31 results on '"J. W. Bosman"'
Search Results
2. Efficient traffic splitting in parallel TCP-based wireless networks: Modelling and experimental evaluation.
- Author
-
Geert Jan Hoekstra, Robert D. van der Mei, and J. W. Bosman
- Published
- 2013
- Full Text
- View/download PDF
3. A fluid model analysis of streaming media in the presence of time-varying bandwidth.
- Author
-
J. W. Bosman, Robert D. van der Mei, and Rudesindo Núñez-Queija
- Published
- 2012
4. Dynamic Profit Optimization of Composite Web Services with SLAs.
- Author
-
Miroslav Zivkovic, J. W. Bosman, J. L. van den Berg, Robert D. van der Mei, Hendrik B. Meeuwissen, and R. Núñez Queija
- Published
- 2011
- Full Text
- View/download PDF
5. On Comparing the Performance of Dynamic Multi-Network Optimizations.
- Author
-
Geert Jan Hoekstra, Robert D. van der Mei, and J. W. Bosman
- Published
- 2010
- Full Text
- View/download PDF
6. A spectral theory approach for extreme value analysis in a tandem of fluid queues.
- Author
-
J. W. Bosman and R. Núñez Queija
- Published
- 2014
- Full Text
- View/download PDF
7. A simple index rule for efficient traffic splitting over parallel wireless networks with partial information.
- Author
-
J. W. Bosman, Geert Jan Hoekstra, Robert D. van der Mei, and Sandjai Bhulai
- Published
- 2013
- Full Text
- View/download PDF
8. Stochastic optimal control for a general class of dynamic resource allocation problems.
- Author
-
Xuefeng Gao, Yingdong Lu, Mayank Sharma, Mark S. Squillante, and J. W. Bosman
- Published
- 2013
- Full Text
- View/download PDF
9. Dynamic traffic splitting to parallel wireless networks with partial information: A Bayesian approach.
- Author
-
Sandjai Bhulai, Geert Jan Hoekstra, J. W. Bosman, and Robert D. van der Mei
- Published
- 2012
- Full Text
- View/download PDF
10. Rewards, costs and flexibility in dynamic resource allocation: a stochastic optimal control approach.
- Author
-
Xuefeng Gao, Yingdong Lu, Mayank Sharma, Mark S. Squillante, and J. W. Bosman
- Published
- 2013
- Full Text
- View/download PDF
11. Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks
- Author
-
András Gazdag, Gergely Biczók, J. W. Bosman, and Irina Chiscop
- Subjects
FOS: Computer and information sciences ,Focus (computing) ,Computer Science - Cryptography and Security ,Computer Science - Artificial Intelligence ,business.industry ,Computer science ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Intrusion detection system ,Performance results ,CAN bus ,Range (mathematics) ,Task (computing) ,Artificial Intelligence (cs.AI) ,Unsupervised learning ,False positive rate ,business ,Cryptography and Security (cs.CR) ,Computer network - Abstract
Multiple attacks have shown that in-vehicle networks have vulnerabilities which can be exploited. Securing the Controller Area Network (CAN) for modern vehicles has become a necessary task for car manufacturers. Some attacks inject potentially large amount of fake messages into the CAN network; however, such attacks are relatively easy to detect. In more sophisticated attacks, the original messages are modified, making the detection a more complex problem. In this paper, we present a novel machine learning based intrusion detection method for CAN networks. We focus on detecting message modification attacks, which do not change the timing patterns of communications. Our proposed temporal convolutional network-based solution can learn the normal behavior of CAN signals and differentiate them from malicious ones. The method is evaluated on multiple CAN-bus message IDs from two public datasets including different types of attacks. Performance results show that our lightweight approach compares favorably to the state-of-the-art unsupervised learning approach, achieving similar or better accuracy for a wide range of scenarios with a significantly lower false positive rate.
