{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,4]],"date-time":"2022-08-04T13:52:06Z","timestamp":1659621126131},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"11-12","license":[{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2004,11,1]],"date-time":"2004-11-01T00:00:00Z","timestamp":1099267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. T\u00e9l\u00e9commun."],"published-print":{"date-parts":[[2004,11]]},"DOI":"10.1007\/bf03179721","type":"journal-article","created":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:33:22Z","timestamp":1625639602000},"page":"1260-1299","source":"Crossref","is-referenced-by-count":18,"title":["A flow-based approach to modeling ADSL traffic on an IP backbone link"],"prefix":"10.1007","volume":"59","author":[{"given":"Nadia","family":"Ben Azzouna","sequence":"first","affiliation":[]},{"given":"Fabrice","family":"Cl\u00e9rot","sequence":"additional","affiliation":[]},{"given":"Christine","family":"Fricker","sequence":"additional","affiliation":[]},{"given":"Fabrice","family":"Guillemin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF03179721_CR1","unstructured":"Abramowitz (M.),Stegun (I.) Handbook of mathematical functions, National Bureau of Standards, Applied Mathematics Series 55, 1972."},{"issue":"2","key":"BF03179721_CR2","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/18.650984","volume":"44","author":"P. Abry","year":"1998","unstructured":"Abry (P.),Veitch (D.), Wavelet analysis of long range dependent traffic,ieee Trans. Information Theory,44, no2, pp. 2\u201315, 1998.","journal-title":"ieee Trans. Information Theory"},{"key":"BF03179721_CR3","doi-asserted-by":"crossref","unstructured":"Ben fredj (S.),Bonald (T.),Proutiere (A.),Regnie (G.),roberts (J.), Statistical bandwidth sharing: A study of congestion at flow level, InProc. Acm Sigcomm, 2001","DOI":"10.1145\/383059.383068"},{"key":"BF03179721_CR4","first-page":"983","volume":"8","author":"A. A. Borovkov","year":"1967","unstructured":"Borovkov (A. A.), Limit laws for queueing processes in multichannel systems, Sibirsk. Mat. \u017d.,8, p. 983\u20131004, 1967.","journal-title":"Sibirsk. Mat. \u017d."},{"key":"BF03179721_CR5","doi-asserted-by":"publisher","first-page":"377","DOI":"10.2307\/1427697","volume":"24","author":"P. Br\u00e9maud","year":"1992","unstructured":"Br\u00e9maud (P.)Mazumbar (R.), Event and time averages: a review. Adv. Appl. Prob.,24, pp. 377\u2013411, 1992.","journal-title":"Adv. Appl. Prob."},{"key":"BF03179721_CR6","unstructured":"Cao (J.),Ramanan (K.) A Poisson limit for buffer overflow probabilities, InProc. Infocom 2002, New York, 2002."},{"key":"BF03179721_CR7","unstructured":"Claffy (K.),Miller (G.),Thompson (K.), The nature of the beast: Recent traffic measurement from an Internet backbone. InProc. of Inet, 1998."},{"key":"BF03179721_CR8","doi-asserted-by":"crossref","unstructured":"Crovella (M.),Bestravos (A.) Self-similarity in world wide web. Evidence and possible causes,ieee\/acm Trans. on Networking, pp. 835\u2013846, 1997.","DOI":"10.1109\/90.650143"},{"key":"BF03179721_CR9","first-page":"519","volume":"28","author":"A. Feldmann","year":"1998","unstructured":"Feldmann (A.),Gilbert (A.),Willinger (W.),Kurtz (T.), The changing nature of network traffic: Scaling phenomena.Computer Communication Review,28, pp. 519, 1998.","journal-title":"Computer Communication Review"},{"issue":"7","key":"BF03179721_CR10","doi-asserted-by":"publisher","first-page":"1139","DOI":"10.1109\/49.103559","volume":"9","author":"H. Fowler","year":"1994","unstructured":"Fowler (H.),Leland (W.), Local area network traffic characteristics, with implications for broadband network congestion management,ieee J. Sel. Areas in Commun., 9, no7, pp. 1139\u20131149, 1994.","journal-title":"ieee J. Sel. Areas in Commun."},{"key":"BF03179721_CR11","doi-asserted-by":"crossref","unstructured":"Garrett (M.),Willinger (W.), Analysis, modeling and generation of sef-similarvbr videa traffic,In Proc. Sigcomm, London, England, 1994.","DOI":"10.1145\/190809.190339"},{"key":"BF03179721_CR12","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1061\/TACEAT.0006518","volume":"116","author":"H. Hurst","year":"1951","unstructured":"Hurst (H.) Long-term storage capacity of reservoirs.Trans. Amer. Soc. Civil. Eng., 116, pp. 770\u2013799, 1951.","journal-title":"Trans. Amer. Soc. Civil. Eng."