure rates so that no single component dominates, resulting in roughly balanced cause-of-failure probabilities across components, though this ideal is not always achieved in practice.

4 Observational Model

In practice, we do not observe the component lifetimes directly. Instead, we observe system-level data that may be subject to two forms of masking: censoring of the failure time and masking of the failure cause.

4.1 Observation Types

We consider four types of observations that may arise in reliability studies of series systems (see Klein and Moeschberger, 2005, for background on censored data in survival analysis):

  1. 1.

    Exact failure with candidate set. The system is observed to fail at time ti, and a candidate set ci{1,,m} is observed that is indicative of the component cause of failure. When |ci|=1, the cause is exactly identified; when |ci|>1, the cause is masked.

  2. 2.

    Right-censored. The system is still functioning at observation time τi; we know only that Ti>τi.

  3. 3.

    Left-censored. The system has already failed before observation time τi; we know only that Tiτi. A candidate set ci may also be observed if a diagnostic is performed at inspection time τi to partially identify the failure cause.

  4. 4.

    Interval-censored. The system failure occurred in the interval (ai,bi); we know only that ai<Tibi. A candidate set ci may accompany the observation when a diagnostic is performed at one of the inspection times.

4.2 Masked Data Notation

Each observation is represented as a tuple Di=(si,ωi,ci,𝒙i), where:

  • si encodes the observed time information: a failure time ti, a censoring time τi, or an interval (ai,bi);

  • ωi{E,R,L,I} is a label indicating the observation type: exact failure (E), right-censored (R), left-censored (L), or interval-censored (I);

  • ci{1,,m} is the candidate set, relevant whenever a failure is known to have occurred (exact, left-censored, or interval-censored observations). When no cause information is available, ci={1,,m}. For right-censored observations (no failure observed), ci= (no component has failed); and

  • 𝒙i is the covariate vector for the ith system (possibly empty when no covariates are recorded).

The complete data set is D={D1,,Dn}, assumed to be independent draws from the observational model.

4.3 Likelihood Contributions by Observation Type

Each observation type contributes differently to the likelihood function L(𝜽)=i=1nLi(𝜽). The likelihood contributions depend on three conditions developed in Section 5; Table 2 previews the final results for reference.

Table 2: Likelihood contributions by observation type under Conditions C1–C2–C3 (Section 5). All rows involving a failure (exact, left-censored, interval-censored) carry a candidate set ci{1,,m} and require C1–C2–C3. The right-censored row is a standard survival analysis result.
Observation type Likelihood contribution Li(θ)
Exact failure + candidate set l=1mRl(ti;𝜽l)jcihj(ti;𝜽j)
Right-censored j=1mRj(τi;𝜽j)
Left-censored + candidate set 0τijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt
Interval-censored + candidate set aibijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt

When no cause information is available (ci={1,,m}), the left-censored and interval-censored contributions reduce to the familiar forms 1j=1mRj(τi;𝜽j) and j=1mRj(ai;𝜽j)j=1mRj(bi;𝜽j), respectively, since j=1mhj(t;𝜽j)l=1mRl(t;𝜽l)=fTi(t;𝜽) by Equation (10).

The right-censored contribution follows directly from the system reliability function (Theorem 1). The remaining three rows—all involving a confirmed failure—require the three conditions developed in Section 5.

4.4 Dependency Structure

Figure 1 depicts the dependency structure of the data generating process. Observed quantities (Si,ωi,𝒞i,𝒙i) are shown as shaded nodes; latent quantities (component lifetimes Ti1,,Tim, the system lifetime Ti, and the component cause of failure Ki) are shown as open nodes. Solid arrows denote structural dependencies; dashed arrows denote influences that the C1–C2–C3 conditions allow us to ignore in the likelihood. The covariate vector 𝒙i influences both the component lifetimes (through the hazard functions hj(t;𝜽j,𝒙i)) and potentially the candidate set 𝒞i (e.g., when the operating environment affects diagnostic quality). The conditions in Section 5 allow us to construct a likelihood that does not require modeling the distribution of 𝒞i.

𝜽𝒙iTi1Ti2TimTiKiSiωi𝒞i
Figure 1: Dependency model for the data generating process. Shaded nodes are observed; open nodes are latent. Solid arrows are structural dependencies; dashed arrows indicate influences that are eliminated from the likelihood under C1–C2–C3.

4.5 Example: Masked Data

Table 3 shows an example of masked data for a 3-component series system with a right-censoring time τ=5. Systems 5 and 6 are right-censored (their failures were not observed before time τ). System 2 has a singleton candidate set, so its cause of failure is exactly identified. The remaining failed systems have candidate sets of size 2, representing partial masking.

Table 3: Example of right-censored lifetime data with masked component cause of failure for a 3-component series system (τ=5).
System si ωi ci
1 1.1 E {1,2}
2 1.3 E {2}
3 2.6 E {2,3}
4 3.7 E {1,3}
5 5.0 R
6 5.0 R

5 The C1–C2–C3 Likelihood

We now derive the likelihood contribution for an observation where the system failure time is known but the component cause of failure is masked by a candidate set. The derivation below recapitulates and extends the classical argument (Miyakawa, 1984; Usher and Hodgson, 1988) in a unified, general form.

