Searched for: subject%3A%22PNS%255C%2B%255C-%255C%2BPerformance%255C%2Bof%255C%2BNetworks%255C%2B%2526%255C%2BServices%22
(21 - 40 of 101)

Pages

document
ten Thij, M. (author), Ouboter, T.M. (author), Worm, D.T.H. (author), Litvak, N. (author), van den Berg, J.L. (author), Bhulai, S. (author)
In this paper we model user behaviour in Twitter to capture the emergence of trending topics. For this purpose, we first extensively analyse tweet datasets of several different events. In particular, for these datasets, we construct and investigate the retweet graphs. We find that the retweet graph for a trending topic has a relatively dense...
bookPart 2014
document
Pournaras, E. (author), Vasirani, M. (author), Kooij, R.E. (author), Aberer, K. (author)
The robustness of smart grids is challenged by unpredictable power peaks or temporal demand oscillations that can cause blackouts and increase supply costs. Planning of demand can mitigate these effects and increase robustness. However, the impact on consumers in regards to the discomfort they experience as a result of improving robustness is...
article 2014
document
Veltman, M. (author), Kooij, R.E. (author), Marban, S. (author)
This study introduces the term sales bottleneck, defined as a stage in a total production or service delivery process that limits sales. After analyzing the suitability of traditional methods to find sales bottlenecks, the study proposes the bottleneck accounting model as a method to determine sales bottlenecks and calculate the effect of each...
article 2014
document
Phillipson, F. (author)
Rolling out a Fibre to the Home (FttH)architecture is very expensive, mainly due to all thetrenching that is labour extensive. In this paper wepresent a method for planning the last mile in FttH in a cost effective way and extend this method for incorporating and minimizing the inconvenience andsocial costs this work brings. To do this, we model...
conference paper 2014
document
Kempker, P.L. (author), Ran, A.C.M. (author), van Schuppen, J.H. (author)
Coordinated linear systems are a special class of hierarchical linear systems, with a strict top-to-bottom information structure. The LQ problem over all structure-preserving static state feedbacks is discussed. The overall control problem separates into conditionally independent subproblems, a numerical approach to their solution is derived,...
article 2014
document
Trichias, K. (author), Pijpers, R.J.M. (author), Meeuwissen, H.B. (author)
Structural Health Monitoring (SHM) systems help to monitor critical infrastructures (bridges, tunnels, etc.) remotely and provide up-to-date information about their physical condition. In addition, it helps to predict the structure’s life and required maintenance in a cost-efficient way. Typically, inspection data gives insight in the structural...
conference paper 2014
document
Leenman, T.S. (author), Phillipson, F. (author)
When looking at the optimal place to locate a wind turbine, trade-offs have to be made between local placement and spreading: transmission loss favours local placements and the correlation between the stochastic productions of wind turbines favours spreading. In this paper steps are described to determine the locations of new wind mills that...
conference paper 2014
document
Mata, F. (author), Zuraniewski, P.W. (author), Mandjes, M. (author), Mellia, M. (author)
In this paper we present methodological advances in anomaly detection tailored to discover abnormal traffic patterns under the presence of seasonal trends in data. In our setup we impose specific assumptions on the traffic type and nature; our study features VoIP call counts, for which several traces of real data has been used in this study, but...
article 2014
document
Schmelz, L.C. (author), Eisenblätter, A. (author), Hahn, S. (author), Kürner, T. (author), Litjens, R. (author), Lobinger, A. (author), Lohmüller, S. (author), Sas, B. (author), Türke, U. (author)
The demonstrator shows a self-management system for heterogeneous mobile wireless networks that uses context-specific and weighted Key Performance Indicator (KPI) target values defined by the operator to automatically and autonomously configure and control the operation of Self-Organising Network (SON) functions such that they contribute to...
conference paper 2014
document
Koç, Y. (author), Warnier, M. (author), van Mieghem, P. (author), Kooij, R.E. (author), Brazier, F.M.T. (author)
Cascading failures are one of the main reasons for large scale blackouts in power transmission grids. Secure electrical power supply requires, together with careful operation, a robust design of the electrical power grid topology. Currently, the impact of the topology on grid robustness is mainly assessed by purely topological approaches, that...
