{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T05:27:50Z","timestamp":1733376470311,"version":"3.30.1"},"reference-count":53,"publisher":"Elsevier BV","issue":"13","license":[{"start":{"date-parts":[[2001,8,1]],"date-time":"2001-08-01T00:00:00Z","timestamp":996624000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2001,8]]},"DOI":"10.1016\/s0140-3664(01)00286-9","type":"journal-article","created":{"date-parts":[[2002,10,31]],"date-time":"2002-10-31T19:09:39Z","timestamp":1036091379000},"page":"1299-1318","source":"Crossref","is-referenced-by-count":2,"title":["A priority leaky-bucket regulator for virtual path traffic in ATM networks"],"prefix":"10.1016","volume":"24","author":[{"given":"J.","family":"Zeng","sequence":"first","affiliation":[]},{"given":"N.H.","family":"Loukas","sequence":"additional","affiliation":[]},{"given":"L.","family":"Merakos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB1","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/26.221076","article-title":"Congestion control through input rate regulation","volume":"41","author":"Sidi","year":"1993","journal-title":"IEEE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"G.M. Woodruff, R.G.H. Rogers, P.S. Richards, A congestion control framework for high-speed integrated packetized transport, Proc: IEEE GLOBECOM\u201988, Hollywood, USA, pp. 203\u2013207.","key":"10.1016\/S0140-3664(01)00286-9_BIB2","DOI":"10.1109\/GLOCOM.1988.25837"},{"issue":"2","key":"10.1016\/S0140-3664(01)00286-9_BIB3","first-page":"165","article-title":"Performance analysis of a rate control throttle where tokens and jobs queue","volume":"9","author":"Berger","year":"1991","journal-title":"IEEE JSAC"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB4","doi-asserted-by":"crossref","first-page":"1871","DOI":"10.1002\/j.1538-7305.1982.tb03089.x","article-title":"Stochastic theory of a data-handling system with multiple sources","volume":"61","author":"Anick","year":"1982","journal-title":"Bell Syst. Tech. J."},{"doi-asserted-by":"crossref","unstructured":"H. Ahmadi, R. Guerin, K. Sohraby, Analysis of leaky-bucket access control mechanism with batch arrival process, Proc. IEEE GLOBECOM\u201990, San Diego, USA, Dec. 1990, pp. 344\u2013349.","key":"10.1016\/S0140-3664(01)00286-9_BIB5","DOI":"10.1109\/GLOCOM.1990.116534"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB6","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/0166-5316(94)90055-8","article-title":"Performance analysis of a leaky-bucket controlled ATM multiplexer","volume":"19","author":"Ren","year":"1994","journal-title":"Perform. Eval."},{"key":"10.1016\/S0140-3664(01)00286-9_BIB7","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1007\/BF01158791","article-title":"Analysis and design of rate-based congestion control high speed networks, I: stochastic fluid models, access regulation","volume":"9","author":"Elwalid","year":"1991","journal-title":"Queueing Syst."},{"key":"10.1016\/S0140-3664(01)00286-9_BIB8","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0169-7552(92)90096-9","article-title":"Performance analysis of leaky-bucket bandwidth enforcement strategy for bursty traffics in an ATM network","volume":"25","author":"Kim","year":"1992","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"2-4","key":"10.1016\/S0140-3664(01)00286-9_BIB9","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1109\/TCOMM.1994.577075","article-title":"On the performance of bursty and modulated sources subject to leaky-bucket rate-based access control schemes","volume":"42","author":"Sohraby","year":"1994","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB10","first-page":"325","article-title":"Modelling and performance comparison of policing mechanisms for ATM networks","volume":"9","author":"Rathegeb","year":"1991","journal-title":"IEEE JSAC"},{"issue":"6","key":"10.1016\/S0140-3664(01)00286-9_BIB11","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/26.231916","article-title":"Analysis of a rate based access control mechanism for high speed networks","volume":"41","author":"Ahmadi","year":"1993","journal-title":"IEEE Trans. Commun."