{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T13:09:19Z","timestamp":1743340159472,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/infcom.2001.916712","type":"proceedings-article","created":{"date-parts":[[2002,11,13]],"date-time":"2002-11-13T09:55:33Z","timestamp":1037181333000},"page":"299-308","source":"Crossref","is-referenced-by-count":13,"title":["Asymptotic analysis of GPS systems fed by heterogeneous long-tailed sources"],"prefix":"10.1109","volume":"1","author":[{"given":"C.","family":"Kotopoulos","sequence":"first","affiliation":[]},{"given":"N.","family":"Likhanov","sequence":"additional","affiliation":[]},{"given":"R.R.","family":"Mazumdar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Asymptotics of Multi-Buffered Queueing Systems with Generalised Processor Sharing","year":"2000","author":"kotopoulos","key":"ref10"},{"article-title":"Asymptotic analysis of the gps system fed by heterogeneous long-tailed sources","year":"0","author":"kotopoulos","key":"ref11"},{"key":"ref12","article-title":"Loss asymptotics in hol systems fed with heterogeneous longtailed sources","author":"kotopoulos","year":"1999","journal-title":"Proceedings of the Allerton Conference Allerton III"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/90.282603"},{"article-title":"Long-range dependence in network traffic: Myths and realities","year":"0","author":"likhanov","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1017\/S000186780001051X","article-title":"Loss in large buffers fed by heterogeneous long-tailed sources","volume":"32","author":"likhanov","year":"2000","journal-title":"Advances in Applied Probability"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1239\/jap\/1032374233"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/BF01158964"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/90.234856"},{"article-title":"Tail probabilities for M\/G\/oo input processes II: Buffer asymptotics","year":"0","author":"parulekar","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832184"},{"key":"ref3","article-title":"Asymptotic behavior of generalised processor sharing with long-tailed traffic sources","author":"borst","year":"2000","journal-title":"IEEE Infocom Tel-Aviv Israel"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1509","DOI":"10.1016\/S0140-3664(98)00219-9","article-title":"Fluid queues with long-tailed activity period distributions","volume":"21","author":"boxma","year":"1998","journal-title":"Computer Communications"},{"key":"ref5","article-title":"Induced burstiness in generalised processor sharing queues with long-tailed traffic flows","author":"borst","year":"1999","journal-title":"Proc 37th Annual Allerton Conference on Communication Control and Computing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1287\/moor.23.1.145"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1239\/aap\/1029954270"},{"key":"ref2","first-page":"345","article-title":"Generalized processor sharing with long-tailed traffic sources","author":"borst","year":"1999","journal-title":"Teletraffic Engineering in a Competitive World"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1017\/S0001867800009174","article-title":"Asymptotic results for multiplexing subexponential ON-OFF sources","volume":"31","author":"jelenkovic","year":"1999","journal-title":"Advances in Applied Probability"},{"journal-title":"Elements of Queueing Theory","year":"1994","author":"baccelli","key":"ref1"},{"key":"ref20","article-title":"Buffer provision for M\/G\/oo processes: A versatile class of models, for network traffic","author":"parulekar","year":"1997","journal-title":"Technical Report"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019103323831"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/90.392383"},{"key":"ref24","article-title":"Self-similarity and heavy tails: Structural modeling of network traffic","author":"willinger","year":"1998","journal-title":"A Practical Guide to Heavy Tails Statistical Techniques for Analyzing Heavy Tailed Distributions"},{"journal-title":"Network Traffic Dynamics","year":"2000","author":"reidi","key":"ref23"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019133208384"}],"event":{"name":"IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society","acronym":"INFCOM-01","location":"Anchorage, AK, USA"},"container-title":["Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7321\/19793\/00916712.pdf?arnumber=916712","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,17]],"date-time":"2018-01-17T15:54:49Z","timestamp":1516204489000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/916712\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/infcom.2001.916712","relation":{},"subject":[]}}