article 2014
document
Phillipson, F. (author)
Electricity and telecommunication network providers operate in a turbulent period. The market is open for competition and the customer demand is changing tremendously, facing the network providers with a huge challenge. In this thesis efficient algorithms are developed for tactical planning of those networks. These algorithms generate fairly...
doctoral thesis 2014
document
Phillipson, F. (author), Smit-Rietveld, C.J.C. (author), Verhagen, W.P. (author)
The use of fibre will be inevitable for transporting hundreds of Mb/s to and from end-users, but this does not necessary mean that fibre has to be deployed all the way up to a point into the home. An alternative is bringing fibre up to the Home (Hybrid FttH) and reusing existing telephony wiring for abridging the last 20-200m. A new transmission...
article 2013
document
Ellens, W. (author), Berry, A. (author), West, S. (author)
The introduction of `Smart grid' technologies in the electricity supply industry has attracted new attention to Conservation Voltage Reduction (CVR). CVR is a method that aims to save energy by reducing the voltage level of the electrical distribution network. However, not all devices consume less electricity when exposed to lower voltage levels...
conference paper 2013
document
Zuraniewski, P.W. (author), Mandjes, M. (author), van den Berg, J.L. (author), Malhotra, R. (author)
In this paper we consider a multiple-priority buffered link, with a focus on resource allocation issues; our study was motivated by such issues in Carrier Ethernet, but the applicability of the results is by no means limited to this technology. In our model, the resource is shared by two priority classes. As the high-priority queue - intended...
bookPart 2013
document
Coenen, T. (author), van den Berg, J.L. (author), Boucherie, R.J. (author), de Graaf, M. (author), Hanbali, A.A. (author)
This paper considers a class of queueing network models where nodes have to contend with each other to serve their customers. In each time slot, a node with a non-empty queue either serves a customer or is blocked by a node in its vicinity. The focus of our study is on analyzing the throughput and identifying bottleneck nodes in such networks....
article 2013
document
Eisenblätter, A. (author), Conzalez Rodríguez, B. (author), Gunnarsson, F. (author), Kürner, T. (author), Litjens, R. (author), Sas, B. (author), Sayrac, B. (author), Schmelz, L.C. (author), Willcock, C. (author)
Future radio access networks will require new self-management solutions to handle the increasing operational complexity caused by multi-technology and multi-layer deployments. Current networks already include stand-alone SON (Self-Organizing Networks) solutions, but these are not sufficient to properly handle the networks of tomorrow. In this...
conference paper 2013
document
Worm, D.T.H. (author), Langley, D.J. (author), Becker, J.M. (author)
The objective of this paper is to improve scientific modeling of interdependent socio-technical networks. In these networks the interplay between technical or infrastructural elements on the one hand and social and behavioral aspects on the other hand, is of importance. Examples include electricity networks, financial networks, residential...
conference paper 2013
document
Marbán, S. (author), van de Ven, P. (author), Borm, P. (author), Hamers, H. (author)
In this paper we consider a wireless network consisting of various nodes, where transmissions are regulated by the slotted ALOHA protocol. Nodes using the protocol behave autonomously, and decide at random whether to transmit in a particular time slot. Simultaneous transmissions by multiple nodes cause collisions, rendering the transmissions...
article 2013
document
Mandjes, M. (author), Zuraniewski, P.W. (author)
The control of communication networks critically relies on procedures capable of detecting unanticipated load changes. In this chapter we present an overview of such techniques, in a setting in which each connection consumes roughly the same amount of bandwidth (with VoIP as a leading example). For the situation of exponential holding times an...
bookPart 2013
document
Koc, Y. (author), Warnier, M. (author), Kooij, R.E. (author), Brazier, F.M.T. (author)
Cascading failures are the main reason blackouts occur in power networks. The economic cost of such failures is in the order of tens of billion dollars annually. In a power network, the cascading failure phenomenon is related to both topological properties (number and types of buses, density of transmission lines and interconnection of...
conference paper 2013
Searched for: subject%3A%22PNS%255C%2B%255C-%255C%2BPerformance%255C%2Bof%255C%2BNetworks%255C%2B%2526%255C%2BServices%22
(21 - 40 of 101)

Pages