{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T17:06:42Z","timestamp":1649005602424},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2015,4,1]],"date-time":"2015-04-01T00:00:00Z","timestamp":1427846400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Telkom and Alcatel-Lucent"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/twc.2014.2378777","type":"journal-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T19:33:54Z","timestamp":1418067234000},"page":"1994-2006","source":"Crossref","is-referenced-by-count":5,"title":["Performance Analysis of a Connection Admission Scheme for Future Networks"],"prefix":"10.1109","volume":"14","author":[{"given":"Tom Mmbasu","family":"Walingo","sequence":"first","affiliation":[]},{"given":"Fambirai","family":"Takawira","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","author":"boxma","year":"1994","journal-title":"Queueing-theoretic solution methods for models of parallel and distributed systems"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.2307\/1426503"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2297437"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2009.2039360"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.090210.100152"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/15326349108807174"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2009.65"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2005.19"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.071055"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2013.000005"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.32"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.091327"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736748"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2013.2269187"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/90.554722"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2005.861785"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1999.5340510"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2008.060536"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/49.286672"},{"key":"ref26","first-page":"1","article-title":"Joint call and packet level performance analysis of CAC strategies for VoIP traffic in wireless networks","author":"castellanos-l\u00f3pez","year":"0","journal-title":"Proc IEEE Globecom"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.091327"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1023\/A:1016662911145"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1080\/15326340008807590"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00044"},{"key":"ref11","first-page":"339","article-title":"A bibliographical guide to self-similar traffic and performance modeling for modern high-speed networks","author":"willinger","year":"0","journal-title":"Proc Stochastic Netw Theory Appl"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CFIC.2013.6566318"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(03)00067-1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1986.1146393"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.820252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWCMC.2012.6314339"},{"key":"ref16","first-page":"1","article-title":"A decomposition method to deflate the curse of dimensionality for dynamic stochastic models","author":"esteban-bravo","year":"0","journal-title":"Proc Soc Comput Economics"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2005.1423334"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"22","DOI":"10.23919\/SAIEE.2013.8531573","article-title":"Crossllayer extended parameter call admission control for future networks","volume":"104","author":"walingo","year":"2013","journal-title":"SAIEE Africa Research Journal"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.814756"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2182092"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.1998.5340404"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.10.044"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2013.11"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2010.221"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.6812287"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1081\/STM-200056025"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2013.2280124"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.1994.473953"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1561928"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.662929"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.1995.476272"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.900414"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070280"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2008.4483671"},{"key":"ref43","doi-asserted-by":"crossref","first-page":"2598","DOI":"10.1109\/TCOMM.2013.050313.112217","article-title":"Modelling and analysis of an integrated scheduling scheme with heterogeneous LRD and SRD traffic","volume":"12","author":"jin","year":"2013","journal-title":"IEEE Trans Wireless Commun"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/7081396\/06979256.pdf?arnumber=6979256","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:42:20Z","timestamp":1642005740000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6979256"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":51,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/twc.2014.2378777","relation":{},"ISSN":["1536-1276"],"issn-type":[{"value":"1536-1276","type":"print"}],"subject":[],"published":{"date-parts":[[2015,4]]}}}