{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T19:12:32Z","timestamp":1648667552672},"reference-count":20,"publisher":"Elsevier BV","issue":"1-2","license":[{"start":{"date-parts":[[1999,1,1]],"date-time":"1999-01-01T00:00:00Z","timestamp":915148800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[1999,1]]},"DOI":"10.1016\/s0169-7552(98)00228-1","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T02:57:10Z","timestamp":1027652230000},"page":"33-45","source":"Crossref","is-referenced-by-count":1,"title":["A burst-level priority scheme for bursty traffic in ATM networks"],"prefix":"10.1016","volume":"31","author":[{"given":"Jose Roberto","family":"Fernandez","sequence":"first","affiliation":[]},{"given":"Matt W.","family":"Mutka","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0169-7552(98)00228-1_BIB1","doi-asserted-by":"crossref","unstructured":"J. Jungok Bae, T. Suda, Survey of traffic control schemes and protocols in ATM networks. Proc. IEEE 79 (2) (February 1991) 170\u2013189.","DOI":"10.1109\/5.64405"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB2","doi-asserted-by":"crossref","unstructured":"K. Bala, I. Cidon, K. Sohraby, Congestion control for high speed packet switched networks, in: Proc. INFOCOM '90, IEEE, 1990, pp. 520\u2013526.","DOI":"10.1109\/INFCOM.1990.91290"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB3","doi-asserted-by":"crossref","unstructured":"J.-Y. Le Boudec, The Asynchronous Transfer Mode: a tutorial, Computer Networks and ISDN Systems 24 (1992) 279\u2013309.","DOI":"10.1016\/0169-7552(92)90114-6"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB4","doi-asserted-by":"crossref","unstructured":"P.E. Boyer, D.P. Tranchier, A reservation principle with applications to the ATM traffic control, Computer Networks and ISDN Systems 24 (1992) 321\u2013334.","DOI":"10.1016\/0169-7552(92)90116-8"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB5","doi-asserted-by":"crossref","unstructured":"M. Butto', E. Cavallero, A. Tonietti, Effectiveness of the \u201cleaky bucket\u201d policing mechanism in ATM networks, IEEE J. Sel. Areas Commun. 9 (3) (April 1991) 335\u2013342.","DOI":"10.1109\/49.76631"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB6","doi-asserted-by":"crossref","unstructured":"N.K. Cheung, The infrastructure for gigabit computer networks, IEEE Commun. Mag. (April 1992) 60\u201368.","DOI":"10.1109\/35.135790"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB7","doi-asserted-by":"crossref","unstructured":"M. Decina et al., Bandwidth assignment and virtual call blocking in ATM networks, in: Proc. INFOCOM '90, IEEE, 1990, pp. 881\u2013888.","DOI":"10.1109\/INFCOM.1990.91335"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB8","doi-asserted-by":"crossref","unstructured":"B.T. Doshi, P.K. Johri, Communication protocols for high speed packet networks, Computer Networks and ISDN Systems 24 (1992) 243\u2013273.","DOI":"10.1016\/0169-7552(92)90111-3"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB9","doi-asserted-by":"crossref","unstructured":"J.R. Fernandez, M.W. Mutka, A burst-oriented traffic control framework for ATM networks, in: Proc. ICCCN '95, IEEE, September 1995.","DOI":"10.1109\/ICCCN.1995.540111"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB10","doi-asserted-by":"crossref","unstructured":"J.R. Fernandez, M.W. Mutka, Model and call admission control for distributed applications with correlated bursty traffic, in: Proc. SUPERCOMPUTING '95, ACM, December 1995.","DOI":"10.1145\/224170.224190"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB11","doi-asserted-by":"crossref","unstructured":"G. Gallassi, G. Rigolio, L. Fratta, ATM: Bandwidth assignment and bandwidth enforcement policies, in: Proc. GLOBECOM '89, IEEE, 1989, pp. 1788\u20131793.","DOI":"10.1109\/GLOCOM.1989.64249"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB12","doi-asserted-by":"crossref","unstructured":"R. Gu\u00e9rin, H. Ahmadi, M. Naghshineh, Equivalent capacity and its application to bandwidth allocation in high-speed networks, IEEE J. Sel. Areas Commun. 9 (7) (September 1991) 968\u2013981.","DOI":"10.1109\/49.103545"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB13","doi-asserted-by":"crossref","unstructured":"I.W. Habib, T.N. Saadawi, Controlling flow and avoiding congestion in broadband networks, IEEE Commun. Mag. (October 1991) 46\u201353.","DOI":"10.1109\/35.99261"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB14","doi-asserted-by":"crossref","unstructured":"D.S. Holtsinger, H.G. Perros, Performance of the buffered leaky bucket policing mechanism, in: H. Perros (Ed.), High-Speed Communication Networks, Plenum Press, New York, 1992, pp. 47\u201369.","DOI":"10.1007\/978-1-4615-3450-1_5"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB15","doi-asserted-by":"crossref","unstructured":"J.Y. Hui, Resource allocation for broadband networks, IEEE J. Sel. Areas Commun. 6 (9) (December 1988) 1598\u20131608.","DOI":"10.1109\/49.12887"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB16","doi-asserted-by":"crossref","unstructured":"R. Rooholamini, V. Cherkassky, M. Garver, Finding the right ATM switch for the market, IEEE Computer (April 1994) 16\u201328.","DOI":"10.1109\/2.274995"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB17","doi-asserted-by":"crossref","unstructured":"H. Saito, Call admission control in an ATM network using upper bound of cell loss probability, IEEE Trans. Commun. 40 (9) (September 1992) 1512\u20131521.","DOI":"10.1109\/26.163572"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB18","doi-asserted-by":"crossref","unstructured":"J.S. Turner, New directions in communications (or which way to the information age?), IEEE Commun. Mag. 24 (10) (October 1986) 8\u201315.","DOI":"10.1109\/MCOM.1986.1092946"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB19","doi-asserted-by":"crossref","unstructured":"J.S. Turner, Managing bandwidth in ATM networks with bursty traffic, IEEE Network (September 1992) 50\u201358.","DOI":"10.1109\/65.157032"},{"key":"10.1016\/S0169-7552(98)00228-1_BIB20","doi-asserted-by":"crossref","unstructured":"F. Vakil, H. Saito, On congestion control in ATM networks, IEEE LTS (August 1991) 55\u201365.","DOI":"10.1109\/80.93306"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169755298002281?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0169755298002281?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,14]],"date-time":"2019-04-14T02:25:00Z","timestamp":1555208700000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0169755298002281"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,1]]},"references-count":20,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1999,1]]}},"alternative-id":["S0169755298002281"],"URL":"https:\/\/doi.org\/10.1016\/s0169-7552(98)00228-1","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[1999,1]]}}}