{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T05:48:41Z","timestamp":1648964921277},"reference-count":17,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1999,2,1]],"date-time":"1999-02-01T00:00:00Z","timestamp":917827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1999,2]]},"DOI":"10.1016\/s0140-3664(98)00258-8","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T19:03:07Z","timestamp":1027623787000},"page":"258-265","source":"Crossref","is-referenced-by-count":2,"title":["On the impact of traffic control algorithms on resource management in ATM networks"],"prefix":"10.1016","volume":"22","author":[{"given":"Vincenzo","family":"Catania","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Ficili","sequence":"additional","affiliation":[]},{"given":"Daniela","family":"Panno","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(98)00258-8_BIB1","unstructured":"ITU-TSS Recommendation I.371: Traffic control and congestion control in B-ISDN, Frozen Issue, and March 1995."},{"key":"10.1016\/S0140-3664(98)00258-8_BIB2","unstructured":"ATM Forum: Traffic management specification, Version 4.0, Draft Version, April 1995."},{"key":"10.1016\/S0140-3664(98)00258-8_BIB3","doi-asserted-by":"crossref","unstructured":"A.Berger, A.Eckberg, A B-ISDN\/ATM traffic descriptor, and its use in traffic and congestion controls, Proc. GLOBECOM\u2019 91, Phoenix, Dec. 1991.","DOI":"10.1109\/GLOCOM.1991.188396"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB4","doi-asserted-by":"crossref","unstructured":"F.Guillemin, P.Boyer, A.Dupuis, L.Romoeuf, Peak rate enforcement in ATM networks, Proc. INFOCOM\u201992, Firenze, May 1992.","DOI":"10.1109\/INFCOM.1992.263502"},{"issue":"7","key":"10.1016\/S0140-3664(98)00258-8_BIB5","first-page":"968","article-title":"Equivalent capacity and its application to bandwidth allocation in high speed networks","volume":"9","author":"Guerin","year":"1991","journal-title":"IEEE JSAC"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB6","doi-asserted-by":"crossref","unstructured":"K.Sohraby, On the asymptotic behaviour of heterogeneous statistical multiplexer with applications, Proc. INFOCOM\u201992 Firenze, May 1992.","DOI":"10.1109\/INFCOM.1992.263493"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB7","doi-asserted-by":"crossref","unstructured":"H.Saito, Call admission control in an ATM network using upper bound of cell loss probability, IEEE\/ACM Transactions on networking, 40 (9) Sept. 1992.","DOI":"10.1109\/26.163572"},{"issue":"10","key":"10.1016\/S0140-3664(98)00258-8_BIB8","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MCOM.1986.1092946","article-title":"New directions in communications (or which way to the information age?)","volume":"24","author":"Turner","year":"1986","journal-title":"IEEE Journal communications magazine"},{"issue":"3","key":"10.1016\/S0140-3664(98)00258-8_BIB9","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/49.76632","article-title":"Flow enforcement algorithms for ATM networks","volume":"9","author":"Dittmann","year":"1991","journal-title":"IEEE Journal on selected areas in communications"},{"issue":"3","key":"10.1016\/S0140-3664(98)00258-8_BIB10","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1109\/49.76630","article-title":"Modeling and performance comparison of policing mechanisms for ATM networks","volume":"9","author":"Rathgeb","year":"1991","journal-title":"IEEE Journal on selected areas in communications"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB11","doi-asserted-by":"crossref","unstructured":"V.Catania, G.Ficili, S.Palazzo, D.Panno, A comparative analysis of fuzzy versus conventional policing mechanisms for ATM networks, IEEE\/ACM Transactions on networking, 4 (3) June 1996.","DOI":"10.1109\/90.502243"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB12","doi-asserted-by":"crossref","unstructured":"D.Jensen, B-ISDN network management by a fuzzy logic controller, Proc. Globecom\u201994, San Francisco, Nov. 1994.","DOI":"10.1007\/978-3-642-79386-8_35"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB13","doi-asserted-by":"crossref","unstructured":"C.Douligeris, G.Develekos, A fuzzy logic approach to congestion control in ATM networks, Proc. IEEE ICC\u201995, Seattle, June 1995.","DOI":"10.1109\/ICC.1995.524539"},{"issue":"6","key":"10.1016\/S0140-3664(98)00258-8_BIB14","doi-asserted-by":"crossref","first-page":"1088","DOI":"10.1109\/49.310965","article-title":"A novel neural network traffic enforcement mechanism for ATM networks","volume":"12","author":"Tarraf","year":"1994","journal-title":"IEEE Journal on selected areas in communications"},{"issue":"9","key":"10.1016\/S0140-3664(98)00258-8_BIB15","doi-asserted-by":"crossref","first-page":"1488","DOI":"10.1109\/49.339916","article-title":"Fuzzy neural control of voice cells in ATM networks","volume":"12","author":"Ndousse","year":"1994","journal-title":"IEEE journal on selected areas in communications"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB16","doi-asserted-by":"crossref","unstructured":"G.Ascia, V.Catania, G.Ficili, S.Palazzo, D.Panno, A VLSI fuzzy expert system for real time traffic control in ATM networks, IEEE transactions on fuzzy systems, 5 (1) Feb. 1997.","DOI":"10.1109\/91.554444"},{"key":"10.1016\/S0140-3664(98)00258-8_BIB17","doi-asserted-by":"crossref","unstructured":"G.Ficili, D.Panno, Performance analysis of a fuzzy system in the policing of packetized voice sources, Proc. Broadband communcations\u201996, Montreal, Apr. 1996.","DOI":"10.1007\/978-0-387-34987-9_18"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002588?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366498002588?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,15]],"date-time":"2020-01-15T00:56:22Z","timestamp":1579049782000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366498002588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,2]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1999,2]]}},"alternative-id":["S0140366498002588"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(98)00258-8","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1999,2]]}}}