},{"key":"BF03179721_CR13","doi-asserted-by":"crossref","unstructured":"Iglehart (D. L.), Weak convergence of compound stochastic process. I.Stochastic Processes Appl.,1, pp 11\u201331; corrigendum, ibid. 1, pp 185\u2013186, 1973.","DOI":"10.1016\/0304-4149(73)90030-6"},{"issue":"1","key":"BF03179721_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/90.282603","volume":"2","author":"W. Leland","year":"1994","unstructured":"Leland (W.),Taqqu (M.),Willinger (W.),Wilson (D.), On the self-similar nature of ethernet traffic.ieee\/acm Trans. Net.,2, no 1, pp. 1\u201315, 1994.","journal-title":"ieee\/acm Trans. Net."},{"issue":"3","key":"BF03179721_CR15","doi-asserted-by":"publisher","first-page":"894","DOI":"10.1239\/jap\/1032374642","volume":"36","author":"L. Massouli\u00e9","year":"1999","unstructured":"Massouli\u00e9 (L.),Simonian (A.), Large buffer asymptotics for the queue withfbm input.Journal of Applied Probability,36, no 3, pp. 894\u2013906, 1999.","journal-title":"Journal of Applied Probability"},{"key":"BF03179721_CR16","series-title":"Lecture Notes in Math.","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/BFb0097494","volume-title":"\u00c9cole d\u2019\u00c9t\u00e9 de Probabilit\u00e9s de Saint-Flour, VI-1976","author":"J. Neveu","year":"1977","unstructured":"Neveu (J.) Processus ponctuels, In \u00c9cole d\u2019\u00c9t\u00e9 de Probabilit\u00e9s de Saint-Flour, VI-1976, pp. 249\u2013445, Lecture Notes in Math.,598, Berlin:Springer-Verlag, 1977."},{"key":"BF03179721_CR17","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1007\/BF01158964","volume":"16","author":"I. Norros","year":"1994","unstructured":"Norros (I.), A storage model with self-similar input, Queueing Systems, 16, pp. 387\u2013396 (1994).","journal-title":"Queueing Systems"},{"issue":"6","key":"BF03179721_CR18","doi-asserted-by":"publisher","first-page":"953","DOI":"10.1109\/49.400651","volume":"13","author":"I. Norros","year":"1995","unstructured":"Norros (I.), On the use of fractional Brownian motion int he theory of connectionless networks,ieee J. Sel. Areas Commun.,13, no 6, pp. 953\u2013962, 1995.","journal-title":"ieee J. Sel. Areas Commun."},{"key":"BF03179721_CR19","doi-asserted-by":"crossref","unstructured":"Olivier (P.),Benameur (N.), Flow levelip characterization,In Proc. itc\u201917, pp 25\u201326, Salvador de Bahia, Brasil, 2001.","DOI":"10.1016\/S1388-3437(01)80108-6"},{"key":"BF03179721_CR20","doi-asserted-by":"crossref","unstructured":"Papagiannaki (K.),Taft (N.),Bhattachayya (S.),Thiran (P.),Salamatian (K.),Diot (C), On the feasibility of identifying elephants in Internet backbone traffic, Rapport internetr01-atl-110918, Sprint Labs, Sprint ATL, 2001.","DOI":"10.1145\/637201.637227"},{"key":"BF03179721_CR21","doi-asserted-by":"crossref","unstructured":"Paxson (V.),Floyd (S.), Wide area traffic: The failure of the Poisson assumption,ieee\/acm Trans. on Networking, pp 226\u2013244 (1995)","DOI":"10.1109\/90.392383"},{"key":"BF03179721_CR22","unstructured":"Riedi (R.), On the multiplicative structure of network traffic, Inima Conference on Mathematics in Signal Processing, Warwick, 2000."},{"key":"BF03179721_CR23","unstructured":"Vehel (J. L.),Riedi (R.) Fractals in Engineering, chapitre Fractional Brownian motion and data traffic modeling: The other end of the spectrum.Springer, 1997."},{"key":"BF03179721_CR24","unstructured":"Veitch (D.) Matlab code for the estimation of scaling exponents, Code disponible \u00e0 l\u2019adresse http: \/\/www.emulab.ee.mu.oz.au\/darryl."},{"key":"BF03179721_CR25","unstructured":"Zhang (Z.L.),Ribeiro (V.),Moon (S.),Diot (C), Small time scaling behavior of Internet backbone traffic: An empirical study. InProc. Infocom 2003, April 2003."}],"container-title":["Annales des T\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179721.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/BF03179721\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/BF03179721.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,7]],"date-time":"2021-07-07T06:56:06Z","timestamp":1625640966000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/BF03179721"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,11]]},"references-count":25,"journal-issue":{"issue":"11-12","published-print":{"date-parts":[[2004,11]]}},"alternative-id":["BF03179721"],"URL":"https:\/\/doi.org\/10.1007\/bf03179721","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004,11]]}}}