- Published
- 2021
- Full Text
- View/download PDF
12. Deriving Explicit Control Policies for Markov Decision Processes Using Symbolic Regression
- Author
-
Sandjai Bhulai, J. W. Bosman, R.D. van der Mei, A. Hristov, Mathematics, and Network Institute
- Subjects
0301 basic medicine ,Mathematical optimization ,SDG 16 - Peace ,Computer science ,Control (management) ,Symbolic regression ,01 natural sciences ,Closed-form approximation ,010104 statistics & probability ,03 medical and health sciences ,Sensitivity (control systems) ,0101 mathematics ,Threshold-Type policy ,SDG 16 - Peace, Justice and Strong Institutions ,Contrast (statistics) ,Threshold-type policy ,Expression (computer science) ,Genetic program ,Optimal control ,Justice and Strong Institutions ,030104 developmental biology ,Markov Decision Processes ,Markov decision process - Abstract
In this paper, we introduce a novel approach to optimizing the control of systems that can be modeled as Markov decision processes (MDPs) with a threshold-based optimal policy. Our method is based on a specific type of genetic program known as symbolic regression (SR). We present how the performance of this program can be greatly improved by taking into account the corresponding MDP framework in which we apply it. The proposed method has two main advantages: (1) it results in near-optimal decision policies, and (2) in contrast to other algorithms, it generates closed-form approximations. Obtaining an explicit expression for the decision policy gives the opportunity to conduct sensitivity analysis, and allows instant calculation of a new threshold function for any change in the parameters. We emphasize that the introduced technique is highly general and applicable to MDPs that have a threshold-based policy. Extensive experimentation demonstrates the usefulness of the method.
- Published
- 2020
- Full Text
- View/download PDF
13. Control of a tandem queue with a startup cost for the second server
- Author
-
R.D. van der Mei, Sandjai Bhulai, A. Hristov, J. W. Bosman, Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands, and Mathematics
- Subjects
Statistics and Probability ,SDG 16 - Peace ,Distributed computing ,0211 other engineering and technologies ,02 engineering and technology ,01 natural sciences ,010104 statistics & probability ,optimal control ,MDP ,Server ,0101 mathematics ,Queue ,Mathematics ,Queueing theory ,021103 operations research ,Applied Mathematics ,SDG 16 - Peace, Justice and Strong Institutions ,Holding cost ,startup costs ,Approximation algorithm ,Optimal control ,tandem queue ,Justice and Strong Institutions ,Range (mathematics) ,Modeling and Simulation ,Optimal decision - Abstract
Various systems across a broad range of applications contain tandem queues. Strong dependence between the servers has proven to make such networks complicated and difficult to study. Exact analysis is rarely computationally tractable and sometimes not even possible. Nevertheless, as it is most often the case in reality, there are costs associated with running such systems, and therefore, optimizing the control of tandem queues is of main interest from both a theoretical and a practical point of view. Motivated by this, the present paper considers a tandem queueing network with linear holding costs and a startup cost for the second server. In our work, we present a rather intuitive, easy to understand, and at the same time very accurate technique to approximate the optimal decision policy. Extensive numerical experimentation shows that the approximation works extremely well for a wide range of parameter combinations.
- Published
- 2018
- Full Text
- View/download PDF
14. Spatio-Temporal Clustering of Time-Dependent Origin-Destination Electronic Trace Data
- Author
-
J. W. Bosman, Daphne van Leeuwen, Elenna R. Dugundji, Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands, and Mathematics
- Subjects
Modularity (networks) ,Travel behavior ,Computer science ,GPS traces ,Screen-lines ,computer.software_genre ,01 natural sciences ,Clustering ,010305 fluids & plasmas ,Set (abstract data type) ,OD-matrices ,0103 physical sciences ,Cluster (physics) ,General Earth and Planetary Sciences ,Data mining ,010306 general physics ,Cluster analysis ,computer ,Modularity optimization ,General Environmental Science ,Volume (compression) ,TRACE (psycholinguistics) - Abstract
In this study we identify spatial regions based on an empirical data set consisting of time-dependent origin-destination (OD) pairs. This OD data consists of electronic traces collected from smart phone data by Google in the Amsterdam metropolitan region and is aggregated by the volume of trips per hour at neighborhood level. In this study we cluster the pairs by space and time to gain insight in both aspects regarding travel characteristics. We show that spatially connected clusters appear when we use a performance metric called modularity on the OD data when directionality is incorporated.