5.1 Joint Distribution of Ti, Ki, and 𝒞i

Our goal is to estimate 𝜽 from observed data Di=(si,ωi,ci,𝒙i). When the system failure is observed (ωi=E), we observe the system failure time ti and a candidate set ci. The joint pdf of the system lifetime Ti and the candidate set 𝒞i is

fTi,𝒞i(ti,ci;𝜽)=fTi(ti;𝜽)Pr𝜽{𝒞i=ciTi=ti}. (14)

While we assume the system lifetime pdf fTi(ti;𝜽) is known (up to parameters), the conditional distribution Pr𝜽{𝒞i=ciTi=ti} is generally unknown—it depends on the diagnostic procedure, which we do not model.

Since 𝒞i and Ki are statistically dependent, we can introduce Ki into the analysis. By Theorem 4, the joint pdf of Ti and Ki is fTi,Ki(ti,j;𝜽)=hj(ti;𝜽j)l=1mRl(ti;𝜽l). The joint pdf of Ti, Ki, and 𝒞i is therefore

fTi,Ki,𝒞i(ti,j,ci;𝜽)=hj(ti;𝜽j)l=1mRl(ti;𝜽l)Pr𝜽{𝒞i=ciTi=ti,Ki=j}. (15)

Marginalizing over Ki,

fTi,𝒞i(ti,ci;𝜽)=l=1mRl(ti;𝜽l)j=1m{hj(ti;𝜽j)Pr𝜽{𝒞i=ciTi=ti,Ki=j}}. (16)

The unknown conditional probability Pr𝜽{𝒞i=ciTi=ti,Ki=j} prevents direct use of this expression for likelihood-based inference. We now introduce three conditions that successively simplify Equation (16) until the unknown masking distribution drops out entirely.

5.2 Condition 1: Candidate Set Contains the True Cause

Condition 1 (C1).

The candidate set 𝒞i contains the index of the failed component:

Pr𝜽{Ki𝒞i}=1. (17)

Condition 1 is the minimal requirement for the candidate set to carry useful information about the failure cause: the true cause must not be excluded. In practice, real diagnostics work by narrowing down from the full component set—eliminating candidates that pass functional checks—rather than constructing the candidate set from scratch. Because exclusion of the true cause would require the diagnostic to affirmatively misidentify a functioning component as the sole failure site, C1 holds whenever the diagnostic is competent in this limited sense.

Two common diagnostic architectures illustrate the point. First, automotive on-board diagnostics (OBD) fault codes are generated by the failing module itself: a voltage exceedance or communication timeout triggers the code, so the candidate set inherently includes the true cause. Second, hierarchical troubleshooting trees prune branches based on pass/fail tests at each level; the true cause remains in the surviving subtree at every step unless a test yields a false negative, which is a calibration failure rather than a structural feature of the diagnostic.

In short, C1 asks for diagnostic competence—not actively wrong—rather than diagnostic precision—exactly right. Violating C1 is a pathological scenario (the diagnostic positively excludes the failed component) that would undermine any analysis, masked or otherwise.

What C1 buys.

Under C1, if jci then Pr𝜽{𝒞i=ciTi=ti,Ki=j}=0. The summation in Equation (16) therefore reduces from {1,,m} to ci:

fTi,𝒞i(ti,ci;𝜽)=l=1mRl(ti;𝜽l)jci{hj(ti;𝜽j)Pr𝜽{𝒞i=ciTi=ti,Ki=j}}. (18)

What breaks without C1.

Without C1, the summation must range over all m components, and the likelihood depends on the masking probabilities for components outside the candidate set. This means the likelihood cannot be simplified without modeling the full masking mechanism.

5.3 Condition 2: Symmetric Masking Within the Candidate Set

Condition 2 (C2).

Given an observed system failure time Ti=ti and candidate set ci, the masking probability is the same regardless of which component in ci is the true cause:

Pr𝜽{𝒞i=ciTi=ti,Ki=j}=Pr𝜽{𝒞i=ciTi=ti,Ki=j}for all j,jci. (19)

Condition 2 is a requirement on the masking mechanism, not merely on the observed data: it must hold for all candidate sets ci that the mechanism can produce, not just the particular sets realized in the sample. When |ci|=1 (a singleton candidate set), C2 is satisfied vacuously—the condition is non-trivial only when |ci|2. In words, C2 requires that the diagnostic does not discriminate between components within the candidate set: given that a particular candidate set is reported, no member of that set is favored over another. Symmetry arises naturally whenever masking is determined by structural grouping—subsystem, module, or physical region—rather than by component-specific properties. Components that share a group are indistinguishable to the diagnostic precisely because the diagnostic operates at the group level.

Two additional examples reinforce this pattern. In avionics maintenance, field technicians replace line-replaceable units (LRUs): every component inside the unit is equally suspect because the diagnostic identified the unit, not the component. In industrial settings, SCADA monitoring systems report alarms at the subsystem level—e.g., “pump station fault”—without distinguishing which element (motor, valve, seal) triggered the alarm; the candidate set is the group, and all members are symmetric.

