842 research outputs found

    EUROPEAN CONFERENCE ON QUEUEING THEORY 2016

    Get PDF
    International audienceThis booklet contains the proceedings of the second European Conference in Queueing Theory (ECQT) that was held from the 18th to the 20th of July 2016 at the engineering school ENSEEIHT, Toulouse, France. ECQT is a biannual event where scientists and technicians in queueing theory and related areas get together to promote research, encourage interaction and exchange ideas. The spirit of the conference is to be a queueing event organized from within Europe, but open to participants from all over the world. The technical program of the 2016 edition consisted of 112 presentations organized in 29 sessions covering all trends in queueing theory, including the development of the theory, methodology advances, computational aspects and applications. Another exciting feature of ECQT2016 was the institution of the Takács Award for outstanding PhD thesis on "Queueing Theory and its Applications"

    Revenue Management of Reusable Resources with Advanced Reservations

    Full text link
    Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/137568/1/poms12672_am.pdfhttps://deepblue.lib.umich.edu/bitstream/2027.42/137568/2/poms12672.pd

    The effective bandwidth problem revisited

    Full text link
    The paper studies a single-server queueing system with autonomous service and â„“\ell priority classes. Arrival and departure processes are governed by marked point processes. There are â„“\ell buffers corresponding to priority classes, and upon arrival a unit of the kkth priority class occupies a place in the kkth buffer. Let N(k)N^{(k)}, k=1,2,...,â„“k=1,2,...,\ell denote the quota for the total kkth buffer content. The values N(k)N^{(k)} are assumed to be large, and queueing systems both with finite and infinite buffers are studied. In the case of a system with finite buffers, the values N(k)N^{(k)} characterize buffer capacities. The paper discusses a circle of problems related to optimization of performance measures associated with overflowing the quota of buffer contents in particular buffers models. Our approach to this problem is new, and the presentation of our results is simple and clear for real applications.Comment: 29 pages, 11pt, Final version, that will be published as is in Stochastic Model

    Optimal admission control in tandem and parallel queueing systems with applications to computer networks

    Get PDF
    Modern computer networks require advanced, efficient algorithms to control several aspects of their operations, including routing data packets, access to secure systems and data, capacity and resource allocation, task scheduling, etc. A particular class of problems that arises frequently in computer networks is that of admission and routing control. Two areas where admission control problems are common are traffic control and authentication procedures. This thesis focuses on developing tools to solve problems in these areas. We begin the thesis with a brief introductory chapter describing the problems we will be addressing. Then, we follow this with a review of the relevant literature on the problems we study and the methodologies we use. Then, we have the main body of the dissertation, which is divided into three parts, described below. In the first part, we analyze a problem related to data routing in a network. Specifically, we study the problem of admission control to a system of two stations in tandem with finite buffers, Poisson arrivals to the first station, and exponentially distributed service times at both stations. We assume costs are incurred either when a customer is rejected at the time of arrival to the first station or when the second station is full at the time of service completion at the first station. We propose a Markov decision process formulation for this problem. Then, we use this model to show that, when one of the buffers has size one, the structure of the optimal policy is threshold and that only two particular policies can be optimal. We provide the exact optimality thresholds for small systems. For larger systems, we formulate heuristic policies and use numerical experiments to show that these policies achieve near-optimal performance. For the second part of this thesis, we investigate the system described above in a more general case, where the capacity of the buffers at both station is equal, finite and arbitrary. We focus on two specific, extremal policies, which we call the Prudent and Greedy policies. We derive a closed-form expression for the long-run average reward under the Prudent policy and provide a necessary and sufficient threshold condition for it to be optimal. For the Greedy policy, we give a matrix-analytic solution for the long-run average reward and provide a sufficient condition for it to be optimal. We also prove that it is always optimal to admit customers in the states where the Prudent policy admits customers. Next, we use an example to illustrate that the optimal policy can have a complicated form. Finally, we propose two heuristic policies and use numerical experiments to show that they perform much better than the Prudent and Greedy policies, and in fact, achieve near-optimal performance. In the third and final part of this dissertation, we shift our attention to a different admission and routing control problem. We study a centralized system where requests for authentication arrive from different users. The system has multiple authentication methods available and a controller must decide how to assign a method to each request. We consider three different performance measures: usability, operating cost, and security. First, we model the problem using a cost-based approach, which assigns a cost to each measure of performance. Under this approach, we find that if each authentication method has infinitely many servers the optimal policy is static and deterministic. On the other hand, if there is one method that has finite capacity and the rest have infinitely many servers, we show that the optimal policy is of trunk reservation form. Then, we model the problem using a constraint-based approach, which assumes hard constraints on some of the measures of performance. We show that if each method has infinitely many servers, the optimal policy is static and randomized. While, if one method has finite capacity and the rest have infinitely many servers, we show that the optimal policy has a 2-randomized trunk reservation form. Finally, we illustrate how to use our results to construct an efficient frontier of non-dominated solutions. We end this dissertation with a short recapitulation of our main contributions and a discussion on potential avenues for future research.Ph.D
    • …
    corecore