{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T08:10:15Z","timestamp":1736410215738,"version":"3.32.0"},"publisher-location":"Boston","reference-count":7,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"0387287531"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/0-387-29773-1_35","type":"book-chapter","created":{"date-parts":[[2006,6,7]],"date-time":"2006-06-07T11:00:15Z","timestamp":1149678015000},"page":"527-541","source":"Crossref","is-referenced-by-count":0,"title":["Admission Control for the Customers over the Vendor\u2019s VPN"],"prefix":"10.1007","author":[{"given":"G. Narendra","family":"Kumar","sequence":"first","affiliation":[]},{"given":"P.","family":"Venkataram","sequence":"additional","affiliation":[]},{"given":"V. S. N.","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"L. Cherkasova and P. Phaal, \u201cPredictive admission control strategy for overload commercial web server\u201d, Pro. of 8th International Symposium on Modeling Analysis and Simulation of Computer and Telecommunication Systems, 2000, pp 500\u2013507.","DOI":"10.1109\/MASCOT.2000.876577"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Davi. E. Goldberg, \u201cGenetic Algorithms in Search, Optimization & Machine-Learning\u201d, Addison Wesley, 1989. ivalent Capacity and its Applications to Bandwidth Allocation in High Speed Networks\u201d, IEEE, JSAC, Vol 9, No. 7, Sept 1991.","DOI":"10.1109\/49.103545"},{"key":"35_CR3","unstructured":"Zhu. L, Wainwright. R. L and Schoenefeld. D. A, \u201cA Genetic Algorithm for the Point to Multipoint Routing Problem with Varying Number of Requests\u201d. Proceedings IEEE Intl Conference on EC (ICEC 98), USA, 1998."},{"key":"35_CR4","unstructured":"G. Narendra Kumar, P. Venkataram and V.S.N. Kumar, \u201cA Call Admission Control For E-Commerce Users By Using GA\u2019s\u201d, Pro. of International Conference, CIRAS\u20192003, Singapore, Dec 2003."},{"key":"35_CR5","unstructured":"Stallings, W. \u201cNetwork and Internet Security: Principals and Practice.\u201d Prentice Hall, 1995."},{"key":"35_CR6","unstructured":"Wasim E. \u201cE-Commerce Systems Architecture and Applications.\u201d Artech House, 2000."},{"key":"35_CR7","unstructured":"M.C. Chan, A.A. Lazer and R. Stadler, \u201cCustomer Management and Control of Broadband VPN Services\u201d, Centre for Telecommunications Research, New York."}],"container-title":["IFIP International Federation for Information Processing","Challenges of Expanding Internet: E-Commerce, E-Business, and E-Government"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/0-387-29773-1_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T07:30:55Z","timestamp":1736407855000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/0-387-29773-1_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["0387287531"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/0-387-29773-1_35","relation":{},"subject":[]}}