We acknowledge that C2 is the condition most likely to be violated in practice, since partial diagnostic information can make one candidate more plausible than another. When asymmetry is suspected, a practical mitigation is to redefine the candidate set at the finest resolution where symmetry still holds, effectively trading a smaller candidate set for a valid application of C2.

What C2 buys.

Under C1 and C2, the masking probability Pr𝜽{𝒞i=ciTi=ti,Ki=j} is constant for all jci and can be factored out of the summation in Equation (18):

fTi,𝒞i(ti,ci;𝜽)=Pr𝜽{𝒞i=ciTi=ti,Ki=j}l=1mRl(ti;𝜽l)jcihj(ti;𝜽j), (20)

where j is any element of ci.

What breaks without C2.

Without C2, the masking probabilities remain inside the summation, coupling the hazard contributions with component-specific masking weights. The MLE then depends on the unknown masking probabilities, which must be jointly estimated or modeled.

5.4 Condition 3: Masking Independent of 𝜽

Condition 3 (C3).

The masking probabilities, conditioned on the failure time and the component cause of failure, do not depend on the system parameter 𝜽:

βiPr{𝒞i=ciTi=ti,Ki=j} (21)

is not a function of 𝜽.

Condition 3 states that the diagnostic procedure’s behavior is determined by factors external to the component lifetime parameters. The masking probability βi may depend on the failure time (for exact failures, where the diagnostic is performed at or near the observed failure time), the diagnostician, the testing equipment, or other covariates—but not on 𝜽. For censored observations, the diagnostic is performed at the inspection time rather than at the unknown failure time; see Remark 3 below. The justification is fundamentally causal: the diagnostic tool was designed and calibrated before any failures were observed, so its behavior cannot depend on the unknown 𝜽 we are estimating. For instance, OBD voltage thresholds are hard-coded at manufacture; a vibration sensor’s frequency band is set during installation. Neither adapts to the lifetime parameters of the components it monitors.

Condition 3 is closely related to the concept of ignorability in the missing-data framework of Little and Rubin (2002). In our setting, the “missingness” is the loss of exact cause information through masking; C3 ensures that the masking mechanism is ignorable for likelihood-based inference, in the sense that the conditional distribution of the candidate set need not be modeled when maximizing the likelihood over 𝜽 (see Little and Rubin, 2002, Ch. 6).

When covariates 𝒙i are present, C3 requires that the masking probabilities do not depend on 𝜽 given the covariates and failure time. If the same covariates influence both the failure rate and the diagnostic quality (e.g., an extreme operating environment that accelerates failures and also degrades sensor accuracy), the practitioner should verify that the masking mechanism remains ignorable after conditioning on 𝒙i.

What C3 buys.

Under C1, C2, and C3, the joint pdf becomes

fTi,𝒞i(ti,ci;𝜽)=βil=1mRl(ti;𝜽l)jcihj(ti;𝜽j). (22)

When we view this as a function of 𝜽 (with the data fixed), βi is a constant multiplier that does not affect the location of the maximum. The likelihood contribution is therefore

Li(𝜽)l=1mRl(ti;𝜽l)jcihj(ti;𝜽j). (23)

What breaks without C3.

Without C3, the factor βi depends on 𝜽 and cannot be dropped. The practitioner would need to model the dependence of the masking mechanism on 𝜽—a substantially harder problem that requires additional data or assumptions about the diagnostic process.

5.5 Real-World Example

To illustrate how the three conditions arise in practice, consider an electronic device with three components arranged in a series configuration. Components 1 and 2 are on a shared circuit board, while component 3 is separate. A diagnostic tool isolates the failure to either the shared circuit board or the individual component. A more detailed board-level inspection sometimes pinpoints the specific failed component; let p(0,1) denote the probability that this inspection succeeds. The conditional probabilities for candidate sets are:

Pr{𝒞i=ciTi=ti,Ki=j}={pif ci={j} and j{1,2},1pif ci={1,2} and j{1,2},1if ci={3} and j=3,0otherwise.

This diagnostic tool satisfies all three conditions:

  • C1: The candidate set always contains the failed component—the tool correctly isolates failures to the correct subsystem (each possible candidate set contains the true cause).

  • C2: For the candidate set {1,2}, the masking probability is the same whether component 1 or component 2 failed (both equal 1p). For singleton candidate sets {1} or {2}, Condition 2 is satisfied trivially.

  • C3: The masking probabilities depend only on the diagnostic tool (through p) and not on the component lifetime parameters 𝜽.

The parameter p>0 is essential for identifiability: when the board-level inspection never succeeds (p=0), components 1 and 2 always appear together in every candidate set and their individual parameters cannot be separated—see Section 5.8 for a detailed discussion. Any p>0 ensures that some observations produce singleton candidate sets {1} or {2}, providing the information needed to distinguish the two components.

According to Guess et al. (1991), many industrial diagnostic scenarios naturally satisfy these conditions, reinforcing the practical applicability of the framework.