- Published
- 2018
- Full Text
- View/download PDF
15. THROUGHPUT AND BOTTLENECK ANALYSIS OF TANDEM QUEUES WITH NESTED SESSIONS
- Author
-
J. W. Bosman, Sandjai Bhulai, R.D. van der Mei, A. Hristov, and Mathematics
- Subjects
Statistics and Probability ,Limiting factor ,Computer science ,Distributed computing ,02 engineering and technology ,Management Science and Operations Research ,01 natural sciences ,Industrial and Manufacturing Engineering ,Bottleneck ,010104 statistics & probability ,Server ,bottleneck identification ,0202 electrical engineering, electronic engineering, information engineering ,Layered queueing network ,SDG 7 - Affordable and Clean Energy ,performance analysis ,0101 mathematics ,Throughput (business) ,Queue ,throughput ,020207 software engineering ,layered queueing network ,tandem queue ,Identification (information) ,Range (mathematics) ,nested sessions ,Statistics, Probability and Uncertainty - Abstract
Various types of systems across a broad range of disciplines contain tandem queues with nested sessions. Strong dependence between the servers has proved to make such networks complicated and difficult to study. Exact analysis is in most of the cases intractable. Moreover, even when performance metrics such as the saturation throughput and the utilization rates of the servers are known, determining the limiting factor of such a network can be far from trivial. In our work, we present a simple, tractable and nevertheless relatively accurate method for approximating the above mentioned performance measurements for any server in a given network. In addition, we propose an extension to the intuitive “slowest server rule” for identification of the bottleneck, and show through extensive numerical experiments that this method works very well.
- Published
- 2017
- Full Text
- View/download PDF
16. Network partitioning on time-dependent origin-destination electronic trace data
- Author
-
Daphne van Leeuwen, J. W. Bosman, Elenna R. Dugundji, Mathematics, and Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands
- Subjects
Empirical data ,Origin destination ,Social connectedness ,Computer science ,Mobile computing ,02 engineering and technology ,Management Science and Operations Research ,computer.software_genre ,Neighbourhood level ,Supporting policies ,020204 information systems ,Ensemble learning ,0202 electrical engineering, electronic engineering, information engineering ,Community detection ,Computer Applications ,020206 networking & telecommunications ,Partition (database) ,Network partitioning ,Computer Science Applications ,Hardware and Architecture ,Performance metrices ,Data mining ,Optimisation method ,Computer applications ,Performance metric ,computer ,Metropolitan regions - Abstract
In this study, we identify spatial regions based on an empirical data set consisting of time-dependent origin-destination (OD) pairs. These OD pairs consist of electronic traces collected from smartphone data by Google in the Amsterdam metropolitan region and is aggregated by the volume of trips per hour at neighbourhood level. By means of community detection, we examine the structure of this empirical data set in terms of connectedness. We show that we can distinguish spatially connected regions when we use a performance metric called modularity and the trip directionality is incorporated. From this, we proceed to analyse variations in the partitions that arise due to the non-optimal greedy optimisation method. We use a method known as ensemble learning to combine these variations by means of the overlap in community partitions. Ultimately, the combined partition leads to a more consistent result when evaluated again, compared to the individual partitions. Analysis of the partitions gives insights with respect to connectivity and spatial travel patterns, thereby supporting policy makers in their decisions for future infra structural adjustments. © 2019, The Author(s).
- Published
- 2019
- Full Text
- View/download PDF
17. Dynamic priority assignment for SLA compliance in service function chains
- Author
-
Hans van den Berg, Frank Wetzels, Rob van der Mei, and J. W. Bosman
- Subjects
Operations research ,Computer science ,Service function chain resource allocation ,Telecommunications service ,Telecommunication services ,Priority allocation ,Service functions ,Software defined networking ,Service-level agreement ,Transfer functions ,0502 economics and business ,SLA violation duration ,Dynamic priority assignment ,Resource allocation ,Service (business) ,Priority scheduling ,Service Level Agreements ,05 social sciences ,050209 industrial relations ,Decision tables ,Performance metrics ,Service level ,Chaining ,Decision table ,Software-defined networking ,050203 business & management - Abstract
In service function chaining, data flows from a particular application or user travel along a pre-defined sequence of network functions. Appropriate service function chaining resource allocation is required to comply with the service level required by the application. In this paper, we introduce a dynamic priority assignment for flows that compete for service using a particular network function in a chain. Using the recent results of the performance metrics of transient birth-death processes, we analyse this priority assignment and develop an optimal strategy for selecting a (cheap) low-or (expensive) high-priority service, given the flow's service level agreement requirements. A decision table can, thus, be created to facilitate the fast, online priority scheduling of newly arriving flows requesting service. © 2019 IEEE.
