{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T04:49:54Z","timestamp":1648529394393},"reference-count":27,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1996,3,1]],"date-time":"1996-03-01T00:00:00Z","timestamp":825638400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1996,3]]},"DOI":"10.1016\/0140-3664(96)01061-4","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:56:11Z","timestamp":1027652171000},"page":"205-215","source":"Crossref","is-referenced-by-count":1,"title":["Design and performance analysis of a new RTM algorithm for VBR traffic in ATM networks"],"prefix":"10.1016","volume":"19","author":[{"given":"Intae","family":"Ryoo","sequence":"first","affiliation":[]},{"given":"Hitoshi","family":"Aida","sequence":"additional","affiliation":[]},{"given":"Tadao","family":"Saito","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(96)01061-4_BIB1","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1016\/0169-7552(92)90114-6","article-title":"The asynchronous transfer mode: a tutorial","volume":"24","author":"Le Boudec","year":"1992","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/0140-3664(96)01061-4_BIB2","unstructured":"ITU-T SG XVIII, Recommendation I.150."},{"key":"10.1016\/0140-3664(96)01061-4_BIB3","unstructured":"ITU-T SG XVIII, Recommendation I.371."},{"issue":"5","key":"10.1016\/0140-3664(96)01061-4_BIB4","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1109\/90.336321","article-title":"Some optimal traffic regulation schemes for ATM networks: a Markov decision approach","volume":"2","author":"Abdelaziz","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"10.1016\/0140-3664(96)01061-4_BIB5","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1109\/49.272884","article-title":"Modeling and call admission control algorithm of variable bit rate video in ATM networks","volume":"12","author":"Ryoo","year":"1994","journal-title":"IEEE J. Sel. Areas Communication"},{"key":"10.1016\/0140-3664(96)01061-4_BIB6","series-title":"IEEE ICC","first-page":"1398","article-title":"Bandwidth allocation in ATM networks that guarantee multiple QoS requirements","author":"Miyao","year":"1993"},{"key":"10.1016\/0140-3664(96)01061-4_BIB7","series-title":"IEEE INFOCOM","first-page":"11C.2.1","article-title":"Analysis of flow enforcement algorithm for bursty traffic in ATM networks","author":"Murata","year":"1992"},{"issue":"10","key":"10.1016\/0140-3664(96)01061-4_BIB8","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/35.99260","article-title":"Developing a cohesive traffic management strategy for ATM networks","volume":"29","author":"Gilbert","year":"1991","journal-title":"IEEE Communication Magazine"},{"issue":"2","key":"10.1016\/0140-3664(96)01061-4_BIB9","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/35.90493","article-title":"Variable-bit-rate traffic control in B-ISDN","volume":"29","author":"Roberts","year":"1991","journal-title":"IEEE Communication Magazine"},{"key":"10.1016\/0140-3664(96)01061-4_BIB10","first-page":"170","article-title":"Survey of traffic control schemes and protocols in ATM networks","volume":"79","author":"Bae","year":"1991"},{"issue":"5","key":"10.1016\/0140-3664(96)01061-4_BIB11","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1109\/90.330419","article-title":"A heuristic framework for source policing in ATM networks","volume":"2","author":"Rosenberg","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"10.1016\/0140-3664(96)01061-4_BIB12","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/49.76630","article-title":"Modeling and performance comparison of policing mechanisms for ATM networks","volume":"9","author":"Rathgeb","year":"1991","journal-title":"IEEE J. Sel. Areas Communication"},{"issue":"5","key":"10.1016\/0140-3664(96)01061-4_BIB13","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.157029","article-title":"Congestion control for multimedia services","volume":"6","author":"Trajkovic","year":"1992","journal-title":"IEEE Network"},{"issue":"4","key":"10.1016\/0140-3664(96)01061-4_BIB14","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1109\/90.330418","article-title":"Optimal buffer control during congestion in an ATM network node","volume":"2","author":"Tassiulas","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"5","key":"10.1016\/0140-3664(96)01061-4_BIB15","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/65.157032","article-title":"Managing bandwidth in ATM networks with bursty traffic","volume":"6","author":"Turner","year":"1992","journal-title":"IEEE Network"},{"issue":"6","key":"10.1016\/0140-3664(96)01061-4_BIB16","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/65.244791","article-title":"Monitoring distributed systems","volume":"7","author":"Mansouri-Samani","year":"1993","journal-title":"IEEE Network"},{"issue":"8","key":"10.1016\/0140-3664(96)01061-4_BIB17","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/35.299835","article-title":"Data communications using ATM: architectures, protocols, and resource management","volume":"32","author":"Fischer","year":"1994","journal-title":"IEEE Communication Magazine"},{"key":"10.1016\/0140-3664(96)01061-4_BIB18","series-title":"IEEE GLOBECOM","first-page":"49.5.5","article-title":"ATM: bandwidth assignment and bandwidth enforcement policies","author":"Gallassi","year":"1989"},{"issue":"3","key":"10.1016\/0140-3664(96)01061-4_BIB19","first-page":"311","article-title":"A simulation study on LAN\/MAN interconnection with an ATM network","volume":"E78-B","author":"Shimokoshi","year":"1995","journal-title":"IEICE Trans. on Communications"},{"issue":"3","key":"10.1016\/0140-3664(96)01061-4_BIB20","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/49.76631","article-title":"Effectiveness of the leaky bucket policing mechanism in ATM networks","volume":"9","author":"Butto","year":"1991","journal-title":"IEEE J. Sel. Areas Communication"},{"issue":"2","key":"10.1016\/0140-3664(96)01061-4_BIB21","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1109\/65.372659","article-title":"Integration of rate and credit schemes for ATM flow control","volume":"9","author":"Ramakrishnan","year":"1995","journal-title":"IEEE Network"},{"issue":"8","key":"10.1016\/0140-3664(96)01061-4_BIB22","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/35.299837","article-title":"Traffic management for ATM local area network","volume":"32","author":"Newman","year":"1994","journal-title":"IEEE Communication Magazine"},{"issue":"2","key":"10.1016\/0140-3664(96)01061-4_BIB23","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/65.372653","article-title":"The rate-based flow control framework for the available bit rate ATM service","volume":"9","author":"Bonomi","year":"1995","journal-title":"IEEE Network"},{"issue":"9","key":"10.1016\/0140-3664(96)01061-4_BIB24","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/35.90494","article-title":"Traffic control in asynchronous transfer mode","volume":"29","author":"Okada","year":"1991","journal-title":"IEEE Communication Magazine"},{"key":"10.1016\/0140-3664(96)01061-4_BIB25","article-title":"Design and performance analysis of integrated traffic control technique for broadband network","author":"Ryoo","year":"1994"},{"issue":"4","key":"10.1016\/0140-3664(96)01061-4_BIB26","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/65.298161","article-title":"Management and control functions in ATM switching systems","volume":"8","author":"Chen","year":"1994","journal-title":"IEEE Network"},{"issue":"5","key":"10.1016\/0140-3664(96)01061-4_BIB27","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/65.157028","article-title":"Traffic management for B-ISDN services","volume":"6","author":"Wernik","year":"1992","journal-title":"IEEE Network"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366496010614?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366496010614?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T03:23:00Z","timestamp":1555212180000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366496010614"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,3]]},"references-count":27,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1996,3]]}},"alternative-id":["0140366496010614"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(96)01061-4","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1996,3]]}}}