default search action
Pieter-Tjerk de Boer
Person information
- affiliation: University of Twente, Enschede, Netherlands
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j25]Masoud Abbasi Alaie, André B. J. Kokkeler, Pieter-Tjerk de Boer:
Vector Modulator-Based Analog Beamforming Using the Least Euclidean Distance Criterion. IEEE Access 9: 65411-65417 (2021) - [j24]Anne Buijsrogge, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt:
Importance sampling for Markovian tandem queues using subsolutions: exploring the possibilities. Simul. 97(12) (2021) - [j23]Pieter-Tjerk de Boer, Mark S. Oude Alink, Eric A. M. Klumperink:
Simplified Harmonic Rejection Mixer Analysis and Design Based on a Filtered Periodic Impulse Model. IEEE Trans. Circuits Syst. II Express Briefs 68(7): 2292-2296 (2021) - 2020
- [j22]Boudewijn R. Haverkort, Felix Finkbeiner, Pieter-Tjerk de Boer:
Machine Learning Data Center Workloads Using Generative Adversarial Networks. SIGMETRICS Perform. Evaluation Rev. 48(2): 21-23 (2020) - [j21]Wouter B. de Vries, Roland van Rijswijk-Deij, Pieter-Tjerk de Boer, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. IEEE Trans. Netw. Serv. Manag. 17(1): 190-200 (2020)
2010 – 2019
- 2019
- [j20]Anne Buijsrogge, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt:
Importance sampling for non-Markovian tandem queues using subsolutions. Queueing Syst. Theory Appl. 93(1-2): 31-65 (2019) - [j19]Enno Ruijters, Daniël Reijsbergen, Pieter-Tjerk de Boer, Mariëlle Stoelinga:
Rare event simulation for dynamic fault trees. Reliab. Eng. Syst. Saf. 186: 220-231 (2019) - 2018
- [j18]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt, Sandeep Juneja:
Path-ZVA: General, Efficient, and Automated Importance Sampling for Highly Reliable Markovian Systems. ACM Trans. Model. Comput. Simul. 28(3): 22:1-22:25 (2018) - [c27]Wouter B. de Vries, Roland van Rijswijk-Deij, Pieter-Tjerk de Boer, Aiko Pras:
Passive Observations of a Large DNS Service: 2.5 Years in the Life of Google. TMA 2018: 1-8 - 2017
- [j17]Anne Buijsrogge, Pieter-Tjerk de Boer, Karol Rosen, Werner R. W. Scheinhardt:
Large deviations for the total queue size in non-Markovian tandem queues. Queueing Syst. Theory Appl. 85(3-4): 305-312 (2017) - [c26]Luuk Hendriks, Petr Velan, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Flow-Based Detection of IPv6-specific Network Layer Attacks. AIMS 2017: 137-142 - [c25]Luuk Hendriks, Pieter-Tjerk de Boer, Aiko Pras:
IPv6-specific misconfigurations in the DNS. CNSM 2017: 1-5 - [c24]Wouter B. de Vries, Ricardo de Oliveira Schmidt, Wes Hardaker, John S. Heidemann, Pieter-Tjerk de Boer, Aiko Pras:
Broad and load-aware anycast mapping with verfploeter. Internet Measurement Conference 2017: 477-488 - [c23]Enno Ruijters, Daniël Reijsbergen, Pieter-Tjerk de Boer, Mariëlle Stoelinga:
Rare Event Simulation for Dynamic Fault Trees. SAFECOMP 2017: 20-35 - [c22]Luuk Hendriks, Petr Velan, Ricardo de Oliveira Schmidt, Pieter-Tjerk de Boer, Aiko Pras:
Threats and surprises behind IPv6 extension headers. TMA 2017: 1-9 - 2016
- [j16]C. Willem Korevaar, André B. J. Kokkeler, Pieter-Tjerk de Boer, Gerard J. M. Smit:
Spectrum Efficient, Localized, Orthogonal Waveforms: Closing the Gap With the Balian-Low Theorem. IEEE Trans. Commun. 64(5): 2155-2165 (2016) - [j15]C. Willem Korevaar, Mark S. Oude Alink, Pieter-Tjerk de Boer, André B. J. Kokkeler, Gerard J. M. Smit:
Closed-Form Expressions for Time-Frequency Operations Involving Hermite Functions. IEEE Trans. Signal Process. 64(6): 1383-1390 (2016) - [c21]Anna Kolesnichenko, Boudewijn R. Haverkort, Anne Remke, Pieter-Tjerk de Boer:
Fitting a code-red virus spread model: An account of putting theory into practice. DRCN 2016: 39-46 - [c20]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt:
Hypothesis Testing for Rare-Event Simulation: Limitations and Possibilities. ISoLA (1) 2016: 16-26 - 2015
- [j14]Doina Bucur, Giovanni Iacca, Pieter-Tjerk de Boer:
Characterizing topological bottlenecks for data delivery in CTP using simulation-based stress testing with natural selection. Ad Hoc Networks 30: 22-45 (2015) - [j13]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt, Boudewijn R. Haverkort:
On hypothesis testing for statistical model checking. Int. J. Softw. Tools Technol. Transf. 17(4): 377-395 (2015) - [c19]Pieter-Tjerk de Boer, Daniël Reijsbergen, Werner R. W. Scheinhardt:
Interactive comparison of hypothesis tests for statistical model checking. VALUETOOLS 2015: 153-157 - 2014
- [c18]Dirk Maan, José Jair Santanna, Anna Sperotto, Pieter-Tjerk de Boer:
Towards Validation of the Internet Census 2012. EUNICE 2014: 85-96 - [c17]Wouter J. Kooij, Hans M. Stokking, Ray van Brandenburg, Pieter-Tjerk de Boer:
Playout delay of TV signals: measurement system design, validation and results. TVX 2014: 23-30 - 2013
- [c16]Anna Kolesnichenko, Pieter-Tjerk de Boer, Anne Remke, Boudewijn R. Haverkort:
A logic for model-checking mean-field models. DSN 2013: 1-12 - [c15]C. Willem Korevaar, Pieter-Tjerk de Boer, André B. J. Kokkeler, Gerard J. M. Smit:
Peak-to-average power reduction by rotation of the time-frequency representation. GLOBECOM 2013: 3722-3727 - [c14]C. Willem Korevaar, André B. J. Kokkeler, Pieter-Tjerk de Boer, Gerard J. M. Smit:
Fourier-hermite communications; where Fourier meets Hermite. ICASSP 2013: 4723-4727 - [c13]Giovane Cesar Moreira Moura, Aiko Pras, Tiago Fioreze, Pieter-Tjerk de Boer:
Self-management of Hybrid Networks - Hidden Costs Due to TCP Performance Problems. EUNICE 2013: 54-65 - [c12]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt, Boudewijn R. Haverkort:
Automated Rare Event Simulation for Stochastic Petri Nets. QEST 2013: 372-388 - 2012
- [j12]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt, Boudewijn R. Haverkort:
Rare event simulation for highly dependable systems with fast repairs. Perform. Evaluation 69(7-8): 336-355 (2012) - [j11]Anna Sperotto, Michel Mandjes, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Autonomic Parameter Tuning of Anomaly-Based IDSs: an SSH Case Study. IEEE Trans. Netw. Serv. Manag. 9(2): 128-141 (2012) - [c11]C. Willem Korevaar, André B. J. Kokkeler, Pieter-Tjerk de Boer, Gerard J. M. Smit:
Synchronization and matched filtering in time-frequency using the sunflower spiral. GLOBECOM 2012: 3959-3964 - [c10]Christiaan Ottow, Frank E. van Vliet, Pieter-Tjerk de Boer, Aiko Pras:
The Impact of IPv6 on Penetration Testing. EUNICE 2012: 88-99 - 2011
- [c9]Anna Kolesnichenko, Anne Remke, Pieter-Tjerk de Boer, Boudewijn R. Haverkort:
Comparison of the Mean-Field Approach and Simulation in a Peer-to-Peer Botnet Case Study. EPEW 2011: 133-147 - [c8]Floris van Nee, Pieter-Tjerk de Boer:
On the Benefit of Forward Error Correction at IEEE 802.11 Link Layer Level. EUNICE 2011: 9-20 - 2010
- [j10]Michiel C. M. Soer, Eric A. M. Klumperink, Pieter-Tjerk de Boer, Frank E. van Vliet, Bram Nauta:
Unified Frequency-Domain Analysis of Switched-Series- RC Passive Mixers and Samplers. IEEE Trans. Circuits Syst. I Regul. Pap. 57-I(10): 2618-2631 (2010) - [c7]Daniël Reijsbergen, Pieter-Tjerk de Boer, Werner R. W. Scheinhardt, Boudewijn R. Haverkort:
Rare Event Simulation for Highly Dependable Systems with Fast Repairs. QEST 2010: 251-260
2000 – 2009
- 2009
- [c6]Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, Aiko Pras:
Hidden Markov Model Modeling of SSH Brute-Force Attacks. DSOM 2009: 164-176 - [c5]Giovane Cesar Moreira Moura, Tiago Fioreze, Pieter-Tjerk de Boer, Aiko Pras:
Optical Switching Impact on TCP Throughput Limited by TCP Buffers. IPOM 2009: 161-166 - 2008
- [j9]Desislava C. Dimitrova, Georgios Karagiannis, Pieter-Tjerk de Boer:
Severe congestion handling approaches in NSIS RMD domains with bi-directional reservations. Comput. Commun. 31(14): 3153-3162 (2008) - 2007
- [j8]Pieter-Tjerk de Boer, Werner R. W. Scheinhardt:
Alternative proof and interpretations for a recent state-dependent importance sampling scheme. Queueing Syst. Theory Appl. 57(2-3): 61-69 (2007) - [j7]Edwin Woudt, Pieter-Tjerk de Boer, Jan-Kees C. W. van Ommeren:
Improving Adaptive Importance Sampling Simulation of Markovian Queueing Models using Non-parametric Smoothing. Simul. 83(12): 811-820 (2007) - [c4]Pieter-Tjerk de Boer, Pierre L'Ecuyer, Gerardo Rubino, Bruno Tuffin:
Estimating the probability of a rare event over a finite time horizon. WSC 2007: 403-411 - 2006
- [j6]Pieter-Tjerk de Boer:
Analysis of state-independent importance-sampling measures for the two-node tandem queue. ACM Trans. Model. Comput. Simul. 16(3): 225-250 (2006) - [c3]Mark Timmer, Pieter-Tjerk de Boer, Aiko Pras:
How to Identify the Speed Limiting Factor of a TCP Flow. E2EMON 2006: 17-24 - 2005
- [j5]Pieter-Tjerk de Boer, Dirk P. Kroese, Shie Mannor, Reuven Y. Rubinstein:
A Tutorial on the Cross-Entropy Method. Ann. Oper. Res. 134(1): 19-67 (2005) - [j4]Pieter-Tjerk de Boer:
Rare-Event Simulation of Non-Markovian Queueing Networks Using a State-Dependent Change of Measure Determined Using Cross-Entropy. Ann. Oper. Res. 134(1): 69-100 (2005) - 2004
- [j3]Pieter-Tjerk de Boer, Dirk P. Kroese, Reuven Y. Rubinstein:
A Fast Cross-Entropy Method for Estimating Buffer Overflows in Queueing Networks. Manag. Sci. 50(7): 883-895 (2004) - 2002
- [j2]Pieter-Tjerk de Boer, Victor F. Nicola:
Adaptive state- dependent importance sampling simulation of markovian queueing networks. Eur. Trans. Telecommun. 13(4): 303-315 (2002) - [c2]Pieter-Tjerk de Boer, Dirk P. Kroese, Reuven Y. Rubinstein:
Rare event simulation and combinatorial optimization using cross entropy: estimating buffer overflows in three stages using cross-entropy. WSC 2002: 301-309 - 2001
- [j1]Pieter-Tjerk de Boer, Victor F. Nicola, Jan-Kees C. W. van Ommeren:
The Remaining Service Time upon Reaching a High Level in M/G/1 Queues. Queueing Syst. Theory Appl. 39(1): 55-78 (2001) - 2000
- [c1]Pieter-Tjerk de Boer, Victor F. Nicola, Reuven Y. Rubinstein:
Techniques for simulating difficult queueing problems: adaptive importance sampling simulation of queueing networks. WSC 2000: 646-655
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint