{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T19:16:48Z","timestamp":1761938208637,"version":"build-2065373602"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1996,12,1]],"date-time":"1996-12-01T00:00:00Z","timestamp":849398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommunication Systems"],"published-print":{"date-parts":[[1996,12]]},"DOI":"10.1007\/bf02114284","type":"journal-article","created":{"date-parts":[[2005,9,13]],"date-time":"2005-09-13T10:15:18Z","timestamp":1126606518000},"page":"21-43","source":"Crossref","is-referenced-by-count":13,"title":["Topology design and bridge-capacity assignment for interconnecting token ring LANs: A simulated annealing approach"],"prefix":"10.1007","volume":"6","author":[{"given":"Larry J.","family":"LeBlanc","sequence":"first","affiliation":[]},{"given":"June S.","family":"Park","sequence":"additional","affiliation":[]},{"given":"V.","family":"Sridhar","sequence":"additional","affiliation":[]},{"given":"Joakim","family":"Kalvenes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"BF02114284_CR1","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1109\/TCOM.1977.1093708","volume":"COM-25","author":"R.R. Boorstyn","year":"1977","unstructured":"R.R. Boorstyn and H. Frank, Large scale network topological optimization, IEEE Trans. Commun. COM-25(1977)29\u201346.","journal-title":"IEEE Trans. Commun."},{"key":"BF02114284_CR2","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1109\/5.18625","volume":"77","author":"W. Bux","year":"1989","unstructured":"W. Bux, Token-ring local-area networks and their performance, Proc. IEEE 77(1989)238\u2013256.","journal-title":"Proc. IEEE"},{"key":"BF02114284_CR3","volume-title":"Technical Report CS-89-85","author":"J.J. Dongarra","year":"1993","unstructured":"J.J. Dongarra, Performance of various computers using standard linear equations software, Technical Report CS-89-85, Computer Science Department, University of Tennessee, Knoxville, TN (1993)."},{"key":"BF02114284_CR4","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1287\/ijoc.3.4.275","volume":"3","author":"P.C. Fetterolf","year":"1991","unstructured":"P.C. Fetterolf and G. Anandalingam, Optimizing interconnection of local area networks: An approach using simulated annealing, ORSA J. Comput. 3(1991)275\u2013287.","journal-title":"ORSA J. Comput."},{"key":"BF02114284_CR5","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1287\/opre.40.4.678","volume":"40","author":"P.C. Fetterolf","year":"1992","unstructured":"P.C. Fetterolf and G. Anandalingam, A Lagrangian relaxation technique for optimizing interconnection of local area networks, Oper. Res. 40(1992)678\u2013688.","journal-title":"Oper. Res."},{"key":"BF02114284_CR6","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/net.3230030202","volume":"3","author":"L. Fratta","year":"1973","unstructured":"L. Fratta, M. Gerla and L. Kleinrock, The flow deviation method: An approach to store- and-forward computer communication network design, Networks 3(1973)97\u2013133.","journal-title":"Networks"},{"key":"BF02114284_CR7","unstructured":"B. Gavish, A general model for the topological design of computer networks,GLOBECOM-86 (1986) pp. 1584\u20131588."},{"key":"BF02114284_CR8","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/0377-2217(92)90204-M","volume":"58","author":"B. Gavish","year":"1992","unstructured":"B. Gavish, Topological design of computer communication networks \u2014 The overall design problem, Euro. J. Oper. Res. 58(1992)149\u2013172.","journal-title":"Euro. J. Oper. Res."},{"key":"BF02114284_CR9","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1287\/ijoc.2.3.236","volume":"2","author":"B. Gavish","year":"1990","unstructured":"B. Gavish and K. Altinkemer, Backbone network design tools with economic tradeoffs, ORSA J. Comput. 2(1990)236\u2013252.","journal-title":"ORSA J. Comput."},{"key":"BF02114284_CR10","doi-asserted-by":"crossref","first-page":"360","DOI":"10.1109\/26.20116","volume":"COM-37","author":"B. Gavish","year":"1989","unstructured":"B. Gavish and I. Neuman, A system for routing and capacity assignment in computer communication networks, IEEE Trans. Commun. COM-37(1989)360\u2013366.","journal-title":"IEEE Trans. Commun."},{"key":"BF02114284_CR11","doi-asserted-by":"crossref","first-page":"1181","DOI":"10.1109\/49.35563","volume":"SAC-7","author":"B. Gavish","year":"1989","unstructured":"B. Gavish, B. Trudeau, P. Dror, M. Gendreau and L. Mason, Fiber optic circuit network design under reliability constraints, IEEE J. Select. Areas Commun. SAC-7(1989)1181\u20131187.","journal-title":"IEEE J. Select. Areas Commun."},{"key":"BF02114284_CR12","first-page":"82","volume":"2","author":"A.M. Geoffrion","year":"1974","unstructured":"A.M. Geoffrion, Lagrangian relaxation for integer programming, Math. Progr. 2(1974)82\u2013114.","journal-title":"Math. Progr."},{"key":"BF02114284_CR13","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/TCOM.1977.1093709","volume":"COM-25","author":"M. Gerla","year":"1977","unstructured":"M. Gerla and L. Kleinrock, On the topological design of distributed computer networks, IEEE Trans. Commun. COM-25(1977)48\u201360.","journal-title":"IEEE Trans. Commun."