- Published
- 2019
- Full Text
- View/download PDF
18. Poster: optimal dispatching policies for parallel processor sharing nodes with partial information.
- Author
-
J. W. Bosman, Rob van der Mei, and Gerard Hoekstra
- Published
- 2011
- Full Text
- View/download PDF
19. Traffic management for cloud federation
- Author
-
Steven Latre, J. W. Bosman, Attila Kertesz, Gerhard Hasslinger, Patrick Poullie, Tamas Pflanzner, Hans van den Berg, Bart Spinnewyn, Burkhard Stiller, Maciej Sosnowski, Andrzej Beben, Rob van der Mei, Wojciech Burakowski, and Centrum Wiskunde & Informatica, Amsterdam (CWI), The Netherlands
- Subjects
Service (systems architecture) ,Cloud resources ,Standardization ,Service composition ,Computer science ,business.industry ,Traffic management ,Quality of service ,Cloud federation ,Task (project management) ,Multi-layer model ,Orchestration (computing) ,Service provision ,Software engineering ,business - Abstract
The chapter summarizes activities of COST IC1304 ACROSS European Project corresponding to traffic management for Cloud Federation (CF). In particular, we provide a survey of CF architectures and standardization activities. We present comprehensive multi-level model for traffic management in CF that consists of five levels: Level 5 - Strategies for building CF, Level 4 - Network for CF, Level 3 - Service specification and provision, Level 2 - Service composition and orchestration, and Level 1 - Task service in cloud resources. For each level we propose specific methods and algorithms. The effectiveness of these solutions were verified by simulation and analytical methods. Finally, we also describe specialized simulator for testing CF solution in IoT environment.
- Published
- 2018
- Full Text
- View/download PDF
20. Flow termination signaling in the centralized pre-congestion notification architecture
- Author
-
J. W. Bosman, Frank Wetzels, Rob van der Mei, Hans van den Berg, Design and Analysis of Communication Systems, and Mathematics
- Subjects
Decentralized architecture ,Computer Networks and Communications ,Computer science ,Inelastic traffic ,NI - Nano Instrumentation ,2015 Nano Technology ,02 engineering and technology ,Adaptive systems ,Flow termination ,Feedback ,Software defined networking ,0202 electrical engineering, electronic engineering, information engineering ,Information exchanges ,Centralized decision ,Architecture ,Network architecture ,TS - Technical Sciences ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Admission control ,22/4 OA procedure ,Point pre-congestion notification ,Signaling ,Pre congestion notification ,Flow (mathematics) ,Extensive simulations ,Centralized architecture ,020201 artificial intelligence & image processing ,business ,Software-defined networking ,Computer network - Abstract
Pre-congestion notification (PCN) protects inelastic traffic by using feedback on network link loads on and acting upon this accordingly. These actions comprise to admission control and termination of flows. Two PCN architectures have been defined by IETF: the centralized and decentralized PCN architecture. The decentralized PCN architecture has received much attention in the literature whereas the centralized PCN architecture has not. In the decentralized architecture, feedback is sent from the egress nodes to ingress nodes, which then take and apply decisions regarding admission of new flows and/or termination of ongoing flows. Signaling occurs only between ingress and egress nodes. In the centralized architecture these decisions are made at a central node, which requires proper signaling for action and information exchange between the central node and the egress and ingress nodes. This signaling has been suggested by other authors, but is not fully defined yet. Our contribution is twofold. We define signaling in the centralized PCN architecture focussing on flow termination, which completes the definition of the signaling in the centralized PCN architecture. Secondly, we run extensive simulations showing that the proposed signaling works well and that the performances of the centralized PCN and the decentralized PCN architectures are similar. Hence, it is expected that results from existing research on the effectiveness of decentralized PCN are also valid when the centralized PCN architecture is used. © 2017 Elsevier B.V.
- Published
- 2017
- Full Text
- View/download PDF
21. On the probability of current and temperature overloading in power grids
- Author
-
J. W. Bosman, Bert Zwart, Jayakrishnan Nair, and Stochastics
- Subjects
Mathematical optimization ,Computer Networks and Communications ,Computer science ,business.industry ,Probabilistic logic ,Power (physics) ,Renewable energy ,Reliability (semiconductor) ,Hardware and Architecture ,Line (geometry) ,Large deviations theory ,Current (fluid) ,business ,Software ,Voltage - Abstract
The advent of renewable energy sources has huge implications for the design and control of power grids. On the engineering side, reliability is currently ensured by strict con- straints on current, voltage and temperature. However, with growing supply-side uncertainty induced by renewables, these will need to be replaced by probabilistic guarantees, allowing constraints on a given line to be violated with a low probability, e.g., several minutes per year. In the present note we illustrate, using large deviations techniques, how replacing (probabilistic) current constraints by temperature constraints can lead to capacity gains in power grids.
