Search results

    Filter results

  • Full text

  • Document type

  • Publication year

  • Organisation

Results: 345
Number of items: 345
  • Kella, O., & Mandjes, M. (2013). Transient analysis of reflected Lévy processes. Statistics & Probability Letters, 83(10), 2308-2315. https://doi.org/10.1016/j.spl.2013.06.008
  • Mandjes, M., & Żuraniewski, P. (2013). Changepoint Detection Techniques for VoIP Traffic. In E. Biersack, C. Callegari, & M. Matijasevic (Eds.), Data traffic monitoring and analysis (pp. 184-201). (Lecture Notes in Computer Science; No. 7754). Springer. https://doi.org/10.1007/978-3-642-36784-7_8
  • Callegari, C., Coluccia, A., D'Alconzo, A., Ellens, W., Giordano, S., Mandjes, M., Pagano, P., Pepe, T., Ricciato, F., & Żuraniewski, P. (2013). A Methodological Overview on Anomaly Detection. In E. Biersack, C. Callegari, & M. Matijasevic (Eds.), Data traffic monitoring and analysis: from measurement, classification, and anomaly detection to quality of experience (pp. 148-183). (Lecture Notes in Computer Science; No. 7754). Springer. https://doi.org/10.1007/978-3-642-36784-7_7
  • Koot, M., Mandjes, M., van 't Noordende, G., & de Laat, C. (2013). A probabilistic perspective on re-identifiability. Mathematical Population Studies, 20(3), 155-171. https://doi.org/10.1080/08898480.2013.816222
  • Juneja, S., & Mandjes, M. (2013). Overlap problems on the circle. Advances in Applied Probability, 45(3), 773-790. https://doi.org/10.1017/S0001867800006571
  • Blom, J., De Turck, K., & Mandjes, M. (2013). Rare Event Analysis of Markov-Modulated Infinite-Server Queues: A Poisson Limit. Stochastic Models, 29(4), 463-474. https://doi.org/10.1080/15326349.2013.838511
  • Es-Saghouani, A., & Mandjes, M. (2013). Exact multivariate workload asymptotics. Mathematical Methods of Operations Research, 78(3), 405-415. https://doi.org/10.1007/s00186-013-0450-9
  • Asghari, N. M., Mandjes, M., & Walid, A. (2013). Optimizing energy management in multi-core servers. Performance Evaluation Review, 41(2), 38-40. https://doi.org/10.1145/2518025.2518031
  • Open Access
    Gruntjes, P. A. G. J. M. (2013). Essays on mathematical and computational finance: With a view towards applied probability. [Thesis, externally prepared, Universiteit van Amsterdam].
  • Sperotto, A., Mandjes, M., Sadre, R., de Boer, P.-T., & Pras, A. (2012). Autonomic parameter tuning of anomaly-based IDSs: an SSH case study. IEEE Transactions on Network and Service Management, 9(2), 128-141. https://doi.org/10.1109/TNSM.2012.031512.110146
Page 21 of 35