{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:35:51Z","timestamp":1743035751545,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":69,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540184065"},{"type":"electronic","value":"9783642730160"}],"license":[{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1987,1,1]],"date-time":"1987-01-01T00:00:00Z","timestamp":536457600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1987]]},"DOI":"10.1007\/978-3-642-73016-0_13","type":"book-chapter","created":{"date-parts":[[2011,12,26]],"date-time":"2011-12-26T13:32:52Z","timestamp":1324906372000},"page":"192-221","source":"Crossref","is-referenced-by-count":5,"title":["Modeling Token Ring Networks \u2014 A Survey"],"prefix":"10.1007","author":[{"given":"Werner","family":"Bux","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"\u201cFDDI Token Ring Media Access Control (MAC),\u201d Draft Proposed American National Standard, X3T9\/84-100, Rev-9, Dec. 13, 1985."},{"key":"13_CR2","unstructured":"\u201cFDDI Token Ring Station Management (SMT),\u201d Draft Proposed American National Standard, X3T9\/85-, Rev-1.3, July 10, 1985."},{"key":"13_CR3","unstructured":"\u201cFDDI Token Ring Physical Layer Medium Dependent (PMD),\u201d Draft Proposed American National Standard, X3T9\/85-, Rev-3.3, Nov. 18, 1985."},{"key":"13_CR4","unstructured":"\u201cFDDI Physical Layer Protocol (PHY),\u201d Draft Proposed American National Standard, X3T9\/85-39, Rev-11, Aug. 10, 1985."},{"issue":"7\/9","key":"13_CR5","first-page":"423","volume":"20","author":"K Arndt","year":"1984","unstructured":"K. Arndt and H. Sulanke, \u201cA Queueing System with Relative and Cyclic Priorities,\u201d Elektronische Informationsverarbeitung und Kybernetik, Vol. 20, Nos. 7\/9, pp. 423\u2013425, Sept. 1984.","journal-title":"Elektronische Informationsverarbeitung und Kybernetik"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1287\/opre.13.2.306","volume":"13","author":"B Avi-Itzhak","year":"1965","unstructured":"B. Avi-Itzhak, W.L. Maxwell and L.W. Miller, \u201cQueueing with Alternating Priorities,\u201d Oper. Res., Vol. 13, pp. 306\u2013318, 1965.","journal-title":"Oper. Res."},{"key":"13_CR7","first-page":"409","volume-title":"Performance \u201884","author":"OJ Boxma","year":"1984","unstructured":"O.J. Boxma, \u201cTwo Symmetric Queues with Alternating Service and Switching Times,\u201d in Performance \u201884, E. Gelenbe (ed.), Elsevier Science Publ. B.V. (North-Holland), Amsterdam, 1984, pp. 409\u2013431."},{"key":"13_CR8","volume-title":"Pseudo-Conservation Laws in Cyclic-Service Systems","author":"OJ Boxma","year":"1986","unstructured":"O.J. Boxma and W.P. Groenendijk, \u201cPseudo-Conservation Laws in Cyclic-Service Systems,\u201d Report OS-R8606, Centre for Mathematics and Computer Science, Amsterdam, June 1986."},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1145\/317531.317558","volume":"14","author":"OJ Boxma","year":"1986","unstructured":"O.J. Boxma and B. Meister, \u201cWaiting-Time Approximations for Cyclic-Service Systems with Switch-Over Times,\u201d Performance \u201886 and ACK SIGMETRICS 1986, Perform. Eval. Rev., Vol. 14, No. 1, pp. 254\u2013262, May 1986.","journal-title":"Performance \u201886 and ACK SIGMETRICS 1986, Perform. Eval. Rev."},{"issue":"3","key":"13_CR10","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1007\/BF01069195","volume":"9","author":"GL Brodetskii","year":"1973","unstructured":"G.L. Brodetskii and V.P. Vinnitskii, \u201cSome Characteristics of Systems with Cyclic Data Processing,\u201d Cybernetics, Vol. 9, No. 3, pp. 407\u2013413, May\u2013June 1973.","journal-title":"Cybernetics"},{"key":"13_CR11","unstructured":"W. Bux, F. Closs, P. Janson, K. K\u00fcmmerle and H.R. M\u00fcller, \u201cA Reliable Token-Ring System for Local-Area Communication,\u201d Conf. Rec. NTC \u201881, Piscataway, NJ., IEEE, 1981, pp. A2.2.1\u2013A2.2.6."