5.6 Censored Observations with Candidate Sets

The C1–C2–C3 derivation in Sections 5.25.4 applies to any observation where a failure is known to have occurred. Equation (22) gives the joint density of the failure time and candidate set at a specific time ti. For left-censored and interval-censored observations, the failure time is not known exactly, so we integrate over the admissible range.

Remark 3 (Diagnostic timing and the masking probability).

For an exact failure, the diagnostic may be performed at or near the observed failure time ti, so βi=β(ti) is evaluated at a known point and is a scalar constant in the likelihood. For censored observations, the diagnostic is performed at the inspection time—when the system’s failed state is discovered—not at the unknown failure time Ti. (For interval-censored observations, this is typically the later inspection time bi, at which the failure is first detected.) The masking probability is therefore βi=Pr{𝒞i=cisystem failed by inspection,Ki=j}, which does not depend on the integration variable t. This is the natural model: inspectors diagnose the current state at inspection time and do not have access to the unknown failure time. Consequently, βi factors out of the integrals in the left-censored and interval-censored likelihood contributions below, and by Condition 3 it does not depend on 𝜽, so it may be dropped.

Theorem 7 (Left-censored likelihood contribution under C1–C2–C3).

Under Conditions 13, if the ith system is known to have failed by time τi with candidate set ci, the likelihood contribution is

Li(𝜽)0τijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt. (24)
Proof.

By Equation (22), the joint density of the failure time and candidate set at time t is βijcihj(t;𝜽j)l=1mRl(t;𝜽l). Since the failure time is known only to satisfy Tiτi, we integrate over t(0,τi]. As noted in Remark 3, the diagnostic is performed at inspection time, so βi does not depend on the integration variable t and factors out of the integral. By Condition 3, βi does not depend on 𝜽 either, so it is a constant factor that may be dropped. ∎

Theorem 8 (Interval-censored likelihood contribution under C1–C2–C3).

Under Conditions 13, if the ith system failed in the interval (ai,bi] with candidate set ci, the likelihood contribution is

Li(𝜽)aibijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt. (25)
Proof.

The argument is identical to the proof of Theorem 7—with βi again constant by the diagnostic-timing reasoning of Remark 3—but with the integration domain restricted to (ai,bi]. ∎

Remark 4.

When no cause information is available (ci={1,,m}), these contributions reduce to the standard censored-data forms. For the left-censored case,

0τij=1mhj(t;𝜽j)l=1mRl(t;𝜽l)dt=0τifTi(t;𝜽)𝑑t=1j=1mRj(τi;𝜽j),

by Equation (10). Similarly, the interval-censored contribution reduces to

j=1mRj(ai;𝜽j)j=1mRj(bi;𝜽j).

5.7 Combined Likelihood

We now assemble the full likelihood from the individual contributions (Equation (23), Theorems 78, and the right-censored case from Theorem 1). Let ={i:ωi=E}, ={i:ωi=R}, ={i:ωi=L}, and ={i:ωi=I} denote the index sets of observations that are exact failures, right-censored, left-censored, and interval-censored, respectively.

Theorem 9 (Likelihood under C1–C2–C3).

Under Conditions 13, the likelihood for the observed data D={D1,,Dn} is

L(𝜽) i[l=1mRl(ti;𝜽l)jcihj(ti;𝜽j)]i[j=1mRj(τi;𝜽j)]
×i[0τijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt]i[aibijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt]. (26)
Proof.

Each factor follows from the corresponding individual result: the exact-failure contribution from Equation (23), the right-censored contribution from Theorem 1, the left-censored contribution from Theorem 7, and the interval-censored contribution from Theorem 8. Independence across systems gives the product. ∎

5.8 Identifiability

Before addressing identifiability within our framework, we note the classical competing risks result of Tsiatis (1975): without the component independence assumption (Remark 1), the marginal component lifetime distributions are not identifiable from system lifetime data alone—even with complete observation of the failure cause. Our framework inherits identifiability from the independence assumption, which allows the system reliability to factor as a product of component reliabilities (Theorem 1). Given independence, the identifiability question reduces to whether the observed candidate sets provide enough information to separate the component parameters.

Definition 1 (Candidate-set separability).

Let 𝒮 denote the collection of candidate sets that occur with positive probability under the masking mechanism. We say the masking mechanism is separating if, for every pair of distinct components jj, there exists a candidate set c𝒮 such that jc and jc. When this condition fails for some pair (j,j)—that is, jcjc for every c𝒮—we say j and j are diagnostically confounded.

The following theorem shows that separability is the key condition governing identifiability under C1–C2–C3.

Theorem 10 (Identifiability under C1–C2–C3).

Let hj(t;𝛉j) be the hazard function for component j, where 𝛉=(𝛉1,,𝛉m)Θp is the full parameter vector, and suppose each component family is individually identifiable: hj(;𝛉j)=hj(;𝛉j) for all t>0 implies 𝛉j=𝛉j. Under C1–C2–C3:

  1. (a)

    Necessary condition. If components j and j are diagnostically confounded (Definition 1), then 𝜽j and 𝜽j are not separately identifiable from the observed-data likelihood. Specifically, any reparametrization preserving hj(t;𝜽j)+hj(t;𝜽j) for all t>0 yields the same likelihood value.

