{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T19:10:04Z","timestamp":1648926604359},"reference-count":30,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1994,1,1]],"date-time":"1994-01-01T00:00:00Z","timestamp":757382400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Performance Evaluation"],"published-print":{"date-parts":[[1994,1]]},"DOI":"10.1016\/0166-5316(94)90055-8","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T06:10:42Z","timestamp":1060323042000},"page":"73-101","source":"Crossref","is-referenced-by-count":5,"title":["Performance analysis of a leaky-bucket controlled ATM multiplexer"],"prefix":"10.1016","volume":"19","author":[{"given":"Jing-Fei","family":"Ren","sequence":"first","affiliation":[]},{"given":"Jon W.","family":"Mark","sequence":"additional","affiliation":[]},{"given":"J.W.","family":"Wong","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0166-5316(94)90055-8_BIB1","series-title":"Proc. IEEE GLOBECOM'90","first-page":"344","article-title":"Analysis of leaky bucket access control mechanism with batch arrival process","author":"Ahmadi","year":"1990"},{"issue":"8","key":"10.1016\/0166-5316(94)90055-8_BIB2","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.1002\/j.1538-7305.1982.tb03089.x","article-title":"Stochastic theory of data handling system with multiple sources","volume":"61","author":"Anick","year":"1982","journal-title":"Bell System Tech. J."},{"issue":"2","key":"10.1016\/0166-5316(94)90055-8_BIB3","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1109\/49.68443","article-title":"Performance analysis of a rate control throttle where tokens and jobs queue","volume":"9","author":"Berger","year":"1991","journal-title":"IEEE J. Selected Areas Comm."},{"key":"10.1016\/0166-5316(94)90055-8_BIB4","series-title":"Teletraffic and Datatraffic in a Period of Change","first-page":"859","article-title":"Policing procedures: implications, definitions and proposals","author":"Borgonovo","year":"1991"},{"issue":"3","key":"10.1016\/0166-5316(94)90055-8_BIB5","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/49.76631","article-title":"Effectiveness of the leaky-bucket policing mechanism in ATM networks","volume":"9","author":"Butto","year":"1991","journal-title":"J. Selected Areas Comm."},{"key":"10.1016\/0166-5316(94)90055-8_BIB6","series-title":"Teletraffic and Datatraffic in a Period of Change","first-page":"847","article-title":"Policing and call admission problems in ATM networks","author":"Castelli","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB7","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/BF01158791","article-title":"Analysis and design of rate based congestion control of high speed networks, I: stochastic fluid models, access regulation","volume":"9","author":"Elwalid","year":"1991","journal-title":"Queueing Systems"},{"key":"10.1016\/0166-5316(94)90055-8_BIB8","series-title":"Teletraffic and Datatraffic in a Period of Change","first-page":"495","article-title":"Statistical multiplexing of Markov modulated sources: theory and computational algorithms","author":"Elwalid","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB9","article-title":"A performance study of broadband networks","author":"Friesen","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB10","series-title":"The Theory of Matrices","author":"Gantmacher","year":"1959"},{"key":"10.1016\/0166-5316(94)90055-8_BIB11","series-title":"Kronecker Products and Matrix Calculus with Applications","author":"Graham","year":"1981"},{"issue":"7","key":"10.1016\/0166-5316(94)90055-8_BIB12","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/49.103545","article-title":"Equivalent capacity and its application to bandwidth allocation in high speed networks","volume":"9","author":"Gu\u00e9rin","year":"1991","journal-title":"IEEE J. Selected Areas Comm."