- Published
- 2014
- Full Text
- View/download PDF
22. Rewards, costs and flexibility in dynamic resource allocation
- Author
-
Mayank Sharma, Yingdong Lu, J. W. Bosman, Mark S. Squillante, Xuefeng Gao, and Stochastics
- Subjects
Stochastic control ,Flexibility (engineering) ,Mathematical optimization ,Optimization problem ,Smart grid ,Resource (project management) ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Resource allocation ,Time horizon ,Resource management ,Software - Abstract
Various canonical forms of general resource allocation problemsarise naturally across a broad spectrum of computer systems andcommunication networks. As the complexities of these systemsand networks continue to grow, together with ubiquitous advancesin technology, new approaches and methods are required to effec-tively and efficiently solve these problems. Such environments of-ten consist of different types of resources that are allocated in com-bination to serve demand whose behavior over time is characterizedby different types of uncertainty and variability. Each type of re-source has a different reward and cost structure that ranges from thebest of a set of primary resource allocation options, having the high-est reward, highest cost and highest net-benefit, to a secondary re-source allocation option, having the lowest reward, lowest cost andlowest net-benefit. Each type of resource also has different struc-tures for the flexibility and cost of making changes to the allocationcapacity. The resource management optimization problem we con-sider consists of adaptively determining the primary and secondaryresource allocation capacities that serve the uncertain demand andthat maximize the expected net-benefit over a time horizon of in-terest based on the foregoing reward, cost and flexibility structuralproperties of the different types of resources.The general class of resource allocation problems studied in thispaper arises in a wide variety of application domains such as cloudcomputing and data center environments, computer and communi-cation networks, and energy-aware and smart power grid environ-ments, among many others. Across these and many other domain-specific resource allocation problems, there is a common need forthe dynamic adjustment of allocations among multiple types of re-sources, each with different structural properties, to satisfy time-varying and uncertain demand. Taking a financial mathematicsapproach that hedges against future risks associated with resourceallocation decisions and uncertain demand, we consider the under-lying fundamental stochastic optimal control problem where thedynamic control policy that allocates primary resource capacitiesto serve uncertain demand is a variational stochastic process withconditions on its derivative, which in turn determines the secondaryresource allocation capacity. The objective is to maximize the ex-pected discounted net-benefit over time based on the structural prop
- Published
- 2014
- Full Text
- View/download PDF
23. Osteopontin is up-regulated and associated with neutrophil and macrophage infiltration in glioblastoma
- Author
-
Jaro Sodek, Wikky Tigchelaar, J. W. Bosman, Klazien S. Bosch, Philip C. De Witt Hamer, A. Jonker, Cornelis J.F. Van Noorden, Vincent Everts, Cheungh Lo, Dirk Troost, Manju Bansal, Nadia A. Atai, and Christopher A. McCulloch
- Subjects
Pathology ,medicine.medical_specialty ,biology ,Microarray analysis techniques ,Melanoma ,Immunology ,Cancer ,medicine.disease ,stomatognathic system ,Glioma ,Cancer cell ,medicine ,biology.protein ,Cancer research ,Immunology and Allergy ,Macrophage ,Osteopontin ,Ovarian cancer - Abstract
Osteopontin (OPN) is a glycophosphoprotein with multiple intracellular and extracellular functions. In vitro, OPN enhances migration of mouse neutrophils and macrophages. In cancer, extracellular OPN facilitates migration of cancer cells via its RGD sequence. The present study was designed to investigate whether osteopontin is responsible for neutrophil and macrophage infiltration in human cancer and in particular in glioblastoma. We found that in vitro mouse neutrophil migration was RGD-dependent. In silico, we found that the OPN gene was one of the 5% most highly expressed genes in 20 out of 35 cancer microarray data sets in comparison with normal tissue in at least 30% of cancer patients. In some types of cancer, such as ovarian cancer, lung cancer and melanoma, the OPN gene was one of those with the highest expression levels in at least 90% of cancer patients. In glioblastoma, the most invasive type of brain tumours/glioma, but not in lower grades of glioma it was one of the 5% highest expressed genes in 90% of patients. In situ, we found increased protein levels of OPN in human glioblastoma versus normal human brain confirming in silico results. OPN protein expression was co-localized with neutrophils and macrophages. In conclusion, OPN in tumours not only induces migration of cancer cells but also of leucocytes.