},{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB12","first-page":"335","article-title":"Effectiveness of the leaky-bucket policing mechanism in ATM networks","volume":"9","author":"Butto","year":"1991","journal-title":"IEEE JSAC"},{"doi-asserted-by":"crossref","unstructured":"K. Bala, I. Cidon, K. Sohraby, Congestion control for high-speed packet switch, Proc. IEEE INFOCOM\u201990, San Francisco, USA, June 1990.","key":"10.1016\/S0140-3664(01)00286-9_BIB13","DOI":"10.1109\/INFCOM.1990.91290"},{"doi-asserted-by":"crossref","unstructured":"N. Yin, M.G. Hluchyj, Analysis of the leaky-bucket algorithm for on-off data sources, Proc. IEEE GLOBECOM\u201991, 1991, pp. 254\u2013258.","key":"10.1016\/S0140-3664(01)00286-9_BIB14","DOI":"10.1109\/GLOCOM.1991.188394"},{"doi-asserted-by":"crossref","unstructured":"A. Lin, J.A. Silvester, Priority queueing strategies for traffic control at a multichannel ATM switching system, Proc. IEEE GLOBECOM\u201991, 1991, pp. 234\u2013238.","key":"10.1016\/S0140-3664(01)00286-9_BIB15","DOI":"10.1109\/GLOCOM.1991.188390"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB16","series-title":"Input Rate Control for ATM Networks","first-page":"117","author":"Monteiro","year":"1991"},{"unstructured":"J.A.S. Monteiro, M. Geria, L. Fratta, Leaky-bucket input rate control in ATM networks, Proc. ICCC\u201990, New Delhi, India, 1990, pp. 370\u2013376.","key":"10.1016\/S0140-3664(01)00286-9_BIB17"},{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB18","first-page":"408","article-title":"An efficient solution method for Markov models of ATM links with loss priorities","volume":"9","author":"Le Boudec","year":"1991","journal-title":"IEEE JSAC"},{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB19","first-page":"418","article-title":"Priority management in ATM switching nodes","volume":"9","author":"Kroner","year":"1991","journal-title":"IEEE JSAC"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB20","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1002\/dac.4520010208","article-title":"PARIS: an approach to integrated high-speed networks","volume":"1","author":"Cidon","year":"1998","journal-title":"Int. J. Digital Analog Cabled Syst."},{"issue":"8","key":"10.1016\/S0140-3664(01)00286-9_BIB21","doi-asserted-by":"crossref","first-page":"1212","DOI":"10.1109\/26.58754","article-title":"Broad-band ATM network architecture based on virtual paths","volume":"38","author":"Sato","year":"1990","journal-title":"IEEE Trans. Commun."},{"issue":"7","key":"10.1016\/S0140-3664(01)00286-9_BIB22","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/26.153369","article-title":"Dynamic bandwidth control of the virtual path in an asynchronous transfer mode network","volume":"40","author":"Ohta","year":"1992","journal-title":"IEEE Trans. Commun."},{"issue":"9","key":"10.1016\/S0140-3664(01)00286-9_BIB23","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/35.90492","article-title":"B-ISDN resource management: the role of virtual paths","volume":"29","author":"Burgin","year":"1991","journal-title":"IEEE Com. Mag.\u201989"},{"issue":"5","key":"10.1016\/S0140-3664(01)00286-9_BIB24","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/65.539856","article-title":"Resource management with virtual paths in ATM networks","volume":"10","author":"Friesen","year":"1996","journal-title":"IEEE Netw. Mag."},{"doi-asserted-by":"crossref","unstructured":"G. Gallassi, G. Rigolio, L. Fratta, ATM: bandwidth assignment and bandwidth enforcement policies, Proc. IEEE GLOBECOM\u201989, Dallas, USA, Nov. 1989, pp. 1788\u20131793.","key":"10.1016\/S0140-3664(01)00286-9_BIB25","DOI":"10.1109\/GLOCOM.1989.64249"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB26","article-title":"New results on the single queue with a batch Markovian arrival process","volume":"7","author":"Lucantoni","year":"1991","journal-title":"Stochastic Models"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB27","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0166-5316(93)E0044-6","article-title":"Analysis of a nonpreemptive queue with SPP arrivals of high class","volume":"21","author":"Sugahara","year":"1995","journal-title":"Perform. Eval."