  2. (b)

    Sufficient condition. If the masking mechanism is separating (Definition 1), and at least some observations are exact failures (type E), then the parameter vector 𝜽 is identifiable for any parametric family whose hazard functions {h1,,hm} are linearly independent over (0,).

Proof.

Part (a). Suppose jcjc for every c𝒮. Then in every exact-failure likelihood contribution R(ti)lcihl(ti) (Equation 23), the hazards hj and hj appear as a sum hj(ti)+hj(ti) wherever they appear at all. The survival factor R(ti)=exp(lHl(ti)) likewise depends on Hj(ti)+Hj(ti) only through their sum. The same holds for right-, left-, and interval-censored contributions (Table 2), since all involve R(t) and lchl(t). Hence the likelihood L(𝜽) depends on 𝜽j and 𝜽j only through the sum hj+hj, and any reallocation preserving this sum leaves L unchanged.

Part (b). Suppose the masking mechanism is separating and let 𝜽𝜽 with L(𝜽)=L(𝜽) for all data sets. Then in particular, for a data set consisting of a single exact failure at time t with candidate set c, the log-likelihood equality gives

lHl(t)+logjchj(t)=lHl(t)+logjchj(t) (27)

for all t>0 and all c𝒮, where hj=hj(;𝜽j) and hj=hj(;𝜽j). Differentiating (27) with respect to t for two candidate sets c1,c2𝒮 with jc1, jc2 (which exist by separability) and subtracting yields a relation that isolates the contribution of component j. Specifically, from the survival terms we obtain lhl(t)=lhl(t), and from candidate sets separating j we obtain that hj(t)=hj(t) for all t>0 whenever h1,,hm are linearly independent. By the individual identifiability assumption, 𝜽j=𝜽j for each j. ∎

Part (a) states that diagnostically confounded components are fundamentally unresolvable: the likelihood surface has a ridge along all reparametrizations of the confounded pair, producing an infinite family of equivalent maximizers rather than a unique MLE. Part (b) provides a checkable condition: the analyst needs only inspect the candidate-set structure 𝒮 to verify separability.

Remark 5 (Linear independence of hazard functions).

The linear independence condition in Theorem 10(b) holds generically for all families in Table 4. The Weibull hazard hj(t)tkj1 with distinct shapes kj yields linearly independent power functions. For the exponential family (kj=1 for all j), the hazards are constant and hence linearly dependent; in this case, separability of the candidate sets carries the full burden of identifiability. For families with identical functional form across components (e.g., exponential or homogeneous Weibull), identifiability requires that the candidate-set matrix C{0,1}|𝒮|×m—whose rows are the indicator vectors of the candidate sets in 𝒮—has full column rank m. This is strictly stronger than separability (which requires only that no two columns of C are identical) but is guaranteed when 𝒮 includes a singleton {j} for each component j.

Remediation of non-identifiability.

When components j and j are diagnostically confounded, three strategies are available:

  1. 1.

    Collapse into a super-component. Replace the always-grouped components with a single composite component whose hazard is hj+hj. This reduces the parameter count and restores identifiability at the cost of losing individual component resolution.

  2. 2.

    Impose equality constraints. Assume the grouped components share identical parameter values (𝜽j=𝜽j), splitting the combined hazard equally. This is appropriate when the components are physically interchangeable (e.g., identical capacitors on the same circuit board).

  3. 3.

    Bayesian regularization. Place informative priors on 𝜽j and 𝜽j to obtain a proper posterior even when the likelihood surface is flat. The posterior concentrates as additional diagnostic information becomes available, so the prior penalty vanishes asymptotically.

In each case, the practitioner should examine the candidate-set structure of the data before fitting the model. Convergence difficulties in numerical optimization (e.g., failure to converge within a maximum number of iterations) may signal that the separability condition of Definition 1 is violated or nearly violated.

6 Maximum Likelihood Estimation

Maximum likelihood estimation (MLE) finds the parameter values that maximize the likelihood of the observed data (Bain and Engelhardt, 1992; Casella and Berger, 2002). A maximum likelihood estimate 𝜽^ satisfies

L(𝜽^)=max𝜽𝛀L(𝜽). (28)

For computational efficiency, we work with the log-likelihood.

Theorem 11 (Log-likelihood).

Under Conditions 13, the log-likelihood for the masked data model is

(𝜽)=E(𝜽)+R(𝜽)+L(𝜽)+I(𝜽), (29)

where

E(𝜽) =i[j=1mlogRj(ti;𝜽j)+log(jcihj(ti;𝜽j))], (30)
R(𝜽) =ij=1mlogRj(τi;𝜽j), (31)
L(𝜽) =ilog[0τijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt], (32)
I(𝜽) =ilog[aibijcihj(t;𝜽j)l=1mRl(t;𝜽l)dt]. (33)
Proof.

Taking logarithms in Theorem 9 and using log=log gives the result directly. ∎

Remark 6 (Common special case).

When only exact failures and right-censored observations are present (==), the log-likelihood reduces to (𝜽)=E(𝜽)+R(𝜽) (Equations (30) and (31)). This is the form used in most companion papers.

