{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T17:58:51Z","timestamp":1649181531680},"reference-count":20,"publisher":"Elsevier BV","issue":"16","license":[{"start":{"date-parts":[[1998,10,1]],"date-time":"1998-10-01T00:00:00Z","timestamp":907200000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1998,10]]},"DOI":"10.1016\/s0140-3664(98)00189-3","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T16:06:36Z","timestamp":1027613196000},"page":"1401-1419","source":"Crossref","is-referenced-by-count":0,"title":["A unified approach to traffic control strategy in integrated broadband networks"],"prefix":"10.1016","volume":"21","author":[{"given":"T.Andrew","family":"Au","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00189-3_BIB1","unstructured":"A. Weinrib, L.T. Wu, Virtual clocks and leaky buckets: flow control protocols for high-speed networks, in: Protocols for High-Speed Networks, II, IFIP, 1991, pp. 3\u201315."},{"key":"10.1016\/S0140-3664(98)00189-3_BIB2","doi-asserted-by":"crossref","unstructured":"H. Zhang, S. Keshav, Comparison of rate-based service disciplines, in: Proc. SIGCOMM'91, 1991, pp. 113\u2013121.","DOI":"10.1145\/115992.116004"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB3","unstructured":"J.-C. Kwak, An integrated packet scheduling algorithm for high-speed packet-switched wide-area networks, in: Proceedings of Twelfth International Conference on Computer Communication, Seoul, Korea, Aug. 1995, pp. 487\u2013492."},{"key":"10.1016\/S0140-3664(98)00189-3_BIB4","unstructured":"K. van der Wal, D. Brandt, Characterization of cell level `burstiness' in ATM, in: Discussion Circles of the 13th International Teletraffic Congress, Copenhagen, Jan. 1991, pp. 149\u2013154."},{"issue":"1","key":"10.1016\/S0140-3664(98)00189-3_BIB5","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/18.61109","article-title":"A calculus for network delay, Part I: Network elements in isolation","volume":"37","author":"Cruz","year":"1991","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"6","key":"10.1016\/S0140-3664(98)00189-3_BIB6","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1002\/dac.4500080602","article-title":"Analysis of leaky bucket mechanism based on burstiness characterization","volume":"8","author":"Au","year":"1995","journal-title":"International Journal of Communications Systems"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB7","unstructured":"T.M. Au, H. Mehrpour, Delay performance of a leaky bucket regulated multiplexer based on burstiness characterization, in: Proc. IEEE GLOBECOM'95, Singapore, Nov. 1995, pp. 843\u2013847."},{"key":"10.1016\/S0140-3664(98)00189-3_BIB8","unstructured":"T.M. Au, H. Mehrpour, On the worst case loss behavior in statistical multiplexing, in: Proc. IEEE Int. Conf. Commun., Seattle, WA, June 1995, pp. 309\u2013315."},{"issue":"2","key":"10.1016\/S0140-3664(98)00189-3_BIB9","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/103720.103721","article-title":"Virtual clock: a new traffic control algorithm for packet-switched networks","volume":"9","author":"Zhang","year":"1991","journal-title":"ACM Trans. Computer Systems"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB10","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1002\/nav.3800070304","article-title":"Some problems in queueing with dynamic priorities","volume":"7","author":"Jackson","year":"1960","journal-title":"Naval Research Logistics Quarterly"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB11","unstructured":"N.K. Jaiswal, Priority Queues, Academic Press, 1968."},{"key":"10.1016\/S0140-3664(98)00189-3_BIB12","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1016\/0377-2217(89)90100-8","article-title":"Survey of scheduling research involving due date determination decisions","volume":"38","author":"Cheng","year":"1989","journal-title":"European Journal of Operational Research"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB13","doi-asserted-by":"crossref","unstructured":"J.S. Turner, Managing bandwidth in ATM networks with bursty traffic, in: IEEE Network, Sept. 1992, pp. 50\u201358.","DOI":"10.1109\/65.157032"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB14","doi-asserted-by":"crossref","unstructured":"R. Gu\u00e9rin, L. G\u00fcn, A unified approach to bandwidth allocation and access control in fast packet-switched networks, in: Proc. IEEE INFOCOM'92, 1992, pp. 1\u201312.","DOI":"10.1109\/INFCOM.1992.263412"},{"key":"10.1016\/S0140-3664(98)00189-3_BIB15","unstructured":"A. Gravey, G. Hebuterne, Mixing time and loss priorities in a single server queue, in: A. Jensen, V.B. Iversen (Eds.) Teletraffic and Datatraffic in a Period of Change, ITC-13, Elsevier Science, Amsterdam, 1991."},{"issue":"3","key":"10.1016\/S0140-3664(98)00189-3_BIB16","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1109\/90.311616","article-title":"On protective buffer policies","volume":"2","author":"Cidon","year":"1994","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"2","key":"10.1016\/S0140-3664(98)00189-3_BIB17","first-page":"11","article-title":"A review of voice, data and video traffic models for ATM","volume":"5","author":"Cosmas","year":"1994","journal-title":"European Trans. Telecomm. and Related Tech."},{"issue":"3","key":"10.1016\/S0140-3664(98)00189-3_BIB18","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/49.76630","article-title":"Modeling and performance comparison of policing mechanisms for ATM networks","volume":"9","author":"Rathgeb","year":"1991","journal-title":"IEEE J. Select. Areas Comm."},{"issue":"3","key":"10.1016\/S0140-3664(98)00189-3_BIB19","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/49.76631","article-title":"Effectiveness of the `leaky bucket' policing mechanism in ATM networks","volume":"9","author":"Butt\u00f3","year":"1991","journal-title":"IEEE J. Select. Areas Commun."},{"key":"10.1016\/S0140-3664(98)00189-3_BIB20","unstructured":"T.M. Au, From burstiness characterisation to traffic control strategy: a unified approach to integrated broadband networks, PhD Thesis, School of Electrical Engineering, The University of New South Wales, Australia, 1995."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001893?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498001893?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,26]],"date-time":"2019-04-26T11:30:21Z","timestamp":1556278221000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498001893"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,10]]},"references-count":20,"journal-issue":{"issue":"16","published-print":{"date-parts":[[1998,10]]}},"alternative-id":["S0140366498001893"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00189-3","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1998,10]]}}}