{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:36:07Z","timestamp":1725518167469},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540859833"},{"type":"electronic","value":"9783540859840"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-85984-0_61","type":"book-chapter","created":{"date-parts":[[2008,9,7]],"date-time":"2008-09-07T21:00:48Z","timestamp":1220821248000},"page":"510-517","source":"Crossref","is-referenced-by-count":0,"title":["A New Problem-Solving Method for Multi-agent Systems and Computer Networks: Solitary Wave Propagation"],"prefix":"10.1007","author":[{"given":"Dianxun","family":"Shuai","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"61_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/S0020-0190(98)00226-9","volume":"65","author":"S. Vedantham","year":"1998","unstructured":"Vedantham, S., Iyengar, S.: The Bandwidth Allocation Problem in The ATM Network Model Is NP-Complete. Information Processing Letters\u00a065(4), 179\u2013182 (1998)","journal-title":"Information Processing Letters"},{"key":"61_CR2","doi-asserted-by":"crossref","first-page":"221","DOI":"10.1016\/S0164-1212(01)00040-1","volume":"58","author":"Yin-Fu Huang","year":"2001","unstructured":"Huang, Yin-Fu, Chao, Bo-Wei: A Priority-Based Resource Rllocation Strategy in Distributed Computing Networks. Journal of Systems and Software 58, 221\u2013233 (2001)","journal-title":"Journal of Systems and Software"},{"key":"61_CR3","first-page":"115","volume-title":"Proceedings of 3rd IEEE Symposium on Computers and Communications","author":"H. Abdel-Wahab","year":"1998","unstructured":"Abdel-Wahab, H., Youssef, A., Maly, K.: Distributed Management of Exclusive Resources in Collaborative Multimedia Systems. In: Proceedings of 3rd IEEE Symposium on Computers and Communications, pp. 115\u2013119. IEEE Press, Los Alamitos (1998)"},{"key":"61_CR4","doi-asserted-by":"publisher","first-page":"781","DOI":"10.1016\/S0140-3664(00)00351-0","volume":"24","author":"A. Racz","year":"2001","unstructured":"Racz, A., Fias, N., Racz, P.: Effective Bandwidth And Associated CAC Procedure for Traffic Streams Multiplexed over a VBR Link. Computer Communications\u00a024, 781\u2013789 (2001)","journal-title":"Computer Communications"},{"issue":"4","key":"61_CR5","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1016\/j.comnet.2004.02.001","volume":"45","author":"D.X. Shuai","year":"2004","unstructured":"Shuai, D.X., Zhao, H.B.: A New Generalized Cellular Automata Approach to Optimization of Fast Packet Switching. Computer Networks\u00a045(4), 399\u2013419 (2004)","journal-title":"Computer Networks"},{"key":"61_CR6","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1016\/S1389-1286(00)00132-8","volume":"34","author":"H.Y. Thomas","year":"2000","unstructured":"Thomas, H.Y., Li, B., Shivendra, S.P., Henry, T.: On Network Bandwidth Allocation Policies And Feedback Control Algorithms for Packet Networks. Computer Networks\u00a034, 481\u2013501 (2000)","journal-title":"Computer Networks"},{"issue":"1","key":"61_CR7","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/S1568-4946(03)00005-X","volume":"3","author":"S. Chandramathi","year":"2003","unstructured":"Chandramathi, S., Shanmugavel, S.: Fuzzy-Based Dynamic Bandwidth Allocation for Heterogeneous Sources in ATM Network. Applied Soft Computing Journal\u00a03(1), 53\u201370 (2003)","journal-title":"Applied Soft Computing Journal"},{"issue":"9","key":"61_CR8","doi-asserted-by":"publisher","first-page":"803","DOI":"10.1016\/S0140-3664(99)00051-1","volume":"22","author":"T.H. Cheng","year":"1999","unstructured":"Cheng, T.H., Sze, Y.K., Tan, C.W.: A Heuristic Algorithm for Allocating Virtual Path Bandwidth in an ATM Network. Computer Communications\u00a022(9), 803\u2013810 (1999)","journal-title":"Computer