6.1 Score Equations

The MLE is found by solving the score equations

θj,r(𝜽)=0, (34)

for each parameter θj,r (the rth element of the jth component’s parameter vector). In general, these equations do not admit closed-form solutions and must be solved numerically using methods such as Newton–Raphson or quasi-Newton algorithms (Nocedal and Wright, 2006; Byrd et al., 1995).

6.2 Asymptotic Properties

Under standard regularity conditions (which must be verified for each specific distribution family)—including identifiability, smoothness of the log-likelihood, and the true parameter lying in the interior of the parameter space—the MLE is consistent, asymptotically normal, and asymptotically efficient (Casella and Berger, 2002; Lehmann and Casella, 1998). That is, as n, 𝜽^𝑝𝜽0 (the true parameter) and n(𝜽^𝜽0)𝑑𝒩(𝟎,1(𝜽0)), where (𝜽0) is the per-observation Fisher information matrix. For finite samples, these asymptotic approximations may be inaccurate, and bootstrap methods (e.g., the bias-corrected and accelerated method (Efron, 1987; Efron and Tibshirani, 1994)) provide a nonparametric alternative for constructing confidence intervals.

6.3 General Recipe for Practitioners

Given a hazard function hj(t;𝜽j,𝒙i) for each component, the practitioner applies the framework as follows:

  1. 1.

    Specify the component hazard functions hj(t;𝜽j,𝒙i) and compute Rj=exp(0thj𝑑u) (analytically if possible, numerically otherwise).

  2. 2.

    Substitute the component-specific Rj and hj into the log-likelihood (Equation (29)).

  3. 3.

    Differentiate the log-likelihood with respect to each parameter to obtain the score equations.

  4. 4.

    Solve the score equations numerically (e.g., using L-BFGS-B (Byrd et al., 1995) or Newton–Raphson) to obtain 𝜽^.

  5. 5.

    Construct confidence intervals using the observed Fisher information or bootstrap resampling.

Section 7 provides hazard functions for five common parametric families, enabling immediate application of this recipe.

6.4 Worked Example: Exponential Components

We illustrate the recipe using the data in Table 3 (m=3 components, n=6 observations) with Exponential component lifetimes. For Exponential components, Rj(t;λj)=eλjt and hj(t;λj)=λj, where λj>0 is the failure rate of the jth component.

Since the data contain only exact failures and right-censored observations, the log-likelihood is =E+R (Remark 6). For Exponential components, logRj(t;λj)=λjt and hj(t;λj)=λj, so the two contributions are:

E =i[(λ1+λ2+λ3)ti+log(jciλj)], (35)
R =i[(λ1+λ2+λ3)τi]. (36)

Substituting the data from Table 3 (with Ttotal=i=1nsi=18.7), the combined log-likelihood is

=18.7(λ1+λ2+λ3)+log(λ1+λ2)+log(λ2)+log(λ2+λ3)+log(λ1+λ3). (37)

The score equations /λj=0 are

λ1 =18.7+1λ1+λ2+1λ1+λ3=0, (38)
λ2 =18.7+1λ1+λ2+1λ2+1λ2+λ3=0, (39)
λ3 =18.7+1λ2+λ3+1λ1+λ3=0. (40)

Subtracting (40) from (38) gives 1/(λ1+λ2)=1/(λ2+λ3), so λ^1=λ^3. Setting α=λ1=λ3 and β=λ2, the system reduces to two equations whose solution is

λ^1=λ^3=71774.80.0385,λ^2=1+1737.40.1370. (41)

The total system failure rate is λ^1+λ^2+λ^3=4/18.70.2139, which equals the number of observed failures divided by the total exposure time—a general property of the Exponential MLE. The masking affects only the allocation of hazard across components, not the total.

Component 2 has the highest estimated failure rate, consistent with its appearance in three of the four failure candidate sets (including a singleton). Components 1 and 3 have equal rates by symmetry: each appears in exactly two candidate sets, with identical structure after relabeling.

7 Common Hazard Function Specifications

Table 4 lists hazard functions for five standard parametric families, illustrating how the general framework specializes. Any hazard function hj(t;𝜽j) satisfying the regularity conditions of Section 6.2 can be used; the named families below are common starting points.

Table 4: Common hazard function specifications. The hazard function hj is the primary specification; the reliability function Rj and density fj are derived via Equations (4)–(5).
Family hj(t;𝜽j) Rj(t;𝜽j) fj(t;𝜽j) Parameters
Exponential λj eλjt λjeλjt λj>0
Weibull kjλj(tλj)kj1 e(t/λj)kj kjλj(tλj)kj1e(t/λj)kj kj,λj>0
Pareto αjt (xmin,jt)αj αjxmin,jαjtαj+1 αj,xmin,j>0; txmin,j
Log-normal ϕ(logtμjσj)σjt[1Φ(logtμjσj)] 1Φ(logtμjσj) 1σjtϕ(logtμjσj) μj, σj>0
Gamma111The Gamma hazard function has no elementary closed form; it is expressed here via its definition hj=fj/Rj. fj(t;𝜽j)Rj(t;𝜽j) 1γ(αj,βjt)Γ(αj) βjαjΓ(αj)tαj1eβjt αj,βj>0

In Table 4, Φ() and ϕ() denote the standard normal CDF and pdf, respectively; γ(,) is the lower incomplete gamma function; and Γ() is the gamma function. For distributions with parameter-dependent support (e.g., the Pareto distribution with txmin,j), the system support is tmaxjxmin,j, and the product formula for system reliability (Theorem 1) must be applied only on this common support.