- Published
- 2010
- Full Text
- View/download PDF
24. Real-Time QoS Control for Service Orchestration
- Author
-
Rob van der Mei, Hans van den Berg, J. W. Bosman, Stochastics, and Directie
- Subjects
Process management ,METIS-316874 ,Computer science ,NTW - Networks ,media_common.quotation_subject ,Third parties ,EWI-26918 ,computer.software_genre ,Dynamic programming ,Learning and adaptation ,IR-100230 ,Quality of service ,Information system ,real-time service recompositions ,Service orchestration ,Quality (business) ,Service Quality ,Orchestration (computing) ,Information services ,Adaptation (computer science) ,media_common ,Web services ,Service (business) ,dynamic programming ,Service quality ,TS - Technical Sciences ,business.industry ,real-time QoS control mechanism ,complicating factor ,Price quality ,Third party services ,Real time service ,service quality requ ,Commercial viability ,ICT ,quality of service ,learning (artificial intelligence) ,dynamic service orchestration optimization ,Web service ,business ,computer ,Computer network - Abstract
Service orchestration has become the predominant paradigm that enables businesses to combine and integrate services offered by third parties. For the commercial viability of orchestrated services, it is crucial that they are offered at sharp price-quality ratios. A complicating factor is that many attractive third-party services often show highly variable service quality. This raises the need for mechanisms that promptly adapt the orchestration to changes in the quality delivered by third party services. In this paper, we propose a real-time QoS control mechanism that dynamically optimizes service orchestration in real time by learning and adapting to changes in third party service response time behaviors. Our approach combines the power of learning and adaptation with the power of dynamic programming. The results show that real-time service re-compositions lead to dramatic savings of cost, while meeting the service quality requirements of the end-users. The challenge here is to respond to significant response-time changes in a timely manner, while not wasting CPU cycles on unnecessary orchestration updates. Experimental results performed in a test-lab environment demonstrate that a few orchestration updates are sufficient to achieve this. © 2015 IEEE.
- Published
- 2015
25. Traffic splitting policies in parallel queues with concurrent access: a comparison
- Author
-
J. W. Bosman, Gerard Hoekstra, R.D. van der Mei, Directie, Stochastics, and Mathematics
- Subjects
wireless networks ,Focus (computing) ,Access network ,Wireless network ,Computer science ,business.industry ,Load modeling ,media_common.quotation_subject ,Distributed computing ,Context (language use) ,File transfer ,Quality (business) ,business ,Queue ,concurrent access ,performance ,media_common ,Computer network - Abstract
Surrounded by a multitude of wireless networks, users can nowadays experience significant performance improvements when smartly combining multiple networks concurrently (e.g., for transferring files). This phenomenon is called Concurrent Access (CA). Some users, which are referred to as foreground (FG) users, are able to access and utilize multiple networks simulateneously. The traffic streams from the FG users are optimized over multiple networks, in the presence of background (BG) users that can use only one network. In the literature a variety of traffic splitting algorithms have been proposed, with a focus on improving the performance of the FG users, whereas the influence of smart traffic splitting on the performance experienced by the BG users, as well as the resulting splitting ratios over the different networks, have received hardly attention. In this paper, we evaluate and compare the performance of these algorithms with respect to three quality metrics: (1) the file transfer performance of the FG traffic, (2) the file transfer performance of the BG traffic, and (3) the traffic splitting ratios, i.e. the fractions of traffic that is sent over each of the access networks. Our simulations based results provide a number of valuable insights in the pros and cons of the different job splitting and assignment algorithms.
- Published
- 2014
26. Efficient traffic splitting in parallel TCP-based wireless networks: Modelling and experimental evaluation
- Author
-
R.D. van der Mei, Gerard Hoekstra, and J. W. Bosman
- Subjects
TCP acceleration ,Wireless network ,Computer science ,business.industry ,Distributed computing ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,TCP tuning ,Throughput ,TCP global synchronization ,Benchmark (computing) ,Zeta-TCP ,Performance improvement ,business ,Computer network - Abstract
The concurrent use of networks provides a powerful means to boost performance in areas covered by multiple networks where only limited bandwidth is available. However, despite its enormous potential for performance improvement only little is known about how to effectively exploit the potential for performance improvement in practical deployments. This raises the need for traffic-splitting-and-reassembly algorithms that are effective, yet simple and easy-to-deploy. Motivated by this, we first propose a simple analytic flow-level model, called the Concurrent Access Network (CAN) model, that optimally splits traffic in the idealized situation where there is full state information at infinitely fine-grained time granularity, leading to zero synchronization delay during the reassembly phase. Next, we present a new splitting algorithm for TCP-based networks that uses a simple score function to make on-the-fly decisions on the routing of individual TCP segments, based on the measured per-connection RTT, transmission-buffer content and throughput. Then, we use the CAN-model as a benchmark to evaluate the effectiveness and practical usefulness of the score-function based algorithm on real TCP networks in a test-lab environment. Extensive lab experimentation demonstrates that this score-function based splitting of TCP traffic is extremely efficient, leads to close-to-optimal response-time performance and is easily deployable.
