{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:05:30Z","timestamp":1725566730740},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540293569"},{"type":"electronic","value":"9783540320968"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11567486_9","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T11:18:48Z","timestamp":1127819928000},"page":"76-87","source":"Crossref","is-referenced-by-count":1,"title":["A Packet Class-Based Scheme for Providing Throughput Guarantees to TCP Flows"],"prefix":"10.1007","author":[{"given":"Llu\u00eds","family":"F\u00e0brega","sequence":"first","affiliation":[]},{"given":"Teodor","family":"Jov\u00e9","sequence":"additional","affiliation":[]},{"given":"Pere","family":"Vil\u00e0","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Marzo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Brownlee, N., Claffy, K. C.: Understanding Internet Traffic Streams: Dragonflies and Tortoises. IEEE Communications Magazine (2002)","DOI":"10.1109\/MCOM.2002.1039865"},{"key":"9_CR2","unstructured":"Jacobson, V.: Congestion Avoidance and Control. ACM Computer Communication Review (1998)"},{"key":"9_CR3","unstructured":"Roberts, J. W., Massouli\u00e9, L.: Arguments in Favour of Admission Control for TCP flows. In: 16th ITC (1999)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"F\u00e0brega, L.l., Jov\u00e9, T., Donoso, Y.: Throughput Guarantees for Elastic Flows using End-to end Admission Control. IFIP\/ACM LANC (2003)","DOI":"10.1145\/1035662.1035676"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Clark, D. D., Fang, W.: Explicit Allocation of Best-effort Packet Delivery Service. IEEE\/ACM Transactions on Networking (1998)","DOI":"10.1109\/90.720870"},{"key":"9_CR6","doi-asserted-by":"crossref","unstructured":"Blake, S., Black, D., Carlson, M., Davies, E., Weiss, W., Wang, Z.: An Architecture for Differentiated Services. RFC 2475 (1998)","DOI":"10.17487\/rfc2475"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Mortier, R., Pratt, I., Clark, C., Crosby, S.: Implicit Admission Control. IEEE Journal on Selected Areas in Communications (2000)","DOI":"10.1109\/49.898743"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Kumar, A., Hegde, M., Anand, S.V.R., Bindu, B.N., Thirumurthy, D., Kherani, A.A.: Nonintrusive TCP Connection Admission Control for Bandwidth Management of an Internet Access Link. IEEE Communications Magazine (2000)","DOI":"10.1109\/35.841841"},{"key":"9_CR9","unstructured":"Fredj, S. B., Oueslati-Boulahia, S., Roberts, J.W.: Measurement-based Admission Control for Elastic Traffic. ITC 17 (2001)"},{"key":"9_CR10","unstructured":"Bianchi, G., Capone, A., Petrioli, C.: Throughput Analysis of End-to-end Measurementbased Admission Control in IP. INFOCOM (2000)"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Breslau, L., Knightly, E., Shenker, S., Stoica, I., Zhang, H.: Endpoint Admission Control: Architectural Issues and Performance. In: ACM SIGCOMM (2000)","DOI":"10.1145\/347059.347400"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Rosen, E., Viswanathan, A., Callon, R.: Multiprotocol Label Switching Architecture. RFC 3031 (2001)","DOI":"10.17487\/rfc3031"},{"key":"9_CR13","unstructured":"UCB\/LBL\/VINT Network Simulator \u2013 ns (version 2), http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Fredj, S. B., Bonald, T., Prouti\u00e8re, A., R\u00e9gni\u00e9, G., Roberts, J.W.: Statistical Bandwidth Sharing: a Study of Congestion at Flow Level. In: ACM SIGCOMM (2001)","DOI":"10.1145\/383059.383068"},{"key":"9_CR15","volume-title":"Simulation Modelling and Analysis","author":"A.M. Law","year":"2000","unstructured":"Law, A.M., Kelton, W.D.: Simulation Modelling and Analysis. MacGraw-Hill, New York (2000)"}],"container-title":["Lecture Notes in Computer Science","Operations and Management in IP-Based Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11567486_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:54:18Z","timestamp":1605624858000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11567486_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540293569","9783540320968"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11567486_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}