},{"issue":"10","key":"13_CR12","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.1109\/TCOM.1981.1094893","volume":"COM-29","author":"W Bux","year":"1981","unstructured":"W. Bux, \u201cLocal-Area Subnetworks: A Performance Comparison,\u201d IEEE Trans. Commun., Vol. COM-29, No. 10, pp. 1465\u20131473, Oct. 1981.","journal-title":"IEEE Trans. Commun."},{"key":"13_CR13","unstructured":"W. Bux, P. Janson, H.R. M\u00fcller and D.T.W. Sze, \u201cMethod of Transmitting Information between Stations Attached to a Unidirectional Transmission Ring,\u201d European Patent Application, Appl. No. 80107706.6, Date of Publ.: 23.06.82, Bulletin 82\/25."},{"issue":"3","key":"13_CR14","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/0166-5316(83)90003-2","volume":"3","author":"W Bux","year":"1983","unstructured":"W. Bux and H.L. Truong, \u201cMean-Delay Approximation for Cyclic-Service Queueing Systems,\u201d Performance Evaluation, Vol. 3, No. 3, pp. 187\u2013196, Aug. 1983.","journal-title":"Performance Evaluation"},{"issue":"4","key":"13_CR15","doi-asserted-by":"publisher","first-page":"756","DOI":"10.1109\/JSAC.1983.1146004","volume":"SAC-1","author":"W Bux","year":"1983","unstructured":"W. Bux, F. Closs, K. K\u00fcmmerle, H. Keller and H.R. M\u00fcller, \u201cA Reliable Token Ring for Local Communications,\u201d IEEE J. Select. Areas Commun., Vol. SAC-1, No. 4, pp. 756\u2013765, Nov. 1983.","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1147\/sj.234.0351","volume":"23","author":"W Bux","year":"1984","unstructured":"W. Bux, \u201cPerformance Issues in Local-Area Networks,\u201d IBM Syst. J., Vol. 23, No. 4, pp. 351\u2013374, 1984.","journal-title":"IBM Syst. J."},{"key":"13_CR17","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/3-540-15191-5_20","volume-title":"Lecture Notes in Computer Science 184: Local Area Networks: An Advanced Course","author":"W Bux","year":"1985","unstructured":"W. Bux, \u201cPerformance Issues,\u201d in Lecture Notes in Computer Science 184: Local Area Networks: An Advanced Course, Springer-Verlag, Berlin Heidelberg New York Tokyo, 1985, pp. 108\u2013161."},{"issue":"10","key":"13_CR18","doi-asserted-by":"publisher","first-page":"1058","DOI":"10.1109\/TCOM.1985.1096217","volume":"COM-33","author":"W Bux","year":"1985","unstructured":"W. Bux and D. Grillo, \u201cFlow Control in Local-Area Networks of Interconnected Token Rings,\u201d IEEE Trans. Commun., Vol. COM-33, No. 10, pp. 1058\u20131066, Oct. 1985.","journal-title":"IEEE Trans. Commun."},{"key":"13_CR19","first-page":"181","volume-title":"Performance \u201881","author":"JW Cohen","year":"1981","unstructured":"J.W. Cohen and O.J. Boxma, \u201cThe M\/G\/1 Queue with Alternating Service Formulated as a Riemann-Hilbert Problem,\u201d in Performance \u201881, F.J. Kylstra (ed.), North-Holland, Amsterdam, 1981, pp. 181\u2013199."},{"key":"13_CR20","volume-title":"Mathematics Studies 79","author":"JW Cohen","year":"1983","unstructured":"J.W. Cohen and O.J. Boxma, \u201cBoundary Value Problems in Queueing System Analysis,\u201d in Mathematics Studies 79, North-Holland, Amsterdam, 1983."},{"key":"13_CR21","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1002\/j.1538-7305.1969.tb01133.x","volume":"48","author":"RB Cooper","year":"1969","unstructured":"R.B. Cooper and G. Murray, \u201cQueues Served in Cyclic Order,\u201d Bell Syst. Tech. J., Vol. 48, pp. 675\u2013689, 1969.","journal-title":"Bell Syst. Tech. J."