{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T17:56:59Z","timestamp":1754157419693,"version":"3.41.2"},"reference-count":22,"publisher":"Emerald","issue":"7\/8","license":[{"start":{"date-parts":[[2009,8,7]],"date-time":"2009-08-07T00:00:00Z","timestamp":1249603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,8,7]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-heading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to deal with a problem of admission control in computer networks when some of their parameters are uncertain. The case is considered when the most common probabilistic description of the uncertainty cannot be used and another approach should be applied.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title><jats:p>The uncertain versions of admission control problem with quality of service requirements are considered. The uncertain variables are used to describe possible values of the unknown parameters in computer networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Findings<\/jats:title><jats:p>Given are formulations for the admission control problem in computer networks with unknown values of the capacities based on the network utility maximization concept. Solution algorithms for all these problems are proposed.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Research limitations\/implications<\/jats:title><jats:p>It is assumed that an expert can describe possible values of uncertain network parameters in the form of a certainty distribution. Then the formalism of uncertain variables is applied and the knowledge of an expert is modelled with the use of certainty distributions. Decisions strongly depends on the quality of an expert's knowledge.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Practical implications<\/jats:title><jats:p>Obtained admission control algorithms can be useful for planning and designing of computer networks.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title><jats:p>A new approach to the admission control problem in computer networks in the presence of uncertainty, in the case when the uncertain variable can be applied, is proposed and discussed.<\/jats:p><\/jats:sec>","DOI":"10.1108\/03684920910976970","type":"journal-article","created":{"date-parts":[[2009,10,5]],"date-time":"2009-10-05T10:51:16Z","timestamp":1254739876000},"page":"1282-1297","source":"Crossref","is-referenced-by-count":0,"title":["Admission control in computer networks with uncertain parameters"],"prefix":"10.1108","volume":"38","author":[{"given":"Dariusz","family":"G\u0105sior","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2022020919430904900_b5","unstructured":"Bellman, R. (1957), Dynamic Programming, Princeton University Press, Princeton, NJ."},{"key":"key2022020919430904900_b4","doi-asserted-by":"crossref","unstructured":"Bubnicki, Z. (2001), \u201cUncertain variables and their application to decision\u2010making systems\u201d, IEEE Transactions on Systems, Man, and Cybernetics, Part A, Vol. 31 No. 6.","DOI":"10.1109\/3468.983415"},{"key":"key2022020919430904900_b3","unstructured":"Bubnicki, Z. (2002), Uncertain Logics, Variables and Systems, Springer, Berlin."},{"key":"key2022020919430904900_b2","doi-asserted-by":"crossref","unstructured":"Bubnicki, Z. (2004), Analysis and Decision Making in Uncertain Systems, Springer, Berlin.","DOI":"10.1007\/978-1-4471-3760-3"},{"key":"key2022020919430904900_b1","doi-asserted-by":"crossref","unstructured":"Bubnicki, Z. (2006), \u201cUncertain variables as a tool for analysis and decision making in uncertain knowledge\u2010based systems\u201d, Kybernetes: The International Journal of Systems, Cybernetics and Management Science, Vol. 35 Nos 7\/8, pp. 1223\u201031.","DOI":"10.1108\/03684920610675193"},{"key":"key2022020919430904900_b6","doi-asserted-by":"crossref","unstructured":"Chen, L., Low, S., Chiang, M. and Doyle, J. (2006), \u201cCross\u2010layer congestion control, routing and scheduling design in ad hoc wireless networks\u201d, Proceedings of the 25th IEEE International Conference on Computer Communications, INFOCOM 2006.","DOI":"10.1109\/INFOCOM.2006.142"},{"key":"key2022020919430904900_b7","doi-asserted-by":"crossref","unstructured":"Drummond, A.C., da Fonseca, N., Devetsikiotis, M. and Yamakami, A. (2006), \u201cBandwidth allocation in self\u2010sizing networks under uncertain constraints\u201d, Proceedings of IEEE International Conference on Communications, Istanbul.","DOI":"10.1109\/ICC.2006.254786"},{"key":"key2022020919430904900_b9","unstructured":"G\u0105sior, D. (2007), \u201cAdmission and rate control in the computer network with uncertain bandwidths\u201d, Proceedings of 13th IEEE Methods and Models in Automation and Robotics Conference, Szczecin."