Remark 7 (Covariate-dependent hazards).

The hazard function hj(t;𝜽j,𝒙i) may incorporate observation-level covariates 𝒙i. A common special case is the proportional hazards specification hj(t;𝜽j,𝒙i)=h0,j(t;𝜽j)exp(𝒙i𝜷j), where h0,j is a baseline hazard from any family in Table 4 and 𝜷j is a component-specific regression coefficient vector. The likelihood expressions of Section 5 remain valid; only the functional form of hj changes.

Remark 8 (Nested models within a family).

Several families in Table 4 admit natural hierarchies of nested sub-models. For instance, the Weibull family contains a common-shape reduction (m+1 parameters) in which the system lifetime is itself Weibull, and a further exponential specialization (m parameters) with fully analytical inference. These nestings enable formal model selection via likelihood ratio tests, AIC, or BIC. A detailed treatment—including simulation studies quantifying when a reduced model is appropriate—is given in Towell (2025f).

8 Discussion

8.1 What the Framework Enables

The hazard-function-based likelihood framework developed in this paper provides a foundation for a family of distribution-specific companion papers. Each companion paper can focus on a specific parametric family—for example, Weibull (Towell, 2025e) or Exponential (Towell, 2025d)—deriving closed-form score equations and Fisher information matrices, conducting simulation studies to assess MLE performance under varying masking and censoring scenarios, and developing specialized software packages, all while citing the present work for the general theory. The layered software stack described in Section 8.4—from component specification (dfr.dist) through series composition (dfr.dist.series) to masked-data likelihood (dfr.lik.series.md)—demonstrates this modularity: new component distributions inherit the full estimation pipeline without distribution-specific likelihood code.

8.2 Relaxation of Conditions

The three conditions (C1–C2–C3) provide a clean mathematical framework, but practitioners may encounter situations where one or more conditions are violated. We briefly sketch what happens in each case:

  • Relaxing C1 (candidate set may not contain the true cause): The summation in the likelihood cannot be restricted to ci; the full component set must be considered, along with a model for the probability that the true cause is excluded from the candidate set. This introduces additional nuisance parameters.

  • Relaxing C2 (asymmetric masking): The masking probabilities Pr{𝒞i=ciTi=ti,Ki=j} remain inside the summation and couple with the component hazards. The MLE depends on the relative masking probabilities, which must be estimated or modeled.

  • Relaxing C3 (masking depends on 𝜽): The factor βi cannot be dropped from the likelihood, and the MLE must account for the dependence of the masking mechanism on the lifetime parameters. This leads to a more complex joint estimation problem.

Detailed treatment of these relaxations is beyond the scope of this paper and is deferred to future work.

8.3 Computational Considerations

Several practical issues arise when applying the framework:

  • Local optima. The log-likelihood surface may be multimodal, particularly under heavy masking or censoring. Multiple random starting points for the numerical optimizer are recommended.

  • Convergence. Failure to converge within a reasonable number of iterations may indicate identifiability issues for the given data set. Such cases should be flagged rather than silently discarded.

  • Boundary constraints. Many lifetime distributions have positivity constraints on parameters. Constrained optimization methods such as L-BFGS-B (Byrd et al., 1995) or reparameterization (e.g., optimizing over log-scale parameters) can enforce these constraints.

8.4 Software Ecosystem

The framework developed in this paper is implemented as a layered software stack in the R statistical computing environment (Towell, 2025a, b, c). At the base, the dfr.dist package (Towell, 2025a) provides a hazard-function-first abstraction for individual component lifetime distributions: each distribution is specified by its hazard function, from which the cumulative hazard, reliability, density, and random sampling follow (cf. Equations (3)–(5)). The dfr.dist.series package (Towell, 2025b) composes components into series system distributions using hazard additivity (Theorem 3), with a parameter layout that maps the global vector 𝜽 to component-specific subvectors 𝜽j. The dfr.lik.series.md package (Towell, 2025c) implements the C1–C2–C3 log-likelihood (Theorem 11) for all four observation types (exact, right-censored, left-censored, and interval-censored), taking arbitrary component hazard closures as input. Together these packages enable practitioners to apply the recipe of Section 6.3 with any component distribution in the dfr.dist ecosystem, without writing distribution-specific likelihood code.

For Weibull component lifetimes specifically, the wei.series.md.c1.c2.c3 package (Towell, 2023c) provides closed-form score vectors and Fisher information, along with bootstrap confidence interval construction (Towell, 2023a).

9 Conclusion

We have developed a general likelihood framework, expressed in terms of component hazard functions, for estimating component reliability from masked series system data. The framework rests on three conditions (C1–C2–C3) that capture natural properties of diagnostic procedures and allow the unknown masking distribution to be eliminated from the likelihood.