},{"key":"13_CR22","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1002\/j.1538-7305.1970.tb01778.x","volume":"49","author":"RB Cooper","year":"1970","unstructured":"R.B. Cooper, \u201cQueues Served in Cyclic Order: Waiting Times,\u201d Bell Syst. Tech. J., Vol. 49, pp. 399\u2013413, 1970.","journal-title":"Bell Syst. Tech. J."},{"key":"13_CR23","volume-title":"Message Queueing Delays in Polling Systems with Applications to Data Communication Networks","author":"LFM de Moreas","year":"1981","unstructured":"L.F.M. de Moreas, \u201cMessage Queueing Delays in Polling Systems with Applications to Data Communication Networks,\u201d Dept. of Systems Science, School of Engineering and Applied Science, University of California, Los Angeles, CA, UCLA-ENG-8106, May 1981."},{"issue":"1\/2","key":"13_CR24","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1147\/sj.221.0047","volume":"22","author":"RC Dixon","year":"1983","unstructured":"R.C. Dixon, N.C. Strole and J.D. Markov, \u201cA Token-Ring Network for Local Data Communications,\u201d IBM Syst. J., Vol. 22, Nos. 1\/2, pp. 47\u201362, 1983.","journal-title":"IBM Syst. J."},{"key":"13_CR25","first-page":"229","volume-title":"An Investigation of the FDDI Media Access Control Protocol","author":"D Dykeman","year":"1987","unstructured":"D. Dykeman and W. Bux, \u201cAn Investigation of the FDDI Media Access Control Protocol,\u201d in Proc. EFOC\/LAN 87, Basel, Switzerland, June, 1987, (IGI Europe), Information Gatekeepers, Inc., Boston, pp. 229\u2013236."},{"key":"13_CR26","unstructured":"D. Dykeman and W. Bux, \u201cAn Investigation of the FDDI Media Access Control Protocol,\u201d IBM Zurich Research Laboratory, Research Report, RZ 1591, May 1987."},{"key":"13_CR27","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1287\/opre.19.2.386","volume":"19","author":"M Eisenberg","year":"1971","unstructured":"M. Eisenberg, \u201cTwo Queues with Changeover Times,\u201d Oper. Res., Vol. 19, pp. 386\u2013401, 1971.","journal-title":"Oper. Res."},{"key":"13_CR28","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1287\/opre.20.2.440","volume":"20","author":"M Eisenberg","year":"1972","unstructured":"M. Eisenberg, \u201cQueues with Periodic Service and Changeover Times,\u201d Oper. Res., Vol. 20, pp. 440\u2013451, 1972.","journal-title":"Oper. Res."},{"issue":"2","key":"13_CR29","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1137\/0136024","volume":"36","author":"M Eisenberg","year":"1979","unstructured":"M. Eisenberg, \u201cTwo Queues with Alternating Service,\u201d SIAM J. Appl. Math., Vol. 36, No. 2, pp. 287\u2013303, April 1979.","journal-title":"SIAM J. Appl. Math."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"D.J. Farber, J. Feldman, F.R. Heinrich, M.D. Hopwood, D.C. Loomis and A. Rowe, \u201cThe Distributed Computer System,\u201d in Proc. 7th IEEE Computer Society Intl. Conf., Piscataway, NJ, IEEE, 1973, pp. 31\u201334.","DOI":"10.1109\/MC.1974.6323472"},{"key":"13_CR31","unstructured":"W.D. Farmer and E.E. Newhall, \u201cAn Experimental Distributed Switching System to Handle Bursty Computer Traffic,\u201d in Proc. ACM Symposium on Problems in the Optimization of Data Communications, Pine Mountain, GA, 1963, pp. 31\u201334."},{"issue":"3","key":"13_CR32","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/TCOM.1985.1096285","volume":"COM-33","author":"MJ Ferguson","year":"1985","unstructured":"M.J. Ferguson and Y.J. Aminetzah, \u201cExact Results for Nonsymmetric Token Ring Systems,\u201d IEEE Trans. Commun., Vol. COM-33, No. 3, pp. 223\u2013231, March 1985.","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"13_CR33","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/TCOM.1980.1094691","volume":"COM-28","author":"M Gerla","year":"1980","unstructured":"M. Gerla and L. Kleinrock, \u201cFlow Control: A Comparative Survey,\u201d IEEE Trans. Commun., Vol. COM-28, No. 4, pp. 553\u2013574, April 1980.","journal-title":"IEEE Trans. Commun."