},{"key":"BF02114284_CR14","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/65.3241","volume":"2","author":"M. Gerla","year":"1988","unstructured":"M. Gerla and L. Kleinrock, Congestion control in interconnected LANs, IEEE Networks 2(1988)72\u201376.","journal-title":"IEEE Networks"},{"key":"BF02114284_CR15","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/BF01158794","volume":"9","author":"S. Gupta","year":"1991","unstructured":"S. Gupta and K.W. Ross, Performance modeling and optimization of networks of bridged LANs, Queueing Systems 9(1991)113\u2013132.","journal-title":"Queueing Systems"},{"key":"BF02114284_CR16","unstructured":"Vendor Master Directory and Vendor Catalogs on CD-ROM, Information Handling Services, Englewood, CO (1993)."},{"key":"BF02114284_CR17","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1109\/26.81738","volume":"COM-39","author":"A. Kershenbaum","year":"1991","unstructured":"A. Kershenbaum, P. Kermani and G. Grover, MENTOR: An algorithm for mesh network topological optimization and routing, IEEE Trans. Commun. COM-39(1991)503\u2013513.","journal-title":"IEEE Trans. Commun."},{"key":"BF02114284_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-7744-1","volume-title":"Simulated Annealing: Theory and Applications","author":"P.J.M. Laarhoven van","year":"1987","unstructured":"P.J.M. van Laarhoven and E.H.L. Aarts,Simulated Annealing: Theory and Applications (Reidel, Dordrecht, 1987)."},{"key":"BF02114284_CR19","volume-title":"Ph.D. Dissertation","author":"L.J. LeBlanc","year":"1973","unstructured":"L.J. LeBlanc, Mathematical programming algorithms for large-scale network equilibrium and network design problems, Ph.D. Dissertation, Department of Industrial Engineering and Management Sciences, Northwestern University, Evanston, IL (1973)."},{"key":"BF02114284_CR20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1287\/trsc.18.1.1","volume":"18","author":"T.L. Magnanti","year":"1984","unstructured":"T.L. Magnanti and R.T. Wong, Network design and transportation planning: Models and algorithms, Transport. Sci. 18(1984)1\u201355.","journal-title":"Transport. Sci."},{"key":"BF02114284_CR21","unstructured":"T. Mikkelson, Network Systems Corp., private communication."},{"key":"BF02114284_CR22","doi-asserted-by":"crossref","first-page":"946","DOI":"10.1109\/JSAC.1986.1146400","volume":"SAC-4","author":"C.L. Monma","year":"1986","unstructured":"C.L. Monma and D.D. Sheng, Backbone network design and performance analysis: A methodology for packet switching networks, IEEE J. Select. Areas Commun. SAC-4(1986)946\u2013965.","journal-title":"IEEE J. Select. Areas Commun."},{"key":"BF02114284_CR23","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1002\/net.3230080306","volume":"8","author":"C.H. Papadimitriou","year":"1978","unstructured":"C.H. Papadimitriou, The complexity of the capacitated tree problems, Networks 8(1978)217\u2013230.","journal-title":"Networks"},{"key":"BF02114284_CR24","doi-asserted-by":"crossref","unstructured":"J.S. Park, R. Bartoszynski and W.A. Rosenkrantz, Stability ofp-persistent CSMA\/CD, ORSA J. Comput., to be published.","DOI":"10.1287\/ijoc.7.2.149"},{"key":"BF02114284_CR25","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/BF02136162","volume":"1","author":"J.S. Park","year":"1993","unstructured":"J.S. Park and K. Kang, Delay analysis of multidimensional queueing process in CSMA\/CD local area networks, Telecom. Syst. 1(1993)217\u2013242.","journal-title":"Telecom. Syst."},{"key":"BF02114284_CR26","first-page":"463","volume-title":"Proc. Telecommunication Systems Conf.","author":"J.S. Park","year":"1993","unstructured":"J.S. Park and V. Sridhar, Optimal interconnection of token ring networks using source routing bridges,Proc. Telecommunication Systems Conf., Vanderbilt University, Nashville, TN (1993) pp. 463\u2013475."},{"key":"BF02114284_CR27","volume-title":"Interconnection: Bridges and Routers","author":"R. Perlman","year":"1992","unstructured":"R. Perlman,Interconnection: Bridges and Routers (Addison-Wesley, Reading, 1992)."},{"key":"BF02114284_CR28","volume-title":"Ph.D. Dissertation","author":"V. Sridhar","year":"1994","unstructured":"V. Sridhar, Optimal design of interconnected local area networks, Ph.D. Dissertation, Department of Management Sciences, The University of Iowa, Iowa City, IA (1994)."},{"key":"BF02114284_CR29","unstructured":"H. Takagi, Application of polling models to computer networks, IBM Research Report RT 0032 (1990)."},{"key":"BF02114284_CR30","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1137\/0208032","volume":"8","author":"L.G. Valiant","year":"1979","unstructured":"L.G. Valiant, The complexity of enumeration and reliability problems, SIAM J. Comput. 8(1979)410\u2013421.","journal-title":"SIAM J. Comput."},{"key":"BF02114284_CR31","unstructured":"Data Sources \u2014 The Complete Computer Product Book: Hardware and Data Communications Volume (Ziff-Davis Publ., New York, 1993)."}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02114284.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02114284\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02114284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:56:03Z","timestamp":1557795363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02114284"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1996,12]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1996,12]]}},"alternative-id":["BF02114284"],"URL":"https:\/\/doi.org\/10.1007\/bf02114284","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"type":"print","value":"1018-4864"},{"type":"electronic","value":"1572-9451"}],"subject":[],"published":{"date-parts":[[1996,12]]}}}