{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:45:29Z","timestamp":1761806729498,"version":"3.30.1"},"reference-count":35,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2000,9,1]],"date-time":"2000-09-01T00:00:00Z","timestamp":967766400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2000,9]]},"DOI":"10.1016\/s1389-1286(00)00090-6","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:19:33Z","timestamp":1049735973000},"page":"341-353","source":"Crossref","is-referenced-by-count":45,"title":["The use of learning algorithms in ATM networks call admission control problem: a methodology"],"prefix":"10.1016","volume":"34","author":[{"given":"Antonios F.","family":"Atlasis","sequence":"first","affiliation":[]},{"given":"Nikolaos H.","family":"Loukas","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(00)00090-6_BIB1","unstructured":"ITU-T, Draft Recommendation I.371: Traffic Control and Congestion Control in B-ISDN, Geneva, May 1996"},{"issue":"4","key":"10.1016\/S1389-1286(00)00090-6_BIB2","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/TSMC.1974.5408453","article-title":"Learning automata: A survey","volume":"4","author":"Narendra","year":"1974","journal-title":"IEEE Trans. Systems Man Cybernet."},{"issue":"11","key":"10.1016\/S1389-1286(00)00090-6_BIB3","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/35.544197","article-title":"Call admission control schemes: A review","volume":"34","author":"Perros","year":"1996","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB4","unstructured":"G. Galassi, G. Rigolio, L. Fratta, ATM: Bandwidth assignment and bandwidth enforcement policies, in: GLOBECOM'89, Dallas, USA, November 1989"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB5","unstructured":"C.B. Lee, K.B. Ha, R.H. Park, Connection admission control for video traffic using modified equivalent capacity, in: GLOBECOM'95, pp. 427\u2013431"},{"issue":"7","key":"10.1016\/S1389-1286(00)00090-6_BIB6","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/49.103545","article-title":"Equivalent capacity and its applications in high-speed networks","volume":"9","author":"Guerin","year":"1991","journal-title":"IEEE J. Select Areas Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB7","doi-asserted-by":"crossref","unstructured":"M. Decina, T. Tonniati, P. Vaccari, L. Verri, Bandwidth assignment and virtual call blocking in ATM networks, in: INFOCOM'90, 1990, pp. 881\u2013888","DOI":"10.1109\/INFCOM.1990.91335"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB8","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1109\/90.234855","article-title":"Effective bandwidth of general Markovian traffic sources and admission control of high speed networks","volume":"1","author":"Anick","year":"1993","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB9","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1109\/49.400656","article-title":"Fundamental bounds and approximations for ATM multiplexers with applications to video teleconferencing","volume":"13","author":"Elwalid","year":"1995","journal-title":"IEEE J. Select Areas Commun."},{"issue":"1","key":"10.1016\/S1389-1286(00)00090-6_BIB10","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/72.80211","article-title":"ATM communications networks control by neural networks","volume":"1","author":"Hiramatsu","year":"1990","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB11","unstructured":"R.J.T. Morris, Prospects for neural networks in broadband network resource management, in: ITC-13, North-Holland, Amsterdam, 1991, pp. 335\u2013339"},{"issue":"3","key":"10.1016\/S1389-1286(00)00090-6_BIB12","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/0925-2312(94)00027-P","article-title":"A new approach to the design of reinforcement scheme for learning automata: Stochastic estimator learning algorithms","volume":"7","author":"Vasilakos","year":"1995","journal-title":"Neurocomputing"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB13","doi-asserted-by":"crossref","first-page":"538","DOI":"10.1016\/S0140-3664(98)00122-4","article-title":"On the use of a stochastic estimator learning algorithm to the ATM routing problem: A methodology","volume":"21","author":"Atlasis","year":"1998","journal-title":"Comput. Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB14","doi-asserted-by":"crossref","first-page":"963","DOI":"10.1016\/S0169-7552(97)00135-9","article-title":"LB-SELA: Rated-based access control for ATM networks","volume":"30","author":"Atlasis","year":"1998","journal-title":"Comput. Networks-ISDN Systems"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB15","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1109\/49.400664","article-title":"Effective bandwidths in high speed networks","volume":"13","author":"Chang","year":"1995","journal-title":"IEEE J. Select Areas Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB16","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1109\/49.400663","article-title":"Resource management in wide-area networks using effective bandwidth","volume":"13","author":"De Veciana","year":"1995","journal-title":"IEEE J. Select Areas Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB17","doi-asserted-by":"crossref","unstructured":"K. Sohraby, Heavy traffic multiplexing behaviour of highly bursty heterogeneous sources and their admission control in high speed networks, in: IEEE INFOCOM\u201992, pp. 1518\u20131523","DOI":"10.1109\/GLOCOM.1992.276643"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB18","doi-asserted-by":"crossref","first-page":"1512","DOI":"10.1109\/26.163572","article-title":"Call admission control in ATM network using upper bound of cell loss probability","volume":"40","author":"Saito","year":"1992","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB19","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1109\/49.400666","article-title":"A new approach for allocating buffers to heterogeneous regulated traffic in an ATM node","volume":"13","author":"Elwalid","year":"1995","journal-title":"IEEE J. Select Areas Commun."