Searched for: author%3A%22Mandjes%2C+M.%22
(1 - 20 of 26)

Pages

document
Zhou, H. (author), Dorsman, J.L. (author), Mandjes, M. (author), Snelder, M. (author)
Nowadays, many cities are intending to reduce the use of private vehicles. Governments are incorporating new mobility services and are adapting their parking policies to promote a more sustainable mobility, as both stra tegies are believed to have the potential to reduce private vehicle use. To understand the effects of these stra tegies, one...
article 2023
document
Zhou, H. (author), Dorsman, J.L. (author), Mandjes, M. (author), Snelder, M. (author)
Activity-based travel demand models provide a high level of detail when modeling complex travel behavior. Since stochastic simulation is used, however, this high level may induce large random fluctuations in the output, necessitating many model reruns to produce reliable output. This may become prohibitive in terms of computation time when...
article 2023
document
Zhou, H. (author), Dorsman, J.L. (author), Mandjes, M. (author), Snelder, M. (author)
Nowadays, many cities are intending to reduce the use of private vehicles. Governments are incorporating new mobility services and are adapting their parking policies to promote a more sustainable mobility, as both strategies are believed to have the potential to reduce private vehicle use. To understand the effects of these strategies, one...
bookPart 2022
document
Zhou, H. (author), Dorsman, J.L. (author), Mandjes, M. (author), Snelder, M. (author)
Mobility as a Service (MaaS) and new mobility concepts mutually inspire each other, provide alternatives for the private car-oriented transport system as we know it, and will offer more mobility choices in a single journey than ever. This multitude of mobility choices however poses challenges in modeling the travelers’ mode choices in travel...
bookPart 2022
document
Zou, H. (author), Dorsman, J.L. (author), Mandjes, M. (author), Snelder, M. (author)
Activity-based travel demand modeling (ABM) provides a very high level of detail when modeling complex travel behavior of individuals. Since stochastic simulation is used, however, the high level of detail may induce a large random fluctuation in the output, necessitating (possibly) excessively many model reruns to produce reliable output. This...
conference paper 2022
document
Zhou, H. (author), Dorsman, J.L. (author), Snelder, M. (author), Mandjes, M. (author), de Romph, E. (author)
The rising Mobility as a Service (MaaS) concept integrates many new transport options for the travelling public, such as the use of public bikes and car-sharing services. As such, it offers more mobility combinations within a single journey than ever. To effectively handle the choice for such a mobility combination inside an activity-based...
conference paper 2020
document
Zhou, H. (author), Dorsman, J.L. (author), Snelder, M. (author), de Romph, E. (author), Mandjes, M. (author)
Activity-based travel demand models (ABMs) are gaining popularity in the field of traffic modeling because of their high level of detail compared to traditional travel demand models. Due to this, however, ABMs have high computational requirements, making ABMs hard to use for analysis and optimization purposes. We address this problem by relying...
conference paper 2019
document
Ellens, W. (author), Mandjes, M. (author), van den Berg, J.L. (author), Worm, D.T.H. (author), Błaszczuk, S. (author)
This paper deals with the problem of inferring short time-scale fluctuations of a system's behavior from periodic state measurements. In particular, we devise a novel, efficient procedure to compute four interesting performance metrics for a transient birth-death process on an interval of fixed length with given begin and end states: the...
article 2015
document
Ellens, W. (author), Mandjes, M. (author), Worm, D.T.H. (author), van den Berg, J.L. (author)
For effective capacity management in access networks, it is essential to have a good insight in the service quality perceived by the users. As users share the service capacity available, one would want to know how the achieved per-user throughput fluctuates over time. In this paper we present a novel method that assesses the per-user throughput...
conference paper 2014
document
Mata, F. (author), Zuraniewski, P.W. (author), Mandjes, M. (author), Mellia, M. (author)
In this paper we present methodological advances in anomaly detection tailored to discover abnormal traffic patterns under the presence of seasonal trends in data. In our setup we impose specific assumptions on the traffic type and nature; our study features VoIP call counts, for which several traces of real data has been used in this study, but...
