Joost Bosman
YOU?
Author Swipe
View article: Optimizing the decoy-state BB84 QKD protocol parameters
Optimizing the decoy-state BB84 QKD protocol parameters Open
Quantum key distribution (QKD) protocols allow for information theoretically secure distribution of (classical) cryptographic key material. However, due to practical limitations the performance of QKD implementations is somewhat restricted…
View article: Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks
Detecting Message Modification Attacks on the CAN Bus with Temporal Convolutional Networks Open
Multiple attacks have shown that in-vehicle networks have vulnerabilities\nwhich can be exploited. Securing the Controller Area Network (CAN) for modern\nvehicles has become a necessary task for car manufacturers. Some attacks inject\npote…
View article: Deriving Explicit Control Policies for Markov Decision Processes Using Symbolic Regression
Deriving Explicit Control Policies for Markov Decision Processes Using Symbolic Regression Open
In this paper, we introduce a novel approach to optimizing the control of systems that can be modeled as Markov decision processes (MDPs) with a threshold-based optimal policy. Our method is based on a specific type of genetic program know…
View article: Reinforcement Learning for Personalized Dialogue Management
Reinforcement Learning for Personalized Dialogue Management Open
Language systems have been of great interest to the research community and have recently reached the mass market through various assistant platforms on the web. Reinforcement Learning methods that optimize dialogue policies have seen succe…
View article: Reinforcement learning for personalized dialogue management
Reinforcement learning for personalized dialogue management Open
Language systems have been of great interest to the research community and have recently reached the mass market through various assistant platforms on the web. Reinforcement Learning methods that optimize dialogue policies have seen succe…
View article: Solving Financial Regulatory Compliance Using Software Contracts
Solving Financial Regulatory Compliance Using Software Contracts Open
Ensuring compliance with various laws and regulations is of utmost priority for financial institutions. Traditional methods in this area have been shown to be inefficient. Manual processing does not scale well. Automated efforts are hinder…
View article: Dynamic priority assignment for SLA compliance in service function chains
Dynamic priority assignment for SLA compliance in service function chains Open
In service function chaining, data flows from a
\nparticular application or user travel along a pre-defined sequence
\nof network functions. Appropriate service function chaining
\nresource allocation is required to comply with the service…
View article: Improving Mobile Video Quality Through Predictive Channel Quality Based Buffering
Improving Mobile Video Quality Through Predictive Channel Quality Based Buffering Open
Frequent variations in throughput make mobile networks a challenging environment for video streaming. Current video players deal with those variations by matching video quality to network throughput. However, this adaptation strategy resul…
View article: Control of a tandem queue with a startup cost for the second server
Control of a tandem queue with a startup cost for the second server Open
Various systems across a broad range of applications contain tandem queues. Strong dependence between the servers has proven to make such networks complicated and difficult to study. Exact analysis is rarely computationally tractable and s…
View article: Bounded-Velocity Stochastic Control for Dynamic Resource Allocation
Bounded-Velocity Stochastic Control for Dynamic Resource Allocation Open
We consider a general class of dynamic resource allocation problems within a stochastic optimal control framework. This class of problems arises in a wide variety of applications, each of which intrinsically involves resources of different…
View article: Message from the AMS Chairs
Message from the AMS Chairs Open
Netflix, Amazon, The Guardian and other companies have evolved their applications towards the promising and challenging style of microservice architectures (MSAs). MSA arises from the broader area of Service Oriented Architecture and focus…
View article: Solving the bank with Rebel: on the design of the Rebel specification language and its application inside a bank
Solving the bank with Rebel: on the design of the Rebel specification language and its application inside a bank Open
Large organizations like banks suffer from the ever growing complexity of their systems. Evolving the software becomes harder and harder since a single change can affect a much larger part of the system than predicted upfront. A large cont…