{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T17:44:44Z","timestamp":1772819084961,"version":"3.50.1"},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,7,1]],"date-time":"2006-07-01T00:00:00Z","timestamp":1151712000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Queueing Syst"],"published-print":{"date-parts":[[2006,7]]},"DOI":"10.1007\/s11134-006-6669-x","type":"journal-article","created":{"date-parts":[[2006,6,12]],"date-time":"2006-06-12T10:05:07Z","timestamp":1150106707000},"page":"115-125","source":"Crossref","is-referenced-by-count":52,"title":["Exact emulation of a priority queue with a switch and delay lines"],"prefix":"10.1007","volume":"53","author":[{"given":"A. D.","family":"Sarwate","sequence":"first","affiliation":[]},{"given":"V.","family":"Anantharam","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6669_CR1","unstructured":"A. Albanese, J. Blorner, J. Edmonds, M. Luby and M. Sudan, \u2018Priority encoded transmission\u2019. In: Proceedings of the 35th Annual ACM Symposium on the Foundations of Computer Science (1994)."},{"issue":"6","key":"6669_CR2","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/18.556669","volume":"42","author":"N. Alon","year":"1996","unstructured":"N. Alon and M. Luby, \u2018A linear time erasure-resilient code with nearly optimal recovery\u2019. IEEE Transactions on Information Theory 42(6) (1996), 1732\u20131736.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"6669_CR3","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1109\/9.751355","volume":"44","author":"V. Anantharam","year":"1999","unstructured":"V. Anantharam and T. Konstantopoulos, \u2018A methodology for the design of optimal traffic shapers in ATM networks\u2019. IEEE Transactions on Automatic Control 44(3) (1999), 583\u2013586.","journal-title":"IEEE Transactions on Automatic Control"},{"key":"6669_CR4","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511800467","volume-title":"Algebraic Codes for Data Transmission","author":"R.E. Blahut","year":"2003","unstructured":"R.E. Blahut, Algebraic Codes for Data Transmission. Cambridge, UK: Cambridge University Press (2003)."},{"issue":"8","key":"6669_CR5","doi-asserted-by":"crossref","first-page":"1528","DOI":"10.1109\/JSAC.2002.803996","volume":"20","author":"J.W. Byers","year":"2002","unstructured":"J.W. Byers, M. Luby and M. Mitzenmacher, \u2018A digital fountain approach to asynchronous reliable multicast\u2019. IEEE Journal on Selected Areas in Communications 20(8) (2002), 1528\u20131540.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"6669_CR6","unstructured":"C. Chang, D. Lee and C. Tu, \u2018Recursive construction of FIFO optical multiplexers with switched delay lines\u2019. submitted to IEEE Transactions of Information Theory (2002)."},{"key":"6669_CR7","doi-asserted-by":"crossref","unstructured":"C.-S. Chang, D.-S. Lee and C.-K. Tu, \u2018Using switched delay lines for exact emulation of FIFO multiplexers with variable length bursts\u2019. In: Proceedings of IEEE INFOCOM (2003).","DOI":"10.1109\/INFCOM.2003.1209221"},{"issue":"1","key":"6669_CR8","doi-asserted-by":"crossref","first-page":"114","DOI":"10.1109\/18.61109","volume":"37","author":"R.L. Cruz","year":"1991a","unstructured":"R.L. Cruz, \u2018A calculus for network delay I: network elements in isolation\u2019. IEEE Transactions on Information Theory 37(1) (1991a), 114\u2013131.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"6669_CR9","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1109\/18.61110","volume":"37","author":"R.L. Cruz","year":"1991b","unstructured":"R.L. Cruz, \u2018A calculus for network delay II: network analysis\u2019. IEEE Transactions on Information Theory 37(1) (1991b), 132\u2013141.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"12","key":"6669_CR10","doi-asserted-by":"crossref","first-page":"2081","DOI":"10.1109\/50.736577","volume":"16","author":"D. Hunter","year":"1998","unstructured":"D. Hunter, M. Chia and I. Androvic, \u2018Buffering in Optical Packet Switches\u2019. IEEE Journal of Lightwave Technology 16(12) (1998), 2081\u20132094.","journal-title":"IEEE Journal of Lightwave Technology"},{"key":"6669_CR11","doi-asserted-by":"crossref","unstructured":"T. Konstantopoulos and V. Anantharam, \u2018Optimal flow control schemes that regulate the burstiness of traffic\u2019. IEEE\/ACM Transactions on Networking 3(4) (1995), 423\u2013432.","DOI":"10.1109\/90.413216"},{"issue":"2","key":"6669_CR12","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1109\/18.910575","volume":"47","author":"M. Luby","year":"2001","unstructured":"M. Luby, M. Mitzenmacher, M.A. Shokrollahi and D.A. Spielman, \u2018Efficient erasure correction codes\u2019. IEEE Transactions on Information Theory 47(2) (2001), 569\u2013584.","journal-title":"IEEE Transactions on Information Theory"},{"key":"6669_CR13","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1109\/45.997969","volume":"21","author":"R. Medina","year":"2002","unstructured":"R. Medina, 2002, \u2018Photons vs. electrons [all optical network]\u2019. Potentials 21, 9\u201311.","journal-title":"Potentials"},{"key":"6669_CR14","volume-title":"Optical Networks: a practical perspective","author":"R. Ramaswami","year":"2002","unstructured":"R. Ramaswami and K. Sivarajan, Optical Networks: a practical perspective. San Francisco: Morgan Kaufmann (2002)."},{"key":"6669_CR15","doi-asserted-by":"crossref","first-page":"3237","DOI":"10.1109\/JLT.2003.819802","volume":"21","author":"E.J. Tyler","year":"2003","unstructured":"E.J. Tyler, P. Kourtessis, M. Webster, E. Rochart, T. Quinlan, S.E.M. Dudley, S.D. Walker, R.V. Petty and I.H. White, \u2018Towards Terabit-per-second Capacities over Multimode fiber links using SCM\/WDM Techniques\u2019. Journal of Lightwave Technology 21 (2003), 3237\u20133243.","journal-title":"Journal of Lightwave Technology"}],"container-title":["Queueing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11134-006-6669-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11134-006-6669-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11134-006-6669-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:44:36Z","timestamp":1559375076000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11134-006-6669-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2006,7]]}},"alternative-id":["6669"],"URL":"https:\/\/doi.org\/10.1007\/s11134-006-6669-x","relation":{},"ISSN":["0257-0130","1572-9443"],"issn-type":[{"value":"0257-0130","type":"print"},{"value":"1572-9443","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,7]]}}}