},{"issue":"4","key":"13_CR34","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1109\/TCOM.1981.1095009","volume":"COM-29","author":"A Giessler","year":"1981","unstructured":"A. Giessler, A. Jaegemann, E. Maeser and J.O. Haenle, \u201cFlow Control Based on Buffer Classes,\u201d IEEE Trans. Commun., Vol. COM-29, No. 4, pp. 436\u2013443, April 1981.","journal-title":"IEEE Trans. Commun."},{"key":"13_CR35","unstructured":"A. Goyal and D. Dias, \u201cPerformance of Priority Protocols on High-Speed Token Ring Networks,\u201d submitted to Third International Symposium on the Performance of Data Communication Systems, Rio de Janeiro, Brazil, June 22\u201325, 1987."},{"key":"13_CR36","unstructured":"R.M. Grow, \u201cA Timed Token Protocol for Local Area Networks,\u201d Electro\/82, Token Access Protocols (17\/3), May 1982."},{"key":"13_CR37","first-page":"189","volume":"20","author":"O Hashida","year":"1972","unstructured":"O. Hashida, \u201cAnalysis of Multiqueue,\u201d Rev. Elect. Commun. Lab., Vol. 20, pp. 189\u2013199, 1972.","journal-title":"Rev. Elect. Commun. Lab."},{"issue":"3\u20134","key":"13_CR38","first-page":"245","volume":"20","author":"O Hashida","year":"1981","unstructured":"O. Hashida and K. Ohara, \u201cLine Accommodation Capacity of a Communication Control Unit,\u201d Rev. Elec. Commun. Lab., Vol. 20, Nos. 3\u20134, pp. 245\u2013253, March\u2013April 1981.","journal-title":"Rev. Elec. Commun. Lab."},{"key":"13_CR39","unstructured":"P.A. Humblet, \u201cSource Coding for Communication Concentrators,\u201d Report ESL-R-798, Electronic Systems Laboratory, MIT, Jan. 1978."},{"key":"13_CR40","unstructured":"IEEE Standard 802.2, Logical Link Control."},{"key":"13_CR41","unstructured":"IEEE Standard 802.5, Token Ring Access Method and Physical Layer Specifications."},{"issue":"4","key":"13_CR42","first-page":"342","volume":"J64-B","author":"S Iisaku","year":"1981","unstructured":"S. Iisaku, N. Miki, N. Nagai and K. Hatori, \u201cTwo Queues with Alternating Service and Walking Time,\u201d Trans. Inst. Electron. Commun. Eng. Jpn., Vol. J64-B, No. 4, pp. 342\u2013343, April 1981.","journal-title":"Trans. Inst. Electron. Commun. Eng. Jpn."},{"key":"13_CR43","unstructured":"M.J. Johnson, \u201cProof that Timing Requirements of the FDDI Token Ring Protocol are Satisfied,\u201d Technical Report 85.8, Research Institute for Advanced Computer Science, NASA Ames Research Center, Aug. 1985."},{"key":"13_CR44","unstructured":"M.J. Johnson, \u201cFairness of Channel Access for Non-Time-Critical Traffic Using the FDDI Token Ring Protocol,\u201d in Proc. Advanced Seminar on Real-Time Local Area Networks, Bandol, France, April 1986."},{"key":"13_CR45","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1145\/321832.321845","volume":"21","author":"AG Konheim","year":"1974","unstructured":"A.G. Konheim and B. Meister, \u201cWaiting Lines and Times in a System with Polling,\u201d J. ACM, Vol. 21, No. 3, pp. 470\u2013490, July 1974.","journal-title":"J. ACM"},{"key":"13_CR46","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1002\/j.1538-7305.1979.tb02239.x","volume":"58","author":"PJ Kuehn","year":"1979","unstructured":"P.J. Kuehn, \u201cMultiqueue Systems with Nonexhaustive Cyclic Service,\u201d Bell Syst. Tech. J., Vol. 58, pp. 671\u2013698, 1979.","journal-title":"Bell Syst. Tech. J."},{"volume-title":"Frontiers in Communications-Advances in Local Area Networks","year":"1987","key":"13_CR47","unstructured":"K. K\u00fcmmerle, F.A. Tobagi, and J.O. Limb, (eds.) in Frontiers in Communications-Advances in Local Area Networks, IEEE Press, New York, 1987."