{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:46:33Z","timestamp":1725493593508},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540660507"},{"type":"electronic","value":"9783540487746"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48774-3_61","type":"book-chapter","created":{"date-parts":[[2007,7,16]],"date-time":"2007-07-16T19:10:57Z","timestamp":1184613057000},"page":"556-568","source":"Crossref","is-referenced-by-count":0,"title":["Traffic Control in an ATM Network Using Rough Set Theory"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Martyna","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"61_CR1","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1109\/49.76631","volume":"9","author":"M. Butto","year":"1991","unstructured":"Butto, M., Cavallero, E., Tonietti, A.: Effectiveness of the \u201cLeaky Bucket\u201d Policing Mechanism in ATM Networks, IEEE Journal on Selected Areas in Communications, Vol. 9, No. 3 (1991) 335\u2013342","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"61_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1049\/ip-com:19971088","volume":"144","author":"R.-G. Cheng","year":"1997","unstructured":"Cheng, R.-G., Chang, C.-J.: Neural-Network Connection-Admission Control for ATM Networks, IEE Proc.-Commun., Vol. 144, No. 2 (1997) 93\u201398","journal-title":"IEE Proc.-Commun."},{"issue":"3","key":"61_CR3","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/49.76632","volume":"9","author":"L. Dittmann","year":"1991","unstructured":"Dittmann, L., Jacobsen, S.B., Moth, K.: Flow Enforcement Algorithms for ATM Networks, IEEE Journal on Selected Areas in Communications, Vol. 9, No. 3 (1991) 343\u2013350","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"61_CR4","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1049\/ip-com:19971408","volume":"144","author":"Z. Fan","year":"1997","unstructured":"Fan, Z., Mars, P.: Access Flow Control Scheme for ATM Networks Using Neural-Network-Based Traffic Prediction, IEE Proc.-Commun., Vol. 144, No. 5 (1997) 295\u2013300","journal-title":"IEE Proc.-Commun."},{"key":"61_CR5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-94-015-7975-9_1","volume-title":"Intelligent Decision Support. Handbook of Applications and Advances of the Rough Sets Theory","author":"J.W. Grzymala-Busse","year":"1992","unstructured":"Grzymala-Busse, J.W.: LERS-A System Learning from Examples Based on Rough Sets, in: R. Slowinski (Ed.), Intelligent Decision Support. Handbook of Applications and Advances of the Rough Sets Theory, Kluwer Academic Publishers, Dordrecht, 1992, 3\u201318"},{"key":"61_CR6","series-title":"LNCA","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-69115-4_6","volume-title":"Rough Sets and Current Trends in Computing","author":"J.W. Grzymala-Busse","year":"1998","unstructured":"Grzymala-Busse, J.W., Zou, X.: Classification Strategies Using Certain and Possible Rules, in: L. Polkowski, A. Skowron (Eds.), Rough Sets and Current Trends in Computing, LNCA, Vol. 1424, Springer-Verlag, Berlin, 1998, 37\u201344"},{"key":"61_CR7","doi-asserted-by":"crossref","unstructured":"Jensen, D.: B-ISDN Network Management by a Fuzzy Logic Controller, Proc. GLOBECOM\u201994, San Francisco, Nov. 1994","DOI":"10.1109\/GLOCOM.1994.512705"},{"key":"61_CR8","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1016\/S0020-7373(89)80028-8","volume":"30","author":"A. Mrozek","year":"1989","unstructured":"Mrozek, A.: Rough Sets and Dependency Analysis Among Attributes in Computer Implementations of Expert\u2019s Inference Models, Int. Journal of Man-Machine Studies, Vol. 30 (1989) 457\u2013473","journal-title":"Int. Journal of Man-Machine Studies"},{"issue":"9","key":"61_CR9","doi-asserted-by":"publisher","first-page":"1488","DOI":"10.1109\/49.339916","volume":"12","author":"T.D. Ndousse","year":"1994","unstructured":"Ndousse, T.D.: Fuzzy Neural Control of Voice Cells in ATM Networks, IEEE Journal on Selected Areas in Communications, Vol. 12, No. 9 (1994) 1488\u20131494","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"61_CR10","volume-title":"Asynchronous