},{"key":"10.1016\/S0140-3664(01)00286-9_BIB28","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0166-5316(94)90010-8","article-title":"Mean waiting times in nonpreemptive priority queues with Markovian arrival and i.i.d. service processes","volume":"20","author":"Takine","year":"1994","journal-title":"Perform. Eval."},{"unstructured":"B.D. Choi et al., Priority queue with two state Markov modulated arrivals, Proc. IEEE ICC\u201996, Dallas, USA, June 1996, pp. 1055\u20131059.","key":"10.1016\/S0140-3664(01)00286-9_BIB29"},{"doi-asserted-by":"crossref","unstructured":"A.I. Elwalid, D. Mitra, Fluid models for the analysis and design of statistical multiplexing with loss priorities on multiple classes of bursty traffic, Proc. IEEE INFOCOM\u201992, Florence, Italy, May 1992, pp. 415\u2013425.","key":"10.1016\/S0140-3664(01)00286-9_BIB30","DOI":"10.1109\/INFCOM.1992.263581"},{"doi-asserted-by":"crossref","unstructured":"A. Khamisy, M. Sidi, Discrete-time priority queueing systems with two-state Markov modulated arrival process, Proc. IEEE INFOCOM\u201991, Bal Harbour, USA, 1991, pp. 1456\u20131463.","key":"10.1016\/S0140-3664(01)00286-9_BIB31","DOI":"10.1109\/INFCOM.1991.147677"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB32","series-title":"A discrete-time priority queue with switched batch Bernoulli process inputs and constant service times","first-page":"521","author":"Hashida","year":"1991"},{"issue":"2\u20134","key":"10.1016\/S0140-3664(01)00286-9_BIB33","doi-asserted-by":"crossref","first-page":"1837","DOI":"10.1109\/TCOMM.1994.582893","article-title":"An analysis of a discrete time queue for broadband ISDN with priorities among traffic classes","volume":"42","author":"Takine","year":"1994","journal-title":"IEEE Trans. Commun."},{"doi-asserted-by":"crossref","unstructured":"C. Blondia, O. Casals, Performance analysis of statistical multiplexing of VBR sources, Proc. IEEE INFOCOM\u2019 92, Florence, Italy, May 1992, pp. 828\u2013838.","key":"10.1016\/S0140-3664(01)00286-9_BIB34","DOI":"10.1109\/INFCOM.1992.263492"},{"doi-asserted-by":"crossref","unstructured":"D. Veitch, Novel models of broadband traffic, IEEE GLOBECOM\u2019 93, Houston. Texas, November 1993, pp. 1057\u20131061.","key":"10.1016\/S0140-3664(01)00286-9_BIB35","DOI":"10.1109\/GLOCOM.1993.318238"},{"issue":"1","key":"10.1016\/S0140-3664(01)00286-9_BIB36","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/90.282603","article-title":"On the self-similar nature of ethernet traffic (extended version)","volume":"2","author":"Leland","year":"1994","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"10.1016\/S0140-3664(01)00286-9_BIB37","first-page":"367","article-title":"Analysis of dynamic control for LAN interconnection through ATM networks","volume":"E76-B","author":"Ohba","year":"1994","journal-title":"IEICE Trans. Commun."},{"year":"1995","author":"Stewart","series-title":"Introduction to the Numerical Solution of Markov Chains","key":"10.1016\/S0140-3664(01)00286-9_BIB38"},{"issue":"8","key":"10.1016\/S0140-3664(01)00286-9_BIB39","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/35.299837","article-title":"Traffic management for ATM local area networks","volume":"32","author":"Newman","year":"1994","journal-title":"IEEE Commun. Mag."},{"year":"1975","author":"Cinlar","series-title":"Introduction to Stochastic Processes","key":"10.1016\/S0140-3664(01)00286-9_BIB40"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB41","doi-asserted-by":"crossref","first-page":"571","DOI":"10.1002\/nav.3800310407","article-title":"Finite Markov chain models skip-free in one direction","volume":"31","author":"Latouche","year":"1984","journal-title":"Naval Res. Logistics Q."