},{"key":"13_CR48","first-page":"2","volume-title":"Frontiers in Communications: Advances in Loca Area Networks","author":"K K\u00fcmmerle","year":"1987","unstructured":"K. K\u00fcmmerle and M. Reiser, \u201cLocal-Area Networks \u2014 Major Technologies and Trends,\u201d in Frontiers in Communications: Advances in Loca Area Networks, IEEE Press, New York, 1987, pp. 2\u201326."},{"key":"13_CR49","unstructured":"K. Kurosawa and S. Tsujii, \u201cAnalysis on Asymmetric Polling Systems with Limiting Service,\u201d in Proc. Nat. Telecommunications Conference 1981, New Orleans, Louisiana, Nov. 29\u2013Dec. 3, 1981, pp. G.4.2.1\u2013GG4.2.5."},{"issue":"1","key":"13_CR50","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1109\/TCOM.1979.1094280","volume":"COM-27","author":"SS Lam","year":"1979","unstructured":"S.S. Lam and M. Reiser, \u201cCongestion Control of Store-and-Forward Networks by Input Buffer Limits \u2014 An Analysis,\u201d IEEE Trans. Commun., Vol. COM-27, No. 1, pp. 127\u2013134, Jan. 1979.","journal-title":"IEEE Trans. Commun."},{"key":"13_CR51","unstructured":"M.F. Neuts and M. Yadin, \u201cThe Transient Behavior of the Queue with Alternating Priorities with Special Reference to the Waiting Times,\u201d Mimeo Series No. 136, Dept. of Statistics, Purdue University, Jan. 1968."},{"issue":"7","key":"13_CR52","first-page":"600","volume":"J61-B","author":"M Nomura","year":"1978","unstructured":"M. Nomura and K. Tsukamoto, \u201cTraffic Analysis on Polling Systems,\u201d Trans. Inst. Electron. Commun. Eng. Jpn., Vol. J61-B, No. 7, pp. 600\u2013607, July 1978.","journal-title":"Trans. Inst. Electron. Commun. Eng. Jpn."},{"key":"13_CR53","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/0140-3664(79)90091-4","volume":"2","author":"BK Penney","year":"1979","unstructured":"B.K. Penney and A.A. Baghdadi, \u201cSurvey of Computer Communications Loop Networks: Parts 1 and 2,\u201d Computer Communications, Vol. 2, pp. 165\u2013180 and 224\u2013241, 1979.","journal-title":"Computer Communications"},{"key":"13_CR54","doi-asserted-by":"crossref","unstructured":"F.E. Ross, \u201cFDDI \u2014 A Tutorial,\u201d IEEE Commun. Magazine, Vol. 24, No. 5, May 1986.","DOI":"10.1109\/MCOM.1986.1093085"},{"issue":"5","key":"13_CR55","doi-asserted-by":"publisher","first-page":"935","DOI":"10.1109\/JSAC.1983.1145983","volume":"SAC-1","author":"I Rubin","year":"1983","unstructured":"I. Rubin and L.F.M. DeMoreas, \u201cMessage Delay Analysis for Polling and Token Multiple-Access Schemes for Local Communication Networks,\u201d IEEE J. Select. Areas Commun., Vol. SAC-1, No. 5, pp. 935\u2013947, Nov. 1983.","journal-title":"IEEE J. Select. Areas Commun."},{"key":"13_CR56","first-page":"239","volume":"4","author":"JH Saltzer","year":"1980","unstructured":"J.H. Saltzer and K.T. Pogran, \u201cA Star-Shaped Ring Network with High Maintainability,\u201d Computer Networks, Vol. 4, pp. 239\u2013244, 1980.","journal-title":"Computer Networks"},{"key":"13_CR57","volume-title":"Telecommunications Networks: Protocols, Modeling and Analysis","author":"M Schwartz","year":"1987","unstructured":"M. Schwartz, \u201cTelecommunications Networks: Protocols, Modeling and Analysis,\u201d Addison-Wesley, Reading, MA, 1987."},{"key":"13_CR58","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1109\/TSE.1987.233169","volume":"SE-13","author":"KC Sevcik","year":"1987","unstructured":"K.C. Sevcik and M.J. Johnson, \u201cCycle Time Properties of the FDDI Token Ring Protocol,\u201d IEEE Trans. Software Eng., Vol. SE-13, No. 3, pp. 376\u2013385, March 1987.","journal-title":"IEEE Trans. Software Eng."