Transfer Mode Networks","author":"R.O. Onvural","year":"1994","unstructured":"Onvural, R.O.: Asynchronous Transfer Mode Networks. Performance Issues, Artech House, Boston, London, 1994"},{"issue":"5","key":"61_CR11","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1007\/BF01001956","volume":"11","author":"Z. Pawlak","year":"1982","unstructured":"Pawlak, Z.: Rough Sets, Int. Journal of Computer and Information Sciences, Vol. 11, No. 5 (1982) 341\u2013356","journal-title":"Int. Journal of Computer and Information Sciences"},{"key":"61_CR12","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1016\/S0020-7373(84)80022-X","volume":"20","author":"Z. Pawlak","year":"1984","unstructured":"Pawlak, Z.: Rough Classification, Int. Journal of Man-Machine Studies, Vol. 20 (1984) 469\u2013485","journal-title":"Int. Journal of Man-Machine Studies"},{"key":"61_CR13","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/3-540-69115-4_4","volume-title":"Rough Sets and Current Trends in Computing","author":"Z. Pawlak","year":"1998","unstructured":"Pawlak, Z.: Reasoning About Data. A Rough Set Perspective, in: L. Polkowski, A. Skowron (Eds.), Rough Sets and Current Trends in Computing, LNAI, Vol. 1424, Springer-Verlag, Berlin, 1998, 25\u201334"},{"issue":"2","key":"61_CR14","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/49.552071","volume":"15","author":"A. Pitsillides","year":"1997","unstructured":"Pitsillides, A., Sekerciouglu, Y.A., Ramamurthy, G.: Effective Control of Traffic Flow in ATM Networks Using Fuzzy Explicit Rate Marking (FERM), IEEE Journal on Selected Reas in Communications, Vol. 15, No. 2 (1997) 209\u2013225","journal-title":"IEEE Journal on Selected Reas in Communications"},{"issue":"3","key":"61_CR15","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1109\/49.76630","volume":"9","author":"E. Rathgeb","year":"1991","unstructured":"Rathgeb, E.: Modeling and Performance Comparison of Policing Mechanism for ATM Networks, IEEE Journal on Selected Areas in Communications, Vol. 9, No. 3 (1991) 325\u2013334","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"61_CR16","unstructured":"Slowinski, R., Stefanowski, J.: Handling Various Types of Uncertainty in the Rough Set Approach, Proc. of the 2nd Int. Workshop on Rough Sets and Knowledge Discovery, Banff 12\u201315. Oct. 1993, Canada, 395\u2013398"},{"issue":"5","key":"61_CR17","doi-asserted-by":"publisher","first-page":"1088","DOI":"10.1109\/49.310965","volume":"12","author":"A.A. Tarraf","year":"1994","unstructured":"Tarraf, A.A., Habib, I.W., Saadawi, T.N.: A Novel Neural Network Traffic Enforcement Mechanism for ATM Networks, IEEE Journal on Selected Areas in Communications, Vol. 12, No. 5 (1994) 1088\u20131095","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"61_CR18","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/0165-0114(80)90013-5","volume":"4","author":"R.R. Yager","year":"1980","unstructured":"Yager, R.R.: On a General Class of Fuzzy Connectives, Fuzzy Sets and Systems, Vol. 4 (1980) 235\u2013242","journal-title":"Fuzzy Sets and Systems"},{"key":"61_CR19","volume-title":"Essentials of Fuzzy Modeling and Control","author":"R.R. Yager","year":"1994","unstructured":"Yager, R.R., Filev, D.: Essentials of Fuzzy Modeling and Control, John Wiley and Sons, Inc., New York, 1994"},{"key":"61_CR20","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/0165-0114(78)90029-5","volume":"1","author":"L.A. Zadeh","year":"1978","unstructured":"Zadeh, L.A.: Fuzzy Sets as a Basis for Theory of Possibility, Fuzzy Sets and Systems, Vol. 1 (1978) 3\u201328","journal-title":"Fuzzy Sets and Systems"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48774-3_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,25]],"date-time":"2020-04-25T02:34:42Z","timestamp":1587782082000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48774-3_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540660507","9783540487746"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/3-540-48774-3_61","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}