{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T04:44:46Z","timestamp":1725597886512},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642227134"},{"type":"electronic","value":"9783642227141"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22714-1_57","type":"book-chapter","created":{"date-parts":[[2011,7,25]],"date-time":"2011-07-25T16:01:51Z","timestamp":1311609711000},"page":"555-567","source":"Crossref","is-referenced-by-count":1,"title":["Shared Resource Allocation Using Token Based Control Strategy in Augmented Ring Networks"],"prefix":"10.1007","author":[{"given":"Rajendra","family":"Prasath","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","unstructured":"Andrews, D., Schulz, G.: A token-ring architecture for local area network: an update. In: Proc. IEEE COMPCON (1982)"},{"issue":"4","key":"57_CR2","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1109\/TC.1981.1675777","volume":"C-30","author":"B.W. Arden","year":"1981","unstructured":"Arden, B.W., Lee, H.: Analysis of chordal ring network. IEEE Trans. on Computers\u00a0C-30(4), 291\u2013295 (1981)","journal-title":"IEEE Trans. on Computers"},{"key":"57_CR3","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/s002240000076","volume":"31","author":"A. Ben-Dor","year":"1998","unstructured":"Ben-Dor, A., Haveli, S., Schuster, A.: Potential function analysis of Greedy hot potato routing. Theory of Computing Systems\u00a031, 41\u201361 (1998)","journal-title":"Theory of Computing Systems"},{"key":"57_CR4","volume-title":"Data Networks","author":"D. Bertsekas","year":"1999","unstructured":"Bertsekas, D., Gallager, R.: Data Networks, 2nd edn. Prentice Hall, Englewood Cliffs (1999)","edition":"2"},{"issue":"2","key":"57_CR5","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1145\/63264.63403","volume":"11","author":"J.E. Burns","year":"1989","unstructured":"Burns, J.E., Pachl, J.: Uniform self-stabilizing rings. ACM Trans. on Prog. Languages and Systems\u00a011(2), 330\u2013334 (1989)","journal-title":"ACM Trans. on Prog. Languages and Systems"},{"key":"57_CR6","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1016\/S0020-0190(98)00099-4","volume":"67","author":"N. Chalamaiah","year":"1998","unstructured":"Chalamaiah, N., Ramamurthy, B.: Finding shortest paths in distributed loop networks. Information Processing Letters\u00a067, 157\u2013161 (1998)","journal-title":"Information Processing Letters"},{"key":"57_CR7","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/S0020-0190(98)00054-4","volume":"66","author":"E. Feuerstein","year":"1998","unstructured":"Feuerstein, E., Leonardi, S., Marchetti-Spaccamela, A., Santoro, N.: Efficient token based control in rings. Information Processing Letters\u00a066, 175\u2013180 (1998)","journal-title":"Information Processing Letters"},{"key":"57_CR8","volume-title":"Data Communication, Computer Networks and Open Systems","author":"F. Halsall","year":"1992","unstructured":"Halsall, F.: Data Communication, Computer Networks and Open Systems, 3rd edn. Addison-Wesley, Reading (1992)","edition":"3"},{"key":"57_CR9","volume-title":"Distributed System Design","author":"J. Wu","year":"1999","unstructured":"Wu, J.: Distributed System Design. CRC Press, Boca Raton (1999)"},{"key":"57_CR10","first-page":"155","volume":"77","author":"G.L.. Lann","year":"1977","unstructured":"Lann, G.L.: Distributed Systems - Towards a formal approach. Information Processing Letters\u00a077, 155\u2013160 (1977)","journal-title":"Information Processing Letters"},{"issue":"6","key":"57_CR11","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1109\/71.862205","volume":"11","author":"S. Lodya","year":"2000","unstructured":"Lodya, S., Kshemkalyani, A.: A fair distributed mutual exclusion algorithm. IEEE Trans. in Parallel and Distributed Systems\u00a011(6), 537\u2013549 (2000)","journal-title":"IEEE Trans. in Parallel and Distributed Systems"},{"issue":"12","key":"57_CR12","doi-asserted-by":"publisher","first-page":"1452","DOI":"10.1109\/12.477250","volume":"44","author":"K. Mukhopadhyaya","year":"1995","unstructured":"Mukhopadhyaya, K., Sinha, B.P.: Fault-Tolerant routing in distributed loop networks. IEEE Trans. on Computers\u00a044(12), 1452\u20131456 (1995)","journal-title":"IEEE Trans. on Computers"},{"key":"57_CR13","first-page":"145","volume":"52","author":"R. Rajendra Prasath","year":"2000","unstructured":"Rajendra Prasath, R., Thangavel, P.: Token based message passing in bidirectional ring extensions. Journal of the Madras University\u00a052, 145\u2013159 (2000)","journal-title":"Journal of the Madras University"},{"key":"57_CR14","unstructured":"Rajendra Prasath, R., Thangavel, P.: Shared resource allocation using token based control in ring extension topologies. In: Proc. of Int. Conference on Recent Advances in Mathematical Sciences, pp. 53\u201363 (December 2000)"},{"issue":"2","key":"57_CR15","first-page":"197","volume":"6","author":"R. Rajendra Prasath","year":"2003","unstructured":"Rajendra Prasath, R., Thangavel, P.: Shared resource allocation using token passing strategy in interconnected networks. Information\u00a06(2), 197\u2013206 (2003)","journal-title":"Information"},{"key":"57_CR16","volume-title":"Distributed Algorithms and Protocols","author":"M. Raynal","year":"1988","unstructured":"Raynal, M.: Distributed Algorithms and Protocols. John Wiley and Sons, Chichester (1988)"},{"issue":"10","key":"57_CR17","doi-asserted-by":"publisher","first-page":"1224","DOI":"10.1109\/12.5984","volume":"C-37","author":"V. Rego","year":"1988","unstructured":"Rego, V., Ni, L.M.: Analytic models of cyclic service systems and their applications to token-passing local networks. IEEE Trans. on Computers\u00a0C-37(10), 1224\u20131234 (1988)","journal-title":"IEEE Trans. on Computers"},{"key":"57_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-03687-7","volume-title":"Elements of Distributed Algorithms","author":"W. Reisig","year":"1998","unstructured":"Reisig, W.: Elements of Distributed Algorithms. Springer, Heidelberg (1998)"},{"key":"57_CR19","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCOM.1986.1093085","volume":"24","author":"F.E. Ross","year":"1986","unstructured":"Ross, F.E.: FDDI- A tutorial. IEEE Communication magazine\u00a024, 10\u201317 (1986)","journal-title":"IEEE Communication magazine"},{"key":"57_CR20","volume-title":"Data and Computer Networks","author":"W. Stallings","year":"1997","unstructured":"Stallings, W.: Data and Computer Networks, 5th edn. Prentice-Hall, Englewood Cliffs (1997)","edition":"5"},{"issue":"4","key":"57_CR21","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/6110.214406","volume":"3","author":"I. Suzuki","year":"1985","unstructured":"Suzuki, I., Kasami, T.: A distributed mutual exclusion algorithm. ACM Transactions on Compututer Systems\u00a03(4), 344\u2013349 (1985)","journal-title":"ACM Transactions on Compututer Systems"},{"issue":"2","key":"57_CR22","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1137\/0606031","volume":"6","author":"R.E. Tarjan","year":"1985","unstructured":"Tarjan, R.E.: Amortized computational complexity. SIAM J. Alg. Discrete Math.\u00a06(2), 306\u2013318 (1985)","journal-title":"SIAM J. Alg. Discrete Math."},{"issue":"3","key":"57_CR23","first-page":"62","volume":"32","author":"P. Thangavel","year":"2002","unstructured":"Thangavel, P., Rajendra Prasath, R.: A note on token based control in rings and linear arrays. Journal of Comp. Soc. India\u00a032(3), 62\u201365 (2002)","journal-title":"Journal of Comp. Soc. India"}],"container-title":["Communications in Computer and Information Science","Advances in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22714-1_57","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,30]],"date-time":"2019-03-30T17:08:19Z","timestamp":1553965699000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22714-1_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642227134","9783642227141"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22714-1_57","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}