},{"key":"13_CR59","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1145\/359038.359044","volume":"23","author":"JF Shoch","year":"1980","unstructured":"J.F. Shoch and J.A. Hupp, \u201cMeasured Performance of an Ethernet Local Network,\u201d Comm. ACM, Vol. 23, pp. 711\u2013721, 1980.","journal-title":"Comm. ACM"},{"key":"13_CR60","volume-title":"Local Networks \u2014 An Introduction","author":"W Stallings","year":"1984","unstructured":"W. Stallings, \u201cLocal Networks \u2014 An Introduction,\u201d Macmillan, New York, 1984."},{"key":"13_CR61","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1145\/322169.322174","volume":"27","author":"GB Swartz","year":"1980","unstructured":"G.B. Swartz, \u201cPolling in a Loop System,\u201d J. ACM, Vol. 27, pp. 42\u201359, 1980.","journal-title":"J. ACM"},{"key":"13_CR62","doi-asserted-by":"publisher","first-page":"1182","DOI":"10.1287\/opre.18.6.1182","volume":"18","author":"JS Sykes","year":"1970","unstructured":"J.S. Sykes, \u201cSimplified Analysis of an Alternating-Priority Queueing Model with Setup Times,\u201d Oper. Res., Vol. 18, pp. 1182\u20131192, 1970.","journal-title":"Oper. Res."},{"key":"13_CR63","doi-asserted-by":"publisher","first-page":"639","DOI":"10.1287\/opre.16.3.639","volume":"16","author":"L Takacs","year":"1968","unstructured":"L. Takacs, \u201cTwo Queues Attended by a Single Server,\u201d Oper. Res., Vol. 16, pp. 639\u2013650, 1968.","journal-title":"Oper. Res."},{"key":"13_CR64","unstructured":"H. Takagi, \u201cMean Message Waiting Times in Symmetric Multi-Queue Systems with Cyclic Service,\u201d in Proc. IEEE Int. Conf. on Commun., Chicago, June 23\u201326, 1985, pp. 1154\u20131157."},{"key":"13_CR65","volume-title":"Analysis of Polling Systems","author":"H Takagi","year":"1986","unstructured":"H. Takagi, \u201cAnalysis of Polling Systems,\u201d The MIT Press, Cambridge, MA, 1986."},{"key":"13_CR66","unstructured":"J.M. Ulm, \u201cA Timed Token Ring Local Area Network and Its Performance Characteristics,\u201d in Proc. 7th Conference on Local Computer Networks, Minneapolis, IEEE, Feb. 1982, pp. 50\u201356."},{"key":"13_CR67","first-page":"521","volume-title":"Performance \u201884","author":"KS Watson","year":"1984","unstructured":"K.S. Watson, \u201cPerformance Evaluation of Cyclic Service Strategies \u2014 A Survey,\u201d in Performance \u201884, E. Gelenbe (ed.), Elsevier Science Pubi. B.V. (North Holland), Amsterdam, 1984, pp. 521\u2013533."},{"issue":"10","key":"13_CR68","doi-asserted-by":"publisher","first-page":"1111","DOI":"10.1109\/TCOM.1984.1095972","volume":"COM-32","author":"JW Wong","year":"1984","unstructured":"J.W. Wong and W. Bux, \u201cAnalytic Modeling of an Adapter to Local-Area Networks,\u201d IEEE Trans. Commun., Vol. COM-32, No. 10, pp. 1111\u20131117, Oct. 1984.","journal-title":"IEEE Trans. Commun."},{"key":"13_CR69","first-page":"67","volume-title":"Data\/Voice Integration Based on the IEEE 802.5 Token-Ring LAN","author":"P Zafiropulo","year":"1986","unstructured":"P. Zafiropulo, H.R. M\u00fcller and F. Closs, \u201cData\/Voice Integration Based on the IEEE 802.5 Token-Ring LAN,\u201d in Proc. EFOC\/LAN 86, Amsterdam, The Netherlands, June, 1986, (IGI Europe), Information Gatekeepers Inc., Boston, pp. 67\u201376."}],"container-title":["Informatik-Fachberichte","Messung, Modellierung und Bewertung von Rechensystemen"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-73016-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,16]],"date-time":"2024-04-16T11:13:10Z","timestamp":1713265990000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-73016-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987]]},"ISBN":["9783540184065","9783642730160"],"references-count":69,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-73016-0_13","relation":{},"ISSN":["0343-3005"],"issn-type":[{"type":"print","value":"0343-3005"}],"subject":[],"published":{"date-parts":[[1987]]}}}