},{"issue":"5","key":"10.1016\/S0140-3664(01)00286-9_BIB42","first-page":"729","article-title":"Queueing analysis of delay constrained voice traffic in a packet switching system","volume":"7","author":"Yuan","year":"1989","journal-title":"IEEE JSAC"},{"key":"10.1016\/S0140-3664(01)00286-9_BIB43","first-page":"856","article-title":"Modulated characterization of voice and data traffic and related statistical multiplexer performance","volume":"4","author":"Heffes","year":"1986","journal-title":"IEEE JSAC"},{"year":"1995","author":"On nural","series-title":"Asynchronous Transfer Mode Networks: Performance Issues","key":"10.1016\/S0140-3664(01)00286-9_BIB44"},{"issue":"2","key":"10.1016\/S0140-3664(01)00286-9_BIB45","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/204826.204852","article-title":"Virtual private networks","volume":"38","author":"Fotedar","year":"1995","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"H.J, Chao, Design of leaky bucket access control schemes in ATM networks, Proc. ICC\u201991, June 1991, pp. 180\u2013187.","key":"10.1016\/S0140-3664(01)00286-9_BIB46","DOI":"10.1109\/ICC.1991.162356"},{"issue":"6","key":"10.1016\/S0140-3664(01)00286-9_BIB47","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/90.266058","article-title":"Queueing analysis of a threshold based priority scheme for ATM networks","volume":"1","author":"Lee","year":"1993","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"9","key":"10.1016\/S0140-3664(01)00286-9_BIB48","first-page":"1397","article-title":"Analysis of a partial buffer sharing scheme for a finite buffer with batch Poisson inputs under whole batch acceptance rule","volume":"E82-B","author":"Sumita","year":"1999","journal-title":"IEICE Trans. Commun."},{"issue":"4","key":"10.1016\/S0140-3664(01)00286-9_BIB49","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1049\/ip-com:19971179","article-title":"Performance analysis of space priority mechanisms in an input and output queueing ATM switch","volume":"144","author":"Lee","year":"1997","journal-title":"IEE Commun."},{"doi-asserted-by":"crossref","unstructured":"A.K. Gupta, N.D. Georganas, Priority performance of ATM switches, Proc. INFOCOM\u2019 92, 1992, pp. 727\u2013733.","key":"10.1016\/S0140-3664(01)00286-9_BIB50","DOI":"10.1109\/INFCOM.1992.263498"},{"issue":"1","key":"10.1016\/S0140-3664(01)00286-9_BIB51","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1109\/26.68282","article-title":"Performance of study of an input queueing packet switch with two priority classes","volume":"39","author":"Chen","year":"1991","journal-title":"IEEE Trans. Commun."},{"issue":"5","key":"10.1016\/S0140-3664(01)00286-9_BIB52","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1016\/S0140-3664(99)00056-0","article-title":"Traffic policing in ATM networks with multimedia traffic: the super leaky bucket","volume":"22","author":"Gan","year":"1999","journal-title":"Comput. Commun."},{"issue":"7","key":"10.1016\/S0140-3664(01)00286-9_BIB53","first-page":"781","article-title":"Performance analysis of a leaky bucket scheme with a threshold in the data buffer","volume":"29","author":"Choi","year":"1997","journal-title":"Comput. Netw."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366401002869?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366401002869?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T15:05:38Z","timestamp":1733324738000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366401002869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,8]]},"references-count":53,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2001,8]]}},"alternative-id":["S0140366401002869"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(01)00286-9","relation":{},"ISSN":["0140-3664"],"issn-type":[{"type":"print","value":"0140-3664"}],"subject":[],"published":{"date-parts":[[2001,8]]}}}