Communications"},{"issue":"2-3","key":"61_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/S0166-5316(02)00177-3","volume":"52","author":"E.B. James","year":"2003","unstructured":"James, E.B., Teunis, J.O., Anthony, E.K., Karen, E.M.: Path Selection And Bandwidth Allocation in MPLS Networks. Performance Evaluation\u00a052(2-3), 133\u2013152 (2003)","journal-title":"Performance Evaluation"},{"issue":"13","key":"61_CR10","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1016\/S0305-0548(02)00115-6","volume":"30","author":"K.M. Ahn","year":"2003","unstructured":"Ahn, K.M., Kim, S.H.: Optimal Bandwidth Allocation for Bandwidth Adaptation in Wireless Multimedia Networks. Computers and Operations Research\u00a030(13), 1917\u20131929 (2003)","journal-title":"Computers and Operations Research"},{"issue":"12","key":"61_CR11","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1016\/S0305-0548(02)00111-9","volume":"30","author":"D.H. Han","year":"2003","unstructured":"Han, D.H., Park, C.G., Baik, K.H.: Performance Analysis of an AAL Multiplexer with Dynamic Bandwidth Allocation in an IP\/ATM Environment. Computers and Operations Research\u00a030(12), 1851\u20131864 (2003)","journal-title":"Computers and Operations Research"},{"key":"61_CR12","first-page":"685","volume-title":"Mathematical Modeling of the Internet","author":"F.P. Kelly","year":"2001","unstructured":"Kelly, F.P.: Mathematical Modeling of the Internet, pp. 685\u2013702. Springer, Berlin (2001)"},{"issue":"4","key":"61_CR13","doi-asserted-by":"publisher","first-page":"525","DOI":"10.1109\/TNET.2003.815297","volume":"11","author":"S.H. Low","year":"2003","unstructured":"Low, S.H.: A Duality Model of TCP And Queue Management Algorithms. IEEE ACM Trans. on Networking\u00a011(4), 525\u2013536 (2003)","journal-title":"IEEE ACM Trans. on Networking"},{"issue":"2","key":"61_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/37.980245","volume":"22","author":"S.H. Low","year":"2002","unstructured":"Low, S.H., Paganini, F., Doyle, J.C.: Internet Congestion Control. IEEE Control Syst. Mag.\u00a022(2), 28\u201343 (2002)","journal-title":"IEEE Control Syst. Mag."},{"issue":"3","key":"61_CR15","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1109\/TNET.2002.1012364","volume":"10","author":"L. Massonlie","year":"2002","unstructured":"Massonlie, L., Roberts, J.: Bandwidth Sharing: Objectives And Algorithms. IEEE\/ACM Transactions on Networking\u00a010(3), 320\u2013328 (2002)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"61_CR16","unstructured":"Ito, A., Yano, H.: The Emergence of Cooperation in a Society of Autonomous Agents \u2013 The prisoner\u2019s Dilemma Game under the Disclosure of Contract Histories. In: ICMAS 1995, San Francisco (1995)"},{"key":"61_CR17","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/S0004-3702(98)00045-9","volume":"101","author":"O. Shehory","year":"1998","unstructured":"Shehory, O., Kraus, S.: Methods for Task Allocation via Agent Coalition Formation. Artificial Intelligence\u00a0101, 165\u2013200 (1998)","journal-title":"Artificial Intelligence"},{"key":"61_CR18","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/0004-3702(94)00021-R","volume":"75","author":"S. Kraus","year":"1995","unstructured":"Kraus, S., Jonathan, W., Gilad, Z.: Multiagent Negotiation under Time Constraints. Artificial Intelligence\u00a075, 297\u2013345 (1995)","journal-title":"Artificial Intelligence"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Theories and Applications. With Aspects of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85984-0_61","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,30]],"date-time":"2020-01-30T10:31:56Z","timestamp":1580380316000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85984-0_61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540859833","9783540859840"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85984-0_61","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}