2014
DOI: 10.1007/978-3-319-10172-9_13
|View full text |Cite
|
Sign up to set email alerts
|

Mining Resource Scheduling Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
16
0
1

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 15 publications
(17 citation statements)
references
References 18 publications
0
16
0
1
Order By: Relevance
“…The distribution of interarrival times A t and processing times per class B c can be fitted with the techniques presented in [16,21]. Service policies, P, can be discovered using the policy-mining techniques presented in [22], or assumed to be given, as in the case of discovering a F/J network from a schedule.…”
Section: Discovery Of Fork/join Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…The distribution of interarrival times A t and processing times per class B c can be fitted with the techniques presented in [16,21]. Service policies, P, can be discovered using the policy-mining techniques presented in [22], or assumed to be given, as in the case of discovering a F/J network from a schedule.…”
Section: Discovery Of Fork/join Networkmentioning
confidence: 99%
“…In earlier work, therefore, we argued for an explicit representation of the queueing perspective and demonstrated its value for several real-world processes [20,22]. However, the existing techniques all considered the simplistic setting of a singlestation system, whereas, this paper addressed the more complex scenario of service processes that are scheduled and have a multi-stage structure that involves resource synchronization.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In such a setting, the policy for handling customers is typically FCFS, within the same class. For derivation of more accurate routing policies, see [10]. These underlying assumptions reflect upon our choices of relevant predictors and parameter estimation techniques throughout the paper.…”
Section: Background and Problem Specificationmentioning
confidence: 99%
“…The experiments for the first call center correspond to the single-class scenario, since we have focused on a single type of customers. For the second call center, three customer types that represent the private sector are considered: VIP, Regular and Low priority (see [10] for further description of the dataset and the priority setting). The synthetic data that we later use for sensitivity analysis comes from a set of simulation runs, based on a multi-class service process.…”
Section: Data Descriptionmentioning
confidence: 99%