{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:34:04Z","timestamp":1725489244590},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540425922"},{"type":"electronic","value":"9783540454007"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45400-4_14","type":"book-chapter","created":{"date-parts":[[2007,8,16]],"date-time":"2007-08-16T07:24:37Z","timestamp":1187249077000},"page":"195-211","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Resource Stealing in Endpoint Controlled Multi-class Networks"],"prefix":"10.1007","author":[{"given":"Susana","family":"Sargento","sequence":"first","affiliation":[]},{"given":"Rui","family":"Valadas","sequence":"additional","affiliation":[]},{"given":"Edward","family":"Knightly","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,5]]},"reference":[{"key":"14_CR1","unstructured":"G. Bianchi, A. Capone, and C. Petrioli. Throughput analysis of end-to-end measurementbased admission control in IP. In Proceedings of IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000."},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"S. Blake et al. An architecture for differentiated services, 1998. Internet RFC 2475.","DOI":"10.17487\/rfc2475"},{"key":"14_CR3","unstructured":"L. Breslau, S. Jamin, and S. Shenker. Comments on the performance of measurement-based admission control algorithms. In Proceedings of IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000."},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"L. Breslau, E. Knightly, S. Shenker, I. Stoica, and H. Zhang. Endpoint admission control: Architectural issues and performance. In Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, August 2000.","DOI":"10.1145\/347059.347400"},{"key":"14_CR5","unstructured":"C. Cetinkaya and E. Knightly. Scalable services via egress admission control. In Proceedings of IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000."},{"key":"14_CR6","unstructured":"V. Elek, G. Karlsson, and R. Ronngren. Admission control based on end-to-end measurements. In Proceedings of IEEE INFOCOM 2000, Tel Aviv, Israel, March 2000."},{"key":"14_CR7","unstructured":"R. Gibbens and F. Kelly. Distributed connection acceptance control for a connectionless network. In Proceedings of ITC\u2019 99, Edinburgh, UK, June 1999."},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/65.768485","volume":"13","author":"E. Knightly","year":"1999","unstructured":"E. Knightly and N. Shroff. Admission control for statistical QoS: Theory and practice. IEEE Network, 13(2):20\u201329, March 1999.","journal-title":"IEEE Network"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"K. Nichols, V. Jacobson, and L. Zhang. Two-bit differentiated services architecture for the Internet, 1999. Internet RFC 2638.","DOI":"10.17487\/rfc2638"},{"key":"14_CR10","unstructured":"K. Ross. Introduction to Probability Models. Academic Press, 1997."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"I. Stoica, S. Shenker, and H. Zhang. Core-Stateless Fair Queueing: A scalable architecture to approximate fair bandwidth allocations in high speed networks. In Proceedings of ACM SIGCOMM\u2019 98, Vancouver, British Columbia, September 1998.","DOI":"10.1145\/285237.285273"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"I. Stoica and H. Zhang. Providing guaranteed services without per flow management. In Proceedings of ACM SIGCOMM\u2019 99, Cambridge, MA, August 1999.","DOI":"10.1145\/316188.316208"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"J. Wroclawski. Specification of the controlled-load network element service, 1997. Internet RFC 2211.","DOI":"10.17487\/rfc2211"},{"issue":"5","key":"14_CR14","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1109\/65.238150","volume":"7","author":"L. Zhang","year":"1993","unstructured":"L. Zhang, S. Deering, D. Estrin, S. Shenker, and D. Zappala. RSVP: A New Resource ReSerVation Protocol. IEEE Network, 7(5):8\u201318, September 1993.","journal-title":"IEEE Network"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Z. Zhang, Z. Duan, L. Gao, and Y. Hou. Decoupling QoS control from core routers: a novel bandwidth broker architecture for scalable support of guaranteed services. In Proceedings of ACM SIGCOMM 2000, Stockholm, Sweden, August 2000.","DOI":"10.1145\/347059.347403"}],"container-title":["Lecture Notes in Computer Science","Evolutionary Trends of the Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45400-4_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T20:43:33Z","timestamp":1558471413000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45400-4_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540425922","9783540454007"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45400-4_14","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"5 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}