Searched for: author%3A%22Boucherie%2C+R.J.%22
(1 - 16 of 16)
document
Laan, C.M. (author), Timmer, J. (author), Boucherie, R.J. (author)
This paper introduces non-cooperative games on a network of single server queues with fixed routes.Aplayer has a set of routes available and has to decide which route(s) to use for its customers. Each player’s goal is to minimize the expected sojourn time of its customers. We consider two cases: a continuous strategy space, where each player is...
article 2021
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author), Timmer, J. (author)
In this paper, we introduce partially observable agent-intruder games (POAIGs). These games model dynamic search games on graphs between security forces (an agent) and an intruder given possible (border) entry points and high value assets that require protection. The agent faces situations with dynamically changing, partially observable...
article 2019
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author), Noordkamp, W. (author)
In this paper, we consider the optimal deployment of multiple assets in anti-submarine warfare (ASW) operations with time-dependent strategies. We model this as a zero-sum game that takes place over a finite time horizon. An agent, representing multiple assets, in an ASW operation, decides on the allocation of these assets (e.g., one or more...
article 2019
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
In this chapter we consider a security game between an agent and an intruder to find optimal strategies for patrolling against illegal fishery. When patrolling large areas that consist of multiple cells, several aspects have to be taken into account. First, the current risk of the cells has to be considered such that cells with high risk are...
bookPart 2018
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Laan, C.M. (author), Barros, A.I. (author), Boucherie, R.J. (author), Monsuur, H. (author)
This paper considers a special case of security games dealing with the protection of a large area divided in multiple cells for a given planning period. An intruder decides on which cell to attack and an agent selects a patrol route visiting multiple cells from a finite set of patrol routes such that some given operational conditions on the...
conference paper 2017
document
Laan, C.M. (author), van der Mijden, T. (author), Martins Botto de Barros, A.I. (author), Boucherie, R.J. (author)
article 2017
document
Coenen, T. (author), van den Berg, J.L. (author), Boucherie, R.J. (author), de Graaf, M. (author), Hanbali, A.A. (author)
This paper considers a class of queueing network models where nodes have to contend with each other to serve their customers. In each time slot, a node with a non-empty queue either serves a customer or is blocked by a node in its vicinity. The focus of our study is on analyzing the throughput and identifying bottleneck nodes in such networks....
article 2013
document
Litjens, R. (author), van den Berg, J.L. (author), Boucherie, R.J. (author), TNO Informatie- en Communicatietechnologie (author)
We present an analytical study of throughput measures in processor sharing queuing systems with randomly varying service rates, modelling e.g. a communication link in an integrated services network carrying prioritised fixed rate stream traffic and rate-adaptive elastic traffic. A number of distinct throughput measures for the elastic traffic...
article 2008
document
Coenen, T.J.M. (author), van den Berg, J.L. (author), Boucherie, R.J. (author)
This paper investigates a polling system with a random polling scheme, a 1-limited service discipline and deterministic service requirement modeling WLANs with QoS differentation capability. The system contains high and low priority queues that are distinguished via the probability of being served next. We propose a new iteration algorithm to...
conference paper 2008
document
Litjens, R. (author), Boucherie, R.J. (author), TNO Informatie- en Communicatietechnologie (author), ICT (author)
We develop and analyse a generic model for performance evaluation, parameter optimisation and dimensioning of a bottleneck link in an integrated services communications network. Possible application areas include ip, atm and gsm/gprs networks. The model enables analytical evaluation for a scenario of integrated speech, video and data services,...
conference paper 2007
document
Cheung, S.K. (author), van den Berg, J.L. (author), Boucherie, R.J. (author), TNO Informatie- en Communicatietechnologie (author)
This paper studies the M/G/1 processor-sharing (PS) queue, in particular the sojourn time distribution conditioned on the initial job size. Although several expressions for the Laplace-Stieltjes transform (LST) are known, these expressions are not suitable for computational purposes. This paper derives readily applicable insensitive bounds for...
article 2006
document
Cheung, S.-K. (author), van den Berg, H. (author), Boucherie, R.J. (author), TNO Informatie- en Communicatietechnologie (author)
We obtain a decomposition result for the steady state queue length distribution in egalitarian processor-sharing (PS) models. In particular, for multi-class egalitarian PS queues, we show that the marginal queue length distribution for each class equals the queue length distribution of an equivalent single class PS model with a random number of...
article 2005
document
Endrayanto, A.I. (author), van Berg, H.D. (author), Boucherie, R.J. (author)
This paper models and analyzes downlink and uplink power assignment in code division multiple access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a closed-form analytical expression of the so...
article 2005
document
Litjens, R. (author), Roijers, F. (author), van den Berg, H. (author), Boucherie, R.J. (author), Fleuren, M. (author)
In this paper we present an integrated packet/flow level modelling approach for analysing flow throughputs and transfer times in IEEE 802.11 WLANS. It captures the statistical characteristics of the transmission of individual packets at the MAC layer and takes into account the system dynamics due to the initiation and completion of data flow...
article 2004
document
Litjens, R. (author), Boucherie, R.J. (author)
An extensive performance evaluation is presented for a segregated and a hybrid radio resource sharing scheme in an integrated GSM/GPRS network, with a finite queue for data calls that cannot be served immediately upon arrival. Markov chain analysis is used to derive simple performance measures such as the blocking probabilities, expected channel...
conference paper 2000
Searched for: author%3A%22Boucherie%2C+R.J.%22
(1 - 16 of 16)