article 2014
document
Zuraniewski, P.W. (author), Mandjes, M. (author), van den Berg, J.L. (author), Malhotra, R. (author)
In this paper we consider a multiple-priority buffered link, with a focus on resource allocation issues; our study was motivated by such issues in Carrier Ethernet, but the applicability of the results is by no means limited to this technology. In our model, the resource is shared by two priority classes. As the high-priority queue - intended...
bookPart 2013
document
Mandjes, M. (author), Zuraniewski, P.W. (author)
The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For the situation of exponential holding times an...
bookPart 2013
document
Ellens, W. (author), Zuraniewski, P.W. (author), Sperotto, A. (author), Schotanus, H.A. (author), Mandjes, M. (author), Meeuwissen, H.B. (author)
DNS tunnels allow circumventing access and security policies in firewalled networks. Such a security breach can be misused for activities like free web browsing, but also for command & control traffic or cyber espionage, thus motivating the search for effective automated DNS tunnel detection techniques. In this paper we develop such a technique,...
bookPart 2013
document
Callegari, C. (author), Coluccia, A. (author), D'alconzo, A. (author), Ellens, W. (author), Giordano, S. (author), Mandjes, M. (author), Pagano, M. (author), Pepe, T. (author), Ricciato, F. (author), Zuraniewski, P.W. (author)
In this Chapter we give an overview of statistical methods for anomaly detection (AD), thereby targeting an audience of practitioners with general knowledge of statistics. We focus on the applicability of the methods by stating and comparing the conditions in which they can be applied and by discussing the parameters that need to be set. © 2013...
bookPart 2013
document
Mata, F. (author), Zuraniewski, P.W. (author), Mandjes, M. (author), Mellia, M. (author)
In this paper we present methodological advances in anomaly detection, which, among other purposes, can be used to discover abnormal traffic patterns under the presence of deterministic trends in data, given that specific assumptions about the traffic type and nature are met. A performance study of the proposed methods, both if these assumptions...
conference paper 2012
document
Mandjes, M. (author), Zuraniewski, P.W. (author)
This paper considers the so-called M/G/∞ model: jobs arrive according to a Poisson process with rate λ, and each of them stays in the system during a random amount of time, distributed as a non-negative random variable B; throughout it is assumed that B is light-tailed. With N(t) denoting the number of jobs in the system, the random process A(t)...
article 2011
document
Roijers, F. (author), van den Berg, J.L. (author), Mandjes, M. (author), TNO Informatie- en communicatietechnologie (author)
In this paper we model and analyze a relay node in a wireless ad-hoc network; the capacity available at this node is used to both transmit traffic from the source nodes (towards the relay node), and to serve traffic at the relay node (so that it can be forwarded to successor nodes). Clearly, a network node that is used more heavily than others...
article 2010
document
Malhotra, R. (author), Mandjes, M. (author), Scheinhardt, W. (author), van den Berg, H. (author), TNO Informatie- en Communicatietechnologie (author)
Congestion control in packet-based networks is often realized by feedback protocols - in this paper we assess the performance under a back-pressure mechanism that has been proposed and standardized for Ethernet metropolitan networks. Relying on our earlier results for feedback fluid queues, we derive explicit expressions for the key performance...
article 2010
document
Mandjes, M. (author), Roijers, F. (author), TNO Informatie- en Communicatietechnologie (author)
The c-congestion period, defined as a time interval in which the number of customers is larger than c all the time, is a key quantity in the design of communication networks. Particularly in the setting of M/M/∞ systems, the analysis of the duration of the congestion period, D<sub>c</sub>, has attracted substantial attention; related quantities...
article 2009
document
Mandjes, M. (author), Roijers, F. (author), TNO Informatie- en Communicatietechnologie (author)
This paper studies a fluid queue with coupled input and output. Flows arrive according to a Poisson process, and when n flows are present, each of them transmits traffic into the queue at a rate c/(n+1), where the remaining c/(n+1) is used to serve the queue. We assume exponentially distributed flow sizes, so that the queue under consideration...
article 2007
Searched for: author%3A%22Mandjes%2C+M.%22
(1 - 20 of 26)

Pages