},{"key":"10.1016\/0166-5316(94)90055-8_BIB13","series-title":"Queueing, Performance and Control in ATM","first-page":"111","article-title":"Evaluation of policing functions in ATM network","author":"Hemmer","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB14","volume":"Vol. 1","author":"Henrici","year":"1974"},{"key":"10.1016\/0166-5316(94)90055-8_BIB15","series-title":"Proc. International Symposium on Performance Computing and Communication Systems","first-page":"321","article-title":"Stochastic theory of data handling systems with groups of multiple sources","author":"Kosten","year":"1984"},{"key":"10.1016\/0166-5316(94)90055-8_BIB16","first-page":"71","article-title":"Liquid model for a type of information storage problems","volume":"Vol. 11","author":"Kosten","year":"1986"},{"issue":"7","key":"10.1016\/0166-5316(94)90055-8_BIB17","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1109\/26.87217","article-title":"A general solution technique for discrete queueing analysis of multimedia traffic on ATM","volume":"39","author":"Li","year":"1991","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0166-5316(94)90055-8_BIB18","series-title":"Pro-MatlabTM User's Guide","author":"The Math Works Inc.","year":"1989"},{"key":"10.1016\/0166-5316(94)90055-8_BIB19","series-title":"Queueing, Performance and Control in ATM","first-page":"117","article-title":"Input rate control for ATM networks","author":"Monteiro","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB20","series-title":"Structured Stochastic Matrices of M \/ G \/ 1 Type and Their Applications","author":"Neuts","year":"1989"},{"key":"10.1016\/0166-5316(94)90055-8_BIB21","series-title":"Proc. 7th ITC Seminar","article-title":"Policing mechanisms for ATM networks\u2014modelling and performance comparison","author":"Rathgeb","year":"1990"},{"key":"10.1016\/0166-5316(94)90055-8_BIB22","series-title":"Proc. ICC'93","first-page":"1386","article-title":"Asymptotic analysis of a leaky bucket controlled ATM multiplexer","author":"Ren","year":"1993"},{"key":"10.1016\/0166-5316(94)90055-8_BIB23","series-title":"Proc. IEEE GLOBECOM'89","first-page":"1764","article-title":"Congestion control through input rate regulation","author":"Sidi","year":"1989"},{"key":"10.1016\/0166-5316(94)90055-8_BIB24","series-title":"Proc. IEEE INFOCOM'91","first-page":"426","article-title":"On the performance of bursty and correlated sources subject to leaky bucket rate-based access control schemes","author":"Sohraby","year":"1991"},{"key":"10.1016\/0166-5316(94)90055-8_BIB25","doi-asserted-by":"crossref","first-page":"105","DOI":"10.2307\/1427514","article-title":"Analysis of separable Markov-modulated rate models for information-handling systems","volume":"23","author":"Stern","year":"1991","journal-title":"Adv. Appl. Probab."},{"issue":"10","key":"10.1016\/0166-5316(94)90055-8_BIB26","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MCOM.1986.1092946","article-title":"New directions in communications (or which way to the information age?)","volume":"24","author":"Turner","year":"1986","journal-title":"IEEE Comm. Mag."},{"key":"10.1016\/0166-5316(94)90055-8_BIB27","series-title":"Matrix Iterative Analysis","author":"Varga","year":"1962"},{"key":"10.1016\/0166-5316(94)90055-8_BIB28","series-title":"ICC'92 Conference Records","first-page":"1196","article-title":"Discrete-time analysis of leaky-bucket congestion control","author":"Wu","year":"1992"},{"key":"10.1016\/0166-5316(94)90055-8_BIB29","series-title":"Proc. ITC Specialists Seminar","article-title":"An efficient approach to analyze discrete-time queues with markovian arrivals and services in BISDNs","author":"Zhang","year":"1991"},{"issue":"3","key":"10.1016\/0166-5316(94)90055-8_BIB30","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1002\/dac.4510040303","article-title":"Analysis of a discrete-time queue with integrated bursty inputs in ATM networks","volume":"4","author":"Zhang","year":"1991","journal-title":"Int. J. Digital and Analog Comm. Systems"}],"container-title":["Performance Evaluation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0166531694900558?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0166531694900558?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T01:20:17Z","timestamp":1552612817000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0166531694900558"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1994,1]]}},"alternative-id":["0166531694900558"],"URL":"https:\/\/doi.org\/10.1016\/0166-5316(94)90055-8","relation":{},"ISSN":["0166-5316"],"issn-type":[{"value":"0166-5316","type":"print"}],"subject":[],"published":{"date-parts":[[1994,1]]}}}