The key results are:

  • The joint distribution of the system lifetime, component cause of failure, and candidate set (Section 5.1);

  • The derivation showing how each condition progressively simplifies the likelihood (Sections 5.2 through 5.4);

  • The combined likelihood contribution under C1–C2–C3 (Theorem 9);

  • The general log-likelihood and a recipe for applying the framework to any parametric hazard specification (Section 6);

  • Hazard function specifications for five common families (Table 4).

This framework provides a rigorous foundation for distribution-specific companion papers that can focus on deriving score equations, conducting simulation studies, and developing specialized inference tools for particular lifetime distribution families.

References

  • M. Agustin (2011) Systems in series. In Wiley Encyclopedia of Operations Research and Management Science, External Links: ISBN 9780470400531, Document, Link Cited by: §1.
  • L.J. Bain and M. Engelhardt (1992) Introduction to probability and mathematical statistics. second edition, Duxbury Press. External Links: ISBN 9780534380205 Cited by: §6.
  • R. H. Byrd, P. Lu, J. Nocedal, and C. Zhu (1995) A limited memory algorithm for bound constrained optimization. SIAM Journal on Scientific Computing 16 (5), pp. 1190–1208. Cited by: item 4, §6.1, 3rd item.
  • G. Casella and R. L. Berger (2002) Statistical inference. Duxbury Advanced Series. Cited by: §6.2, §6.
  • B. Efron (1987) Better bootstrap confidence intervals. Journal of the American Statistical Association 82 (397), pp. 171–185. Cited by: §6.2.
  • B. Efron and R. J. Tibshirani (1994) An introduction to the bootstrap. CRC press. Cited by: §6.2.
  • F. M. Guess, T. J. Hodgson, and J. S. Usher (1991) Estimating system and component reliabilities under partial information on cause of failure. Journal of Statistical Planning and Inference 29, pp. 75–85. External Links: Document Cited by: §1.1, §5.5.
  • J. P. Klein and M. L. Moeschberger (2005) Survival analysis: techniques for censored and truncated data. Springer Science & Business Media. Cited by: §4.1.
  • E. L. Lehmann and G. Casella (1998) Theory of point estimation. Springer Science & Business Media. Cited by: §6.2.
  • R. J. A. Little and D. B. Rubin (2002) Statistical analysis with missing data. second edition, Wiley-Interscience, Hoboken, NJ. Cited by: §5.4.
  • M. Miyakawa (1984) Analysis of incomplete data in competing risks model. IEEE Transactions on Reliability R-33 (4), pp. 293–296. Cited by: §1.1, §5.
  • J. Nocedal and S. Wright (2006) Numerical optimization. Springer. Cited by: §6.1.
  • A. M. Sarhan (2001) Reliability estimations of components from masked system life data. Reliability Engineering & System Safety 74 (1), pp. 107–113. External Links: Document Cited by: §1.1.
  • A. Towell (2023a) Algebraic maximum likelihood estimators. Note: R package version 0.9.0. Available: https://github.com/queelius/algebraic.mle/ External Links: Link Cited by: §8.4.
  • A. Towell (2023b) Reliability estimation in series systems: maximum likelihood techniques for right-censored and masked failure data. Master’s project, Southern Illinois University Edwardsville. External Links: Document, Link Cited by: §1.
  • A. Towell (2023c) Wei.series.md.c1.c2.c3: estimating reliability of weibull components in series from masked data. Note: R package version 0.9.0 External Links: Document, Link Cited by: §8.4.
  • A. Towell (2025a) Dfr.dist: distribution-free reliability distributions. Note: R package. Available: https://github.com/queelius/dfr.dist External Links: Link Cited by: §8.4.
  • A. Towell (2025b) Dfr.dist.series: series system distributions from dynamic failure rate components. Note: R package version 0.1.0 External Links: Link Cited by: §8.4.
  • A. Towell (2025c) Dfr.lik.series.md: masked-cause likelihood models for series systems. Note: R package version 0.1.0 External Links: Link Cited by: §8.4.
  • A. Towell (2025d) Exponential series systems with masked failure causes: closed-form MLE and simulation studies. Note: In preparation Cited by: §8.1.
  • A. Towell (2025e) Maximum likelihood estimation for weibull series systems with masked failure causes. Note: In preparation Cited by: §8.1.
  • A. Towell (2025f) Model selection for reliability estimation in series systems with masked failure causes. Note: In preparation Cited by: Remark 8.
  • A. Tsiatis (1975) A nonidentifiability aspect of the problem of competing risks. Proceedings of the National Academy of Sciences 72 (1), pp. 20–22. Cited by: §5.8, Remark 1.
  • J.S. Usher and T.J. Hodgson (1988) Maximum likelihood analysis of component reliability using masked system life-test data. IEEE Transactions on Reliability 37 (5), pp. 550–555. External Links: Document Cited by: §1.1, §5.
  • J.S. Usher, D.K.J. Lin, and F.M. Guess (1993) Exact maximum likelihood estimation using masked system data. IEEE Transactions on Reliability 42 (4), pp. 631–635. External Links: Document Cited by: §1.1.