- Published
- 2013
- Full Text
- View/download PDF
27. Stochastic optimal control for a general class of dynamic resource allocation problems
- Author
-
J. W. Bosman, Xuefeng Gao, Mayank Sharma, Yingdong Lu, Mark S. Squillante, and Stochastics
- Subjects
Stochastic control ,Class (computer programming) ,Mathematical optimization ,Variable (computer science) ,Resource (project management) ,Computer Networks and Communications ,Hardware and Architecture ,Computer science ,Resource allocation ,Time horizon ,Optimal control ,Singular control ,Software - Abstract
We consider a general class of dynamic resource allocation problems within a stochastic optimal control framework. This class of problems arises in a wide variety of applications, each of which intrinsically involves resources of different types and demand with uncertainty and/or variability. The goal is to dynamically allocate capacity for every resource type in order to serve the uncertain/ variable demand and maximize the expected net-benefit over a time horizon of interest based on the rewards and costs associated with the different resources. We derive the optimal control policy within a singular control setting, which includes easily implementable algorithms for governing the dynamic adjustments to resource allocation capacities over time. Numerical experiments investigate various issues of both theoretical and practical interest, quantifying the significant benefits of our approach over alternative optimization approaches.
- Published
- 2013
28. Dynamic traffic splitting to parallel networks with partial information: a Bayesian approach
- Author
-
R.D. van der Mei, J. W. Bosman, Gerard Hoekstra, Sandjai Bhulai, Stochastics, Mathematics, and Network Institute
- Subjects
Processor sharing ,Boosting (machine learning) ,SDG 16 - Peace ,Computer Networks and Communications ,Wireless network ,Computer science ,computer.internet_protocol ,Distributed computing ,Real-time computing ,Testbed ,Bayesian probability ,SDG 16 - Peace, Justice and Strong Institutions ,Decision problem ,Bayesian inference ,Justice and Strong Institutions ,Hardware and Architecture ,Modeling and Simulation ,Wireless Application Protocol ,computer ,Software - Abstract
Contemporary wireless networks are based on a wide range of different technologies providing overlapping coverage. This offers users a seamless integration of connectivity by allowing to switch between networks, and opens up a promising area for boosting the performance of wireless networks. Motivated by this, we consider a networking environment in which users are able to select between the available wireless networks to minimize the mean processing times for file downloads in the presence of background traffic. The information available to the user is only the total number of jobs in each network, rather than the per-network numbers of foreground and background jobs. This leads to a complex partial information decision problem which is the focus of this paper. We develop and evaluate a Bayesian learning algorithm that optimally splits a stream of jobs that minimizes the expected sojourn time. The algorithm learns as the system operates and provides information at each decision and departure epoch. We evaluate the optimality of the partial information algorithm by comparing the performance of the algorithm with the "ideal" performance obtained by solving a Markov decision problem with full state information. To this end, we have conducted extensive experiments both numerically and in a simulation testbed with the full wireless protocol stack. The results show that the Bayesian algorithm has close to optimal performance over a wide range of parameter values. © 2011 Elsevier B.V. All rights reserved.
- Published
- 2012
- Full Text
- View/download PDF
29. Dynamic Profit Optimization of Composite Web Services with SLAs
- Author
-
R.D. van der Mei, J. W. Bosman, Rudesindo Núñez-Queija, Miroslav Zivkovic, Hendrik B. Meeuwissen, J.L. van den Berg, Stochastics (KDV, FNWI), and Operations Research
- Subjects
Communication & Information ,Informatics ,Dynamic Programming ,PNS - Performance of Networks & Services ,Profit (accounting) ,Operations research ,IR-82840 ,Computer science ,computer.internet_protocol ,Decision theory ,Information Society ,computer.software_genre ,EWI-21985 ,Vital ICT Infrastructure ,Service-level agreement ,Percentile Service Level Agreements ,Sequential Decision ,TS - Technical Sciences ,Service Oriented Architecture ,Service-oriented architecture ,Response Time ,Backward Recursion ,Dynamic programming ,Workflow ,Data mining ,Web service ,computer ,METIS-293165 - Abstract
In this paper we investigate sequential decision mechanisms for composite web services. After executing each sub-service within a sequential workflow, decisions are made whether to terminate or continue the execution of the workflow. These decisions are based on observed response times, expected rewards, and typical Service Level Agreement parameters such as costs, penalties, and agreed response–time objectives. We propose a model for the sequential decision–making process within which we explore a couple of decision algorithms. We benchmarked these algorithms against the profit made when executing the workflow without decision–making. We show that algorithm based on backward recursion principle of dynamic programming is optimal with respect to profit. Next, we analyse the structure of erroneous decisions for both algorithms and show that significant profit gains can be obtained by sequential decision making.
