{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:37:10Z","timestamp":1755218230521,"version":"3.43.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2003,6,1]],"date-time":"2003-06-01T00:00:00Z","timestamp":1054425600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Queueing Systems"],"published-print":{"date-parts":[[2003,6]]},"DOI":"10.1023\/a:1024472521936","type":"journal-article","created":{"date-parts":[[2003,9,15]],"date-time":"2003-09-15T13:22:37Z","timestamp":1063632157000},"page":"161-182","source":"Crossref","is-referenced-by-count":0,"title":["Maximal Effective Bandwidth of Constrained Traffic"],"prefix":"10.1007","volume":"44","author":[{"given":"Cormac","family":"Walsh","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"5124097_CR1","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1109\/49.898747","volume":"18","author":"R. Boorstyn","year":"2000","unstructured":"R. Boorstyn, A. Burchard, J. Liebeherr and C. Oottamakorn, Statistical service assurances for traffic scheduling algorithms, IEEE J. Selected Areas Commun. 18(12) (2000) 2651\u20132664.","journal-title":"IEEE J. Selected Areas Commun"},{"key":"5124097_CR2","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/BF01245322","volume":"20","author":"D.D. Botvich","year":"1995","unstructured":"D.D. Botvich and N.G. Duffield, Large deviations, the shape of the loss curve, and economies of scale in large multiplexers, Queueing Systems 20 (1995) 293\u2013320.","journal-title":"Queueing Systems"},{"key":"5124097_CR3","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1287\/opre.48.4.535.12424","volume":"48","author":"C. Courcoubetis","year":"2000","unstructured":"C. Courcoubetis, F. Kelly and R. Weber, Measurement-based usage charges in communication networks, Oper. Res. 48 (2000) 535\u2013548.","journal-title":"Oper. Res."},{"key":"5124097_CR4","doi-asserted-by":"crossref","first-page":"886","DOI":"10.2307\/3215366","volume":"33","author":"C. Courcoubetis","year":"1996","unstructured":"C. Courcoubetis and R. Weber, Buffer overflow asymptotics for a buffer handling many traffic sources, J. Appl. Probab. 33 (1996) 886\u2013903.","journal-title":"J. Appl. Probab."},{"issue":"1","key":"5124097_CR5","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/18.61109","volume":"37","author":"R.L. Cruz","year":"1991","unstructured":"R.L. Cruz, A calculus for network delay, part I: Network elements in isolation, IEEE Trans. Inform. Theory 37(1) (1991) 114\u2013131.","journal-title":"IEEE Trans. Inform. Theory"},{"key":"5124097_CR6","doi-asserted-by":"crossref","unstructured":"B.T. Doshi, Deterministic rule based traffic descriptors for broadband ISDN:Worst case behavior and connection acceptance control, in: Proc. of the 14th ITC, Antibes Juan-les-Pins, June 1994, pp. 591\u2013 600.","DOI":"10.1016\/B978-0-444-82031-0.50065-2"},{"key":"5124097_CR7","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1093\/oso\/9780198523994.003.0008","volume-title":"Stochastic Networks: Theory and Applications","author":"F.P. Kelly","year":"1996","unstructured":"F.P. Kelly, Notes on effective bandwidths, in: Stochastic Networks: Theory and Applications, eds. Kelly, Zachary and Ziedins (Oxford Univ. Press, Oxford, 1996) pp. 141\u2013168."},{"issue":"5","key":"5124097_CR8","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1109\/26.843194","volume":"48","author":"G. Kesidis","year":"2000","unstructured":"G. Kesidis and T. Konstantopoulos, Extremal shape-controlled traffic patterns in high-speed networks, IEEE Trans. Commun. 48(5) (2000) 813\u2013819.","journal-title":"IEEE Trans. Commun."},{"key":"5124097_CR9","first-page":"159","volume":"28","author":"G. Kesidis","year":"1998","unstructured":"G. Kesidis and T. Konstantopoulos, Extremal traffic and worst-case performance for queues with shaped arrivals, in: Analysis of Communication Networks: Call Centres, Traffic and Performance, Toronto, ON, 1998, Fields Institute Communications, Vol. 28 (Amer. Math. Soc., Providence, RI, 2000) pp. 159\u2013178.","journal-title":"Analysis of Communication Networks: Call Centres, Traffic and Performance"},{"key":"5124097_CR10","doi-asserted-by":"crossref","unstructured":"D.C. Lee, Effects of leaky bucket parameters on the average queueing delay: Worst case analysis, in: Proc. of IEEE Infocom '94, Toronto, Canada, June 1994, pp. 482\u2013489.","DOI":"10.1109\/INFCOM.1994.337695"},{"key":"5124097_CR11","unstructured":"F. LoPresti, Z. Zhang, D. Towsley and J. Kurose, Source time scale and optimal buffer\/bandwidth trade-off for regulated traffic in an ATM node, in: Proc. of IEEE Infocom '97, Kobe, Japan, April 1997, pp. 347\u2013355."},{"key":"5124097_CR12","unstructured":"B. McGurk and C. Walsh, Investigations of the performance of a measurement-based connection admission control algorithm, in: Proc. of ATM '97 \u2013 5th IFIP Workshop on Performance Modelling and Evaluation of ATM Networks, Ilkely, UK, July 1997."},{"key":"5124097_CR13","doi-asserted-by":"crossref","unstructured":"D. Mitra and J.A. Morrison, Multiple time scale regulation and worst case processes for ATMnetwork control, in: Proc. of the 34th Conf. on Decision and Control, New Orleans, LA, December 1995, pp. 353\u2013358.","DOI":"10.1109\/CDC.1995.478814"},{"key":"5124097_CR14","doi-asserted-by":"crossref","unstructured":"P. Oechslin, In search of the worst case arrivals of independent leaky bucket constrained sources, in: Proc. UKPEW, Bradford, July 1997, pp. 100\u2013106.","DOI":"10.1007\/978-0-387-35170-4_8"},{"key":"5124097_CR15","unstructured":"M. Reisslein, K.W. Ross and S. Rajagopal, Packet multiplexers with adversarial regulated traffic, in: Proc. of IEEE Infocom '98, San Francisco, April 1998, pp. 347\u2013355."},{"key":"5124097_CR16","unstructured":"Traffic management specification version 4.0, Technical Report 95-0013R10, ATM Forum (February 1996)."},{"issue":"10","key":"5124097_CR17","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1109\/MCOM.1986.1092946","volume":"24","author":"J.S. Turner","year":"1986","unstructured":"J.S. Turner, New directions in communications (or which way to the information age?), IEEE Commun. Mag. 24(10) (1986) 8\u201315.","journal-title":"IEEE Commun. Mag."},{"key":"5124097_CR18","unstructured":"C. Walsh, Worst case traffic from regulated traffic sources, Technical Report HPL-BRIMS-01-01, HP Labs (2001) www.stp.dias.ie \/~walsh \/ regulated.ps."}],"container-title":["Queueing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1024472521936.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1024472521936\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1024472521936.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T04:37:16Z","timestamp":1754455036000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1024472521936"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,6]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,6]]}},"alternative-id":["5124097"],"URL":"https:\/\/doi.org\/10.1023\/a:1024472521936","relation":{},"ISSN":["0257-0130","1572-9443"],"issn-type":[{"type":"print","value":"0257-0130"},{"type":"electronic","value":"1572-9443"}],"subject":[],"published":{"date-parts":[[2003,6]]}}}