1997
DOI: 10.1109/24.589954
|View full text |Cite
|
Sign up to set email alerts
|

Quick estimation of rare events in stochastic networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2001
2001
2016
2016

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…Note finally that the redundant parameters, like those labeled 2 and 3 (the parameter of the remaining time distribution in the initial state of the sources and the parameter tol), were eliminated (screened out) automatically at the early stage of the simulation using the Screening Algorithm proposed in Lieber et al (1997).…”
Section: Fig 2 Source States' Synchronicitymentioning
confidence: 99%
“…Note finally that the redundant parameters, like those labeled 2 and 3 (the parameter of the remaining time distribution in the initial state of the sources and the parameter tol), were eliminated (screened out) automatically at the early stage of the simulation using the Screening Algorithm proposed in Lieber et al (1997).…”
Section: Fig 2 Source States' Synchronicitymentioning
confidence: 99%
“…Then, the problem of selecting a good g reduces to the problem of selecting a good parameter v. Two well-known methods for choosing such an optimal reference parameter v are the CE method [21,22] and the variance minimization (VM) method [12]. In the latter, the optimal v is determined or estimated from the solution to the variance minimization program…”
Section: Estimation and Optimization Via Monte Carlo Simulationmentioning
confidence: 99%
“…To make (12) easier to handle as an estimation problem, we note that (12) is equivalent to max x∈{0,1} n S(x), where x = (x 1 , . .…”
Section: Combinatorial Optimization Examplementioning
confidence: 99%
“…where P 1 = {1, 4}, P 2 = {2, 5}, P 3 = {2, 3, 4} and P 4 = {1, 3, 5} are the sets of maximal paths, see (Barlow and Proschan, 1975;Lieber, Rubinstein, and Elmakis, 1997). Suppose the "nominal" parameter vector is u = (0.3, 0.1, 0.8, 0.1, 0.2).…”
Section: Cross-entropy and Crude Monte Carlomentioning
confidence: 99%
“…The method can also be used for solving optimisation problems (Rubinstein, 1999(Rubinstein, , 2001). The Cross-Entropy method has been successfully applied to a wide range of combinatorial and continuous optimisation problems (Dubin, 2002;Lieber, 1998;Margolin, 2002;Rubinstein, 1999), including problems in reliability theory (Lieber, Rubinstein, and Elmakis, 1997), buffer allocation (Alon et al, 2005), telecommunication systems (de Boer, 2000;de Boer, Kroese, and Rubinstein, 2004;de Boer and Nicola, 2002;de Boer, Nicola, and Rubinstein, 2000), neural computation (Dubin, 2002), control and navigation (Helvik and Wittner, 2001;Wittner and Helvik, 2002), DNA sequence alignment (Keith and Kroese, 2002), scheduling (de Mello and Rubinstein, 2002;Margolin, 2002) and Max-Cut and bipartition problems (Rubinstein, 2002). A short review of the basic ideas behind the Cross-Entropy method is given at the end of this section, but for details we refer to the book on Cross-Entropy , and the tutorial in de Boer et al (2005).…”
Section: Fishman Proposedmentioning
confidence: 99%