- Published
- 2011
- Full Text
- View/download PDF
30. Differential Activity of NADPH-Producing Dehydrogenases Renders Rodents Unsuitable Models to Study IDH1(R132) Mutation Effects in Human Glioblastoma
- Author
-
Nadja Schmidt, Denise Rijkeboer, Hrvoje Miletic, Philip C. De Witt Hamer, Wikky Tigchelaar, J. W. Bosman, Rolf Bjerkvig, Klazien S. Bosch, Nynke A. Renkema-Mills, Nadia A. Atai, A. Jonker, Dirk Troost, Cornelis J.F. Van Noorden, Fonnet E. Bleeker, Amsterdam Gastroenterology Endocrinology Metabolism, Cancer Center Amsterdam, Cell Biology and Histology, Amsterdam Neuroscience, Pathology, Neurosurgery, and CCA - Innovative therapy
- Subjects
Histology ,IDH1 ,Somatic cell ,Biology ,medicine.disease_cause ,Mice ,Rats, Nude ,Glioma ,medicine ,Animals ,Humans ,Thyroid cancer ,Mutation ,Brain Neoplasms ,Brain ,Cancer ,Myeloid leukemia ,Articles ,medicine.disease ,Molecular biology ,Isocitrate Dehydrogenase ,Rats ,Mice, Inbred C57BL ,Isocitrate dehydrogenase ,Models, Animal ,Anatomy ,Glioblastoma ,Oxidoreductases ,NADP - Abstract
The somatic IDH1R132 mutation in the isocitrate dehydrogenase 1 gene occurs in high frequency in glioma and in lower frequency in acute myeloid leukemia and thyroid cancer but not in other types of cancer. The mutation causes reduced NADPH production capacity in glioblastoma by 40% and is associated with prolonged patient survival. NADPH is a major reducing compound in cells that is essential for detoxification and may be involved in resistance of glioblastoma to treatment. IDH has never been considered important in NADPH production. Therefore, the authors investigated NADPH-producing dehydrogenases using in silico analysis of human cancer gene expression microarray data sets and metabolic mapping of human and rodent tissues to determine the role of IDH in total NADPH production. Expression of most NADPH-producing dehydrogenase genes was not elevated in 34 cancer data sets except for IDH1 in glioma and thyroid cancer, indicating an association with the IDH1 mutation. IDH activity was the main provider of NADPH in human normal brain and glioblastoma, but its role was modest in NADPH production in rodent brain and other tissues. It is concluded that rodents are a poor model to study consequences of the IDH1R132 mutation in glioblastoma.
- Published
- 2011
- Full Text
- View/download PDF
31. On comparing the performance of dynamic multi-network optimizations
- Author
-
R.D. van der Mei, Gerard Hoekstra, J. W. Bosman, and Mathematics
- Subjects
Dynamic network analysis ,Computer science ,business.industry ,Reliability (computer networking) ,Distributed computing ,Testbed ,Wireless lan ,Key (cryptography) ,Wireless ,business ,Network simulation ,Data transmission - Abstract
With a large variety of wireless access technologies available, multi-homed devices may strongly improve the performance and reliability of communication when using multiple networks simultaneously. A key question for the practical application of multi-path strategies is the granularity at which the traffic streams should be dispersed among the available networks. This level of granularity may be expected to have a major impact on both the efficiency and complexity of practical realizations. Motivated by this, we compare two dynamic strategies that operate at different levels of granularity. The first strategy, which we call network selection, requires little operational complexity and dynamically assigns an arriving application data transfer to the network that delivers the highest expected performance. Our second strategy, which we call traffic-splitting, is of higher complexity and aims to optimally split individual data transfers among the available networks. To this end, we (1) develop quantitative models that describe the performance of both strategies, (2) determine the (near-)optimal algorithms for both strategies, and (3) validate the efficiency and practical usefulness of the algorithms via extensive network simulations and experiments in a real-life testbed environment. These experimental results show that the optimal strategies obtained from the theoretical models lead to extremely well-performing solutions in practical circumstances. Moreover, the results show that the splitting of data transfers, which is easy to embed in the network requiring no information on the number of flows in the system, leads to a much better performance compared to dynamic network selection.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.