{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:34:12Z","timestamp":1649075652193},"reference-count":42,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1999,4,1]],"date-time":"1999-04-01T00:00:00Z","timestamp":922924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1999,4]]},"DOI":"10.1016\/s0140-3664(99)00056-0","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T22:56:11Z","timestamp":1027637771000},"page":"439-450","source":"Crossref","is-referenced-by-count":7,"title":["Traffic policing in ATM networks with multimedia traffic: the super leaky bucket"],"prefix":"10.1016","volume":"22","author":[{"given":"D.","family":"Gan","sequence":"first","affiliation":[]},{"given":"S.","family":"McKenzie","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(99)00056-0_BIB1","series-title":"ATM and Internet Protocol","author":"Bentall","year":"1998"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB2","doi-asserted-by":"crossref","unstructured":"T.A. Smit, The poor gain from statistical multiplexing in the homogeneous and heterogeneous case, Integrated Broadband Communications Networks and Services, 1994, pp. 213\u2013223.","DOI":"10.1016\/B978-0-444-81584-2.50025-2"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB3","unstructured":"F. Bono, S. Montagna, R. Paglino, Performance Analysis of an ATM statistical Multiplexer with heterogeneous bursty traffic, 11th Conference on Computer Communications, Genoa, vol. 2, 1992, pp. 737\u2013742."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB4","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1016\/0140-3664(96)01062-6","article-title":"Capacity Reservation in ATM Networks","volume":"19","author":"Karlsson","year":"1996","journal-title":"Computer Communications"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB5","unstructured":"T.M.Jadoon, D.A. Harle, On mean policing with bursty traffic specification and allocation (BTSA) police function, Third IFIP Workshop on Performance Modelling and Evaluation of ATM, Ilkley, West Yorkshire, UK, Technical Paper 23, July 1995."},{"issue":"2","key":"10.1016\/S0140-3664(99)00056-0_BIB6","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1109\/5.64405","article-title":"Survey of Traffic Control Schemes and Protocols in ATM networks","volume":"79","author":"Bae","year":"1991","journal-title":"Proceediongs of the IEEE"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB7","unstructured":"D. Ruiu, The test challenges of compressed digital video, Hewlett Packard Digital Video Test Symposium, University of Westminster, 1996."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB8","series-title":"Computer Networks","author":"Tanenbaum","year":"1996"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB9","first-page":"713","article-title":"Implementation of a police criterion calculator based on the leaky bucket algorithm","volume":"93","author":"Van der Waal","year":"1993","journal-title":"IEEE Globecom."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB10","unstructured":"P. Key, An introduction to ATM performance issues in modelling, Second IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, University of Bradford UK, Tutorial Paper 1, 4\u20137 July 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB11","unstructured":"O. Casals, Traffic control functions in ATM: usage\/network parameter control and traffic shaping, Second IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, University of Bradford UK, Tutorial Paper 4, 4\u20137 July 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB12","series-title":"Introduction to ATM Design and Performance","author":"Pitts","year":"1997"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB13","unstructured":"D. Ruiu, An overview of MPEG, Hewlett Packard Digital Video Test Symposium, University of Westminster, 1996."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB14","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1016\/S0169-7552(97)00121-9","article-title":"Performance analysis of cell discarding techniques for best effort video communications over ATM networks","volume":"29","author":"Meheoua","year":"1998","journal-title":"Computer Networks and ISDN Systems"},{"issue":"6","key":"10.1016\/S0140-3664(99)00056-0_BIB15","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1016\/0140-3664(94)90127-9","article-title":"Traffic source models for ATM networks: a survey","volume":"17","author":"Stamoulis","year":"1994","journal-title":"Computer Communications"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB16","unstructured":"E. Di Nitto, A. Iera, S. Marano, Avalanche tagging: a new proposal for policing function in ATM environment, Proceedings of the 11th International Conference on Computer Communication, Genoa, Italy, vol. 2, 1992, pp. 725\u2013730."},{"issue":"7","key":"10.1016\/S0140-3664(99)00056-0_BIB17","doi-asserted-by":"crossref","first-page":"1233","DOI":"10.1109\/5.56935","article-title":"Source coding of speech and video signals","volume":"78","author":"Singhal","year":"1990","journal-title":"Proceedings of the IEEE"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB18","unstructured":"G.Y.Gerzon, L.F. Turner, An overload control scheme for time division multiplexed packet voice, Proceedings of 1991 Singapore International Conference on Networks, 1991, pp. 382\u2013387."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB19","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1016\/0169-7552(92)90096-9","article-title":"Performance analysis of LB bandwidth enforcement strategy for bursty traffics in an ATM network","volume":"25","author":"Kim","year":"1992","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB20","unstructured":"B.R. Haverkort, H.P. Idzenga, B.G. Kim, Performance evaluation of ATM cell scheduling policies using stochastic petri nets, Second IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, University of Bradford UK, Technical Paper 17, 4\u20137 July 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB21","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/0169-7552(94)90066-3","article-title":"Study on optimal queue-length-threshold scheduling policy for an atm multiplexer with finite buffers and batch poisson arrivals","volume":"26","author":"Chang","year":"1994","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB22","doi-asserted-by":"crossref","first-page":"653","DOI":"10.1016\/0169-7552(95)00008-9","article-title":"Analysis