{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T14:32:17Z","timestamp":1648909937239},"reference-count":23,"publisher":"Elsevier BV","issue":"13","license":[{"start":{"date-parts":[[2003,8,1]],"date-time":"2003-08-01T00:00:00Z","timestamp":1059696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2003,8]]},"DOI":"10.1016\/s0140-3664(03)00030-6","type":"journal-article","created":{"date-parts":[[2003,4,4]],"date-time":"2003-04-04T23:49:40Z","timestamp":1049500180000},"page":"1445-1456","source":"Crossref","is-referenced-by-count":4,"title":["Coherent charging of differentiated services in the internet depending on congestion control aggressiveness"],"prefix":"10.1016","volume":"26","author":[{"given":"Philippe","family":"Owezarski","sequence":"first","affiliation":[]},{"given":"Nicolas","family":"Larrieu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(03)00030-6_BIB1","article-title":"Integrated services in the Internet architecture: an overview","volume":"June","author":"Braden","year":"1994","journal-title":"RFC 1633"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB2","article-title":"An architecture for differentiated services","volume":"December","author":"Black","year":"1998","journal-title":"RFC 2475"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB3","article-title":"TCP congestion control","volume":"April","author":"Allman","year":"1999","journal-title":"RFC 2581"},{"issue":"3","key":"10.1016\/S0140-3664(03)00030-6_BIB4","doi-asserted-by":"crossref","DOI":"10.1109\/90.392383","article-title":"Wide-Area Traffic: the failure of Poisson modeling","volume":"3","author":"Paxson","year":"1995","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB5","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45412-8_20","article-title":"Understanding the long-term self-similarity of Internet traffic","author":"Uhlig","year":"2001","journal-title":"Proceedings of Quality of Future Internet Services Workshop (QoFIS'2001)"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB6","unstructured":"Venkatachalam, M., Kaur, J., Vin, H., End-to-End Model for a Flow in the Internet, Proceedings of INFOCOM, 2003 (in press)."},{"issue":"6","key":"10.1016\/S0140-3664(03)00030-6_BIB7","article-title":"Self-similarity in World Wide Web traffic: evidence and possible causes","volume":"5","author":"Crovella","year":"1997","journal-title":"IEEE\/ATM Transactions on Networking"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB8","doi-asserted-by":"crossref","DOI":"10.1109\/90.282603","article-title":"On the self-similar nature of Ethernet traffic (extended version)","author":"Leland","year":"1994","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB9","article-title":"Experimental queueing analysis with long-range dependent traffic","volume":"April","author":"Erramilli","year":"1996","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB10","series-title":"Stochastic Modeling and the Theory of Queues","author":"Wolf","year":"1989"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB11","doi-asserted-by":"crossref","DOI":"10.1145\/347059.347397","article-title":"Equation-based congestion control for unicast applications","author":"Floyd","year":"2000","journal-title":"ACM SIGCOMM"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB12","series-title":"The Protocols","author":"Stevens","year":"1994"},{"issue":"3","key":"10.1016\/S0140-3664(03)00030-6_BIB13","doi-asserted-by":"crossref","DOI":"10.1145\/235160.235162","article-title":"Simulation-based Comparisons of Tahoe Reno, and SACK TCP","volume":"36","author":"Fall","year":"1996","journal-title":"Computer Communication Review"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB14","article-title":"The New Reno modification to TCP's fast recovery algorithm","volume":"April","author":"Floyd","year":"1999","journal-title":"RFC 2582"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB15","article-title":"TCP Selective Acknowledgment Options","volume":"October","author":"Mathis","year":"1999","journal-title":"RFC 2018"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB16","article-title":"Congestion avoidance and control","volume":"August","author":"Jacobson","year":"1998","journal-title":"Proceedings of SIGCOMM'98"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB17","article-title":"Promoting the use of end-to-end congestion control in the Internet","volume":"February","author":"Floyd","year":"1998","journal-title":"Transactions on Networking"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB18","doi-asserted-by":"crossref","DOI":"10.1145\/190314.190317","article-title":"TCP Vegas: new technique for congestion detection and avoidance","volume":"October","author":"Brakhmo","year":"1994","journal-title":"Proceedings Of ACM SIGCOMM'94, London"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB19","article-title":"Profile for DCP congestion control ID congestion control ID 3: TFRC congestion control","volume":"November","author":"Floyd","year":"2001","journal-title":"Internet Draft, IETF"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB20","doi-asserted-by":"crossref","DOI":"10.1145\/99508.99553","article-title":"Architectural Considerations for a New Generation of Protocols","volume":"September","author":"Clark","year":"1990","journal-title":"SIGCOMM Symposium on CommunicationsArchitectures and Protocols, (Philadelphia, PA)"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB21","article-title":"Conception et simulation d'une architecture \u00e0 diff\u00e9renciation de services alternative \u00e0 DiffServ","volume":"October","author":"Owezarski","year":"2001","journal-title":"Rapport LAAS No. 01447"},{"key":"10.1016\/S0140-3664(03)00030-6_BIB22","unstructured":"NetFlow Services Solutions Guide, http:\/\/www.cisco.com\/univercd\/cc\/td\/doc\/-cisintwk\/intsolns\/netflsol\/."},{"key":"10.1016\/S0140-3664(03)00030-6_BIB23","unstructured":"S. Axelson, Intrusion detection systems: a survey and taxonomy, Technical report No 99-15, Department of computer enfineering, Chalmers university of technology, Sweden, March 2000."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000306?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000306?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T16:55:26Z","timestamp":1584464126000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366403000306"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,8]]},"references-count":23,"journal-issue":{"issue":"13","published-print":{"date-parts":[[2003,8]]}},"alternative-id":["S0140366403000306"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(03)00030-6","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2003,8]]}}}