},{"key":"10.1016\/S1389-1286(00)00090-6_BIB20","doi-asserted-by":"crossref","unstructured":"A. Hiramatsu, ATM call admission control using a neural network trained with a virtual output buffer method, in: WCCI-94, pp. 3611\u20133616","DOI":"10.1109\/ICNN.1994.374918"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB21","unstructured":"R.G. Cheng, C.L. Chang, A neural-net based fuzzy controller for an ATM network, in: INFOCOM'96"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB22","doi-asserted-by":"crossref","unstructured":"A. Aussem, Call admission control in ATM networks with the random neural network, in: WCCI-94, pp. 2482\u20132487","DOI":"10.1109\/ICNN.1994.374610"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB23","unstructured":"Raif O. Onvural, Asynchronous Transfer Mode Networks. Performance Issues, 2nd ed., Artech House Publishers, 1995"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB24","unstructured":"P. Mars, W.J. Poppelbaum, Stochastic and Deterministic Averaging Processors, Peter Peregrinus, Stevenage, UK, 1981"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB25","doi-asserted-by":"crossref","unstructured":"B. Maglaris, D. Anastassiou, P. Sen, G. Karlsson, D. Robbins, Performance models of statistical multiplexing in packet video communications, IEEE Trans. Commun. 36 (7) (1988)","DOI":"10.1109\/26.2812"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB26","doi-asserted-by":"crossref","unstructured":"E.D. Sykas, I.C. Paschalidis, et al., Congestion avoidance in ATM networks, in: IEEE INFOCOM\u201992, vol. 2, 1992, pp. 905\u2013914","DOI":"10.1109\/INFCOM.1992.263508"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB27","doi-asserted-by":"crossref","unstructured":"A.F. Atlasis, G.I. Stassinopoulos, A.V. Vasilakos, Leaky bucket mechanism with learning algorithm for ATM traffic policing, Comput. Commun. (submitted)","DOI":"10.1109\/ISCC.1997.615973"},{"issue":"4","key":"10.1016\/S1389-1286(00)00090-6_BIB28","doi-asserted-by":"crossref","first-page":"639","DOI":"10.1109\/72.298233","article-title":"Neural network control of communications systems","volume":"5","author":"Morris","year":"1994","journal-title":"IEEE Trans. Neural Networks"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB29","doi-asserted-by":"crossref","unstructured":"J. Neves, L. Almeida, M. Leitao, B-ISDN connection admission control and routing strategy with traffic prediction by neural networks, in: ICC-94","DOI":"10.1109\/ICC.1994.368817"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB30","doi-asserted-by":"crossref","unstructured":"C. Chang, S. Lin, R. Cheng, Y. Shiue, PSD-based neural-net connection admission control, in: IEEE INFOCOM\u201997, pp. 955\u2013962","DOI":"10.1109\/INFCOM.1997.631033"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB31","doi-asserted-by":"crossref","unstructured":"S. Youssef, I. Habib, T. Saadawi, A neurocomputing controller for bandwidth allocation in ATM networks, IEEE J. Select Areas Commun. 15 (2) (1997)","DOI":"10.1109\/49.552069"},{"key":"10.1016\/S1389-1286(00)00090-6_BIB32","doi-asserted-by":"crossref","unstructured":"S. Shioda, H. Saito, Real-time cell loss ratio estimation and its applications to ATM traffic controls, in: IEEE INFOCOM\u201997, pp. 1072\u20131079","DOI":"10.1109\/INFCOM.1997.631125"},{"issue":"1","key":"10.1016\/S1389-1286(00)00090-6_BIB33","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1109\/90.554728","article-title":"A framework for bandwidth management in ATM networks \u2013 Aggregate equivalent bandwidth approach","volume":"5","author":"Dziong","year":"1997","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"4","key":"10.1016\/S1389-1286(00)00090-6_BIB34","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/90.720887","article-title":"Effective bandwidths with priorities","volume":"6","author":"Berger","year":"1998","journal-title":"IEEE\/ACM Trans. Networking"},{"issue":"4","key":"10.1016\/S1389-1286(00)00090-6_BIB35","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/90.720874","article-title":"Improved loss calculations at an ATM multiplexer","volume":"6","author":"Shroff","year":"1998","journal-title":"IEEE\/ACM Trans. Networking"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000906?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128600000906?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T01:16:54Z","timestamp":1733275014000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128600000906"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,9]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2000,9]]}},"alternative-id":["S1389128600000906"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(00)00090-6","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2000,9]]}}}