of a finite buffer queue with heterogeneous Markov modulated arrival processes: a study of traffic burstiness and priority packet discarding","volume":"28","author":"Kim","year":"1996","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB23","doi-asserted-by":"crossref","unstructured":"D.E.Gan, S. Mckenzie, Performance of an ATM network with multimedia traffic\u2014a simulation study, IEE International Broadcasting Convention, Amsterdam, Publication. No. 413 , September 1995, pp. 263\u2013268.","DOI":"10.1049\/cp:19950963"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB24","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1016\/S0169-7552(96)00104-3","article-title":"Performance analysis of a leaky bucket scheme with a threshold in the data buffer","volume":"29","author":"Choi","year":"1997","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB25","doi-asserted-by":"crossref","first-page":"2201","DOI":"10.1016\/S0169-7552(97)00110-4","article-title":"First-order rate-based flow control with dynamic queue thershold for high-speed wide-area ATM networks","volume":"29","author":"Chong","year":"1998","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB26","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1016\/S0169-7552(97)00135-9","article-title":"LB-SELA: rate-based access control for ATM networks","volume":"30","author":"Atlasis","year":"1998","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB27","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1016\/S0169-7552(96)00118-3","article-title":"Scheduling and admission control policies: a case study for ATM","volume":"29","author":"Steehaut","year":"1997","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB28","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1016\/S0169-7552(96)00119-5","article-title":"Quality of services based on both call admission and cell scheduling","volume":"29","author":"Cheng","year":"1997","journal-title":"Computer Networks and ISDN Systems"},{"issue":"7","key":"10.1016\/S0140-3664(99)00056-0_BIB29","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/49.103559","article-title":"Local area network traffic characterisations, with implications for broadband network congestion management","volume":"9","author":"Fowler","year":"1991","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1","key":"10.1016\/S0140-3664(99)00056-0_BIB30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1002\/j.1538-7305.1965.tb04135.x","article-title":"A technique for investigating on-off patterns of speech","volume":"XLIV","author":"Brady","year":"1965","journal-title":"The Bell System Technical Journal"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB31","doi-asserted-by":"crossref","first-page":"2445","DOI":"10.1002\/j.1538-7305.1969.tb01181.x","article-title":"A model for generating on-off speech patterns in two-way traffic","volume":"18","author":"Brady","year":"1969","journal-title":"The Bell System Technical Journal"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB32","unstructured":"R.O.Onvural, Asynchronous Transfer Mode Networks-Performance Issues, ch. 2, Artech House, 1994, pp. 20\u201321."},{"issue":"7","key":"10.1016\/S0140-3664(99)00056-0_BIB33","doi-asserted-by":"crossref","first-page":"1107","DOI":"10.1109\/26.87216","article-title":"Delay analysis of a packet voice multiplexer by the (Di\/D\/1 queue","volume":"39","author":"Ramathurthy","year":"1991","journal-title":"IEEE Transactions on Communications"},{"issue":"5","key":"10.1016\/S0140-3664(99)00056-0_BIB34","doi-asserted-by":"crossref","first-page":"865","DOI":"10.1109\/49.32350","article-title":"Models for packet switching of VBR sources","volume":"7","author":"Sen","year":"1989","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB35","unstructured":"M.R.Izquierdo, D.S. Reeves, Statistical Characterisation VBR MPEG at the Slice Layer, Technical Report, North Carolina State University, Raleigh, NC27695, June 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB36","unstructured":"A. Arvidsson, V. Lind, On the validity of some markovian models in atm traffic modelling, Third IFIP Workshop on Performance Modelling and Evaluation of ATM, Ilkley, West Yorkshire, UK, Technical Paper 36, July 1995."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB37","unstructured":"M.R. Izquierdo, D.S. Reeves, A Survey Of Source Models for Variable Bit Rate Encoded Video Techical Report-North Carolina State University, Raleigh, NC27695, 1996."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB38","doi-asserted-by":"crossref","first-page":"2058","DOI":"10.1016\/S0169-7552(97)00123-2","article-title":"A generic smoothing algorithm for RT VBR video traffic","volume":"29","author":"Coelho","year":"1998","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB39","unstructured":"A. Platt, Congestion control on demand, Second IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, University of Bradford UK, Technical Paper 55, 4\u20137 July 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB40","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/MSPEC.1987.6448135","article-title":"Telecommunications in the coming decades","author":"Weinstein","year":"1987","journal-title":"IEEE Spectrum"},{"key":"10.1016\/S0140-3664(99)00056-0_BIB41","unstructured":"D.E.Gan, S. McKenzie, Source modelling for B-ISDN networks with ATM switching, IEE Multimedia Communication Systems Colloquium, London UK, Paper 8, March 1994."},{"key":"10.1016\/S0140-3664(99)00056-0_BIB42","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1002\/dac.4510030214","article-title":"The leaky bucket policing method in the ATM (asynchronous transfer mode) network","volume":"3","author":"Niestegge","year":"1990","journal-title":"International Journal of Digital and Analog Communications Systems"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499000560?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366499000560?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,2,5]],"date-time":"2020-02-05T01:06:18Z","timestamp":1580864778000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366499000560"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,4]]},"references-count":42,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1999,4]]}},"alternative-id":["S0140366499000560"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(99)00056-0","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1999,4]]}}}