{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:39:17Z","timestamp":1725489557030},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540745723"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74573-0_31","type":"book-chapter","created":{"date-parts":[[2007,8,23]],"date-time":"2007-08-23T09:29:07Z","timestamp":1187861347000},"page":"298-307","source":"Crossref","is-referenced-by-count":0,"title":["A Token Bucket Model with Assured Forwarding for Web Traffic"],"prefix":"10.1007","author":[{"given":"Salvador","family":"Alcaraz","sequence":"first","affiliation":[]},{"given":"Katja","family":"Gilly","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Juiz","sequence":"additional","affiliation":[]},{"given":"Ramon","family":"Puigjaner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Braden, R., Clark, D., Shenker, S.: Integrated services in the internet architecture: An overview (1998)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Blake, S., Black, D., Carlson, M., Davies, E., Wang, Z., Weiss, W.: An architecture for differentiated service (1998)","DOI":"10.17487\/rfc2475"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Jacobson, V., Nichols, K., Poduri, K.: Rfc 2598, an expedited forwarding phb (1999)","DOI":"10.17487\/rfc2598"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Heinanen, J., Baker, F., Weiss, W., Wroclawski, J.: Assured forwarding phb group (1999)","DOI":"10.17487\/rfc2597"},{"key":"31_CR5","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1016\/S1389-1286(02)00439-5","volume":"41","author":"X. Chen","year":"2003","unstructured":"Chen, X., Heidemann, J.: Preferential treatment for short flows to reduce web latency. Comput. Networks\u00a041, 779\u2013794 (2003)","journal-title":"Comput. Networks"},{"key":"31_CR6","doi-asserted-by":"publisher","first-page":"3158","DOI":"10.1016\/j.comcom.2006.04.005","volume":"29","author":"X. Zhou","year":"2006","unstructured":"Zhou, X., Cai, Y., Chow, E.: An integrated approach with feedback control for robust web qos design. Computer Communications Journal\u00a029, 3158\u20133169 (2006)","journal-title":"Computer Communications Journal"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1109\/PCCC.2004.1301137","volume-title":"Proc. of the 23rd IEEE International Performance, Computing and Communications Conference (IPCCC)","author":"M. Claypool","year":"2004","unstructured":"Claypool, M., Kinick, R., Hartling, M.: Active queue management for web traffic. In: Proc. of the 23rd IEEE International Performance, Computing and Communications Conference (IPCCC), pp. 531\u2013538. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"31_CR8","unstructured":"Gilly, K., Alcaraz, S., Juiz, C., Puigjaner, R.: Resource allocation study based on burstiness for a web switch. In: Proc. of 4th International Information and Telecommunication Technologies Symposium (2005)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Gilly, K., Alcaraz, S., Juiz, C., Puigjaner, R.: Service differentiation and qos in a scalable content-aware load balancing algorithm. In: Proc. of 40th Annual Simulation Symposium (2007)","DOI":"10.1109\/ANSS.2007.39"},{"key":"31_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1080\/10241230215282","volume":"8","author":"N.U. Ahmed","year":"2002","unstructured":"Ahmed, N.U., Wang, Q., Barbosa, L.O.: Systems approach to modeling the token bucket algorithm in computer networks. Mathematical Problems in Engineering\u00a08, 265\u2013279 (2002)","journal-title":"Mathematical Problems in Engineering"},{"key":"31_CR11","unstructured":"The Network Simulator NS-2: http:\/\/www.isi.edu\/nsnam\/ns\/"},{"key":"31_CR12","first-page":"1547","volume-title":"Proc. IEEE INFOCOM","author":"J. Cao","year":"2004","unstructured":"Cao, J., Cleveland, W.S., Gao, Y., Jeffay, K., Smith, E D., Weigle, M.: Stochastic models for generating synthetic http source traffic. In: Proc. IEEE INFOCOM, Hong Kong, Mar 2004, pp. 1547\u20131558. IEEE Computer Society Press, Los Alamitos (2004)"},{"key":"31_CR13","first-page":"180","volume-title":"ICNP 2001: Proceedings of the Ninth International Conference on Network Protocols","author":"L. Guo","year":"2001","unstructured":"Guo, L., Matta, I.: The war between mice and elephants. In: ICNP 2001: Proceedings of the Ninth International Conference on Network Protocols, Washington, DC, USA, p. 180. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"31_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/90.392383","volume":"3","author":"V. Paxson","year":"1995","unstructured":"Paxson, V., Floyd, S.: Wide area traffic: the failure of poisson modeling networking. IEEE\/ACM Transactions on\u00a03, 226\u2013244 (1995)","journal-title":"IEEE\/ACM Transactions on"}],"container-title":["Lecture Notes in Computer Science","Network-Based Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74573-0_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:25:35Z","timestamp":1619519135000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74573-0_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540745723"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74573-0_31","relation":{},"subject":[]}}