Last update: Thu Jun 20 02:01:00 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Bremler-Barr:2007:PBA,
author = "Anat Bremler-Barr and Nir Halachmi and Hanoch Levy",
title = "Protecting bursty applications against traffic
aggressiveness",
journal = j-COMP-NET-AMSTERDAM,
volume = "51",
number = "13",
pages = "3864--3877",
day = "12",
month = sep,
year = "2007",
CODEN = "????",
ISSN = "1389-1286 (print), 1872-7069 (electronic)",
ISSN-L = "1389-1286",
bibdate = "Sat Apr 2 08:42:20 MDT 2011",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compnetamsterdam2000.bib",
acknowledgement = ack-nhfb,
fjournal = "Computer Networks",
journal-URL = "http://www.sciencedirect.com/science/journal/13891286",
}
Related entries
- against,
48(3)293,
50(13)2312,
51(4)1013,
51(10)2580,
51(12)3471,
53(18)3089
- application,
32(2)149,
33(1)519,
35(1)57,
35(2)165,
36(1)5,
36(4)453,
39(5)523,
39(5)577,
39(5)681,
40(1)19,
40(1)45,
40(3)319,
40(3)363,
40(5)599,
41(1)29,
41(3)303,
41(4)489,
42(2)211,
42(5)599,
43(5)573,
43(5)619,
44(4)545,
45(2)195,
45(3)245,
46(5)741,
47(1)87,
47(3)367,
47(5)603,
48(2)195,
48(2)247,
48(3)475,
48(5)739,
49(1)4,
50(6)739,
50(6)826,
50(8)1130,
50(10)1533,
50(14)2462,
50(16)2981,
50(18)3608,
51(2)382,
51(3)781,
51(3)835,
51(4)1072,
51(5)1239,
51(11)3125,
51(11)3157,
51(12)3323,
51(15)4492,
51(16)4697,
51(17)4797,
52(3)581,
52(5)971,
52(6)1179,
52(7)1390,
52(9)1762,
52(13)2447,
52(15)2872,
52(17)3218,
52(18)3373,
53(6)759,
53(6)790,
53(8)1186,
53(10)1760
- Barr, Anat, Bremler-,
53(12)2241
- Bremler-Barr, Anat,
53(12)2241
- bursty,
42(6)779,
53(12)2011
- Levy, Hanoch,
41(4)527
- protecting,
48(5)781,
50(2)200,
51(5)1239,
51(5)1275,
51(10)2580