},{"key":"key2022020919430904900_b10","doi-asserted-by":"crossref","unstructured":"G\u0105sior, D. (2008), \u201cQoS rate allocation in computer networks under uncertainty\u201d, Kybernetes: The International Journal of Systems, Cybernetics and Management Science, Vol. 37.","DOI":"10.1108\/03684920810873308"},{"key":"key2022020919430904900_b8","doi-asserted-by":"crossref","unstructured":"G\u0105sior, D. and J\u00f3zefczyk, J. (2009), \u201cApplication of uncertain variables to production planning in a class of manufacturing systems\u201d, The Bulletin of the Polish Academy of Science \u2013 Technical Sciences, special issue on Mathematical Models of Manufacturing Systems Optimization.","DOI":"10.2478\/v10175-010-0127-y"},{"key":"key2022020919430904900_b11","doi-asserted-by":"crossref","unstructured":"Guerin, R.A. and Orda, A. (1999), \u201cQoS routing in networks with inaccurate information: theory and algorithms\u201d, IEEE Transactions on Networking, Vol. 7 No. 3.","DOI":"10.1109\/90.779203"},{"key":"key2022020919430904900_b12","doi-asserted-by":"crossref","unstructured":"Javidi, T. and Teneketzis, D. (2003), \u201cAn approach to connection admission control in single\u2010hop multiservice wireless networks with QoS requirements\u201d, IEEE Transactions on Vehicular Technology, Vol. 52 No. 4, pp. 1110\u201024.","DOI":"10.1109\/TVT.2003.808802"},{"key":"key2022020919430904900_b13","doi-asserted-by":"crossref","unstructured":"Kelly, F.P., Maulloo, A.K. and Tan, D.K.H. (1998), \u201cRate control for communication networks: shadow prices, proportional fairness, stability\u201d, Journal of the Operational Research Society, Vol. 49.","DOI":"10.2307\/3010473"},{"key":"key2022020919430904900_b14","doi-asserted-by":"crossref","unstructured":"Kolesar, P.J. (1967), \u201cA branch and bound algorithm for the knapsack problem\u201d, Management Science, Vol. 12 No. 9.","DOI":"10.1287\/mnsc.13.9.723"},{"key":"key2022020919430904900_b15","doi-asserted-by":"crossref","unstructured":"La, R. and Anantharam, A. (2002), \u201cUtility\u2010based rate control in the internet for elastic traffic\u201d, IEEE Transactions on Networking, Vol. 10 No. 2.","DOI":"10.1109\/90.993307"},{"key":"key2022020919430904900_b16","doi-asserted-by":"crossref","unstructured":"Lee, J.W., Chiang, M. and Calderbank, A.R. (2006), \u201cJointly optimal congestion and contention control based on network utility maximization\u201d, IEEE Communications Letters, Vol. 10 No. 3.","DOI":"10.1109\/LCOMM.2006.1603389"},{"key":"key2022020919430904900_b17","unstructured":"Lin, E.Y.\u2010H. (2005), \u201cA dynamic programming approach to the multiple\u2010choice multi\u2010period knapsack problem and the recursive APL2 code\u201d, Proceedings of 17th Triennial Conference of the International Federation of Operational Research Societies, Hawaii."},{"key":"key2022020919430904900_b18","doi-asserted-by":"crossref","unstructured":"Lorenz, D.H. and Orda, A. (1998), \u201cQoS routing in networks with uncertain parameters\u201d, IEEE\/ACM Transactions on Networking, Vol. 6 No. 6.","DOI":"10.1109\/90.748088"},{"key":"key2022020919430904900_b19","doi-asserted-by":"crossref","unstructured":"Palomar, D.P. and Chiang, M. (2006), \u201cTutorial on decomposition methods for network utility maximization\u201d, IEEE Journal on Selected Areas in Communications, Vol. 24, pp. 1439\u201051.","DOI":"10.1109\/JSAC.2006.879350"},{"key":"key2022020919430904900_b20","doi-asserted-by":"crossref","unstructured":"Pisinger, D. (1995), \u201cA minimal algorithm for the multiple\u2010choice knapsack problem\u201d, European Journal of Operational Research, Vol. 83, pp. 394\u2010410.","DOI":"10.1016\/0377-2217(95)00015-I"},{"key":"key2022020919430904900_b21","doi-asserted-by":"crossref","unstructured":"Thesen, A. (2006), \u201cA recursive branch and bound algorithm for the multidimensional knapsack problem\u201d, Naval Research Logistics Quarterly, Vol. 22 No. 2, pp. 341\u201053.","DOI":"10.1002\/nav.3800220210"},{"key":"key2022020919430904900_b22","unstructured":"Zhang, G., Wu, Y. and Liu, Y. (2005), \u201cStability and sensitivity for congestion control in wireless networks with time varying link capacities\u201d, Proceedings of 13th IEEE International Conference on Network Protocol, Boston, MA, USA."}],"container-title":["Kybernetes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/03684920910976970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920910976970\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/03684920910976970\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T23:53:44Z","timestamp":1753401224000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/k\/article\/38\/7-8\/1282-1297\/272994"}},"subtitle":[],"editor":[{"given":"Jerzy","family":"J\u00f3zefczyk","sequence":"first","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2009,8,7]]},"references-count":22,"journal-issue":{"issue":"7\/8","published-print":{"date-parts":[[2009,8,7]]}},"alternative-id":["10.1108\/03684920910976970"],"URL":"https:\/\/doi.org\/10.1108\/03684920910976970","relation":{},"ISSN":["0368-492X"],"issn-type":[{"type":"print","value":"0368-492X"}],"subject":[],"published":{"date-parts":[[2009,8,7]]}}}