{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T06:33:26Z","timestamp":1698042806018},"reference-count":32,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1990,2,1]],"date-time":"1990-02-01T00:00:00Z","timestamp":633830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Processing Letters"],"published-print":{"date-parts":[[1990,2]]},"DOI":"10.1016\/0020-0190(90)90211-f","type":"journal-article","created":{"date-parts":[[2002,7,26]],"date-time":"2002-07-26T04:10:11Z","timestamp":1027656611000},"page":"289-295","source":"Crossref","is-referenced-by-count":5,"title":["Path integral evaluation of aloha network transients"],"prefix":"10.1016","volume":"33","author":[{"given":"Neil J.","family":"Gunther","sequence":"first","affiliation":[]},{"given":"John G.","family":"Shaw","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0020-0190(90)90211-F_BIB1","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1109\/TIT.1985.1057021","article-title":"Development of the ALOHANET","volume":"31","author":"Abrahamson","year":"1985","journal-title":"IEEE Trans. Inform. Theory"},{"key":"10.1016\/0020-0190(90)90211-F_BIB2","year":"1968"},{"issue":"4","key":"10.1016\/0020-0190(90)90211-F_BIB3","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/TCOM.1975.1092823","article-title":"Bistable behavior of ALOHA-type systems","volume":"23","author":"Carleial","year":"1975","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0020-0190(90)90211-F_BIB4","doi-asserted-by":"crossref","first-page":"907","DOI":"10.1109\/TAC.1983.1103345","article-title":"Large deviations and rare events in the study of stochastic algorithms","volume":"28","author":"Cottrell","year":"1983","journal-title":"IEEE Trans. Automat. Control"},{"key":"10.1016\/0020-0190(90)90211-F_BIB5","volume":"Vol. II","author":"Feller","year":"1971"},{"key":"10.1016\/0020-0190(90)90211-F_BIB6","series-title":"Statistical Mechanics","author":"Feynman","year":"1981"},{"key":"10.1016\/0020-0190(90)90211-F_BIB7","series-title":"Handbook of Stochastic Methods for Physics, Chemistry and the Natural Sciences","author":"Gardiner","year":"1985"},{"key":"10.1016\/0020-0190(90)90211-F_BIB8","series-title":"An analysis of ALOHA systems via large deviations","author":"Greenberg","year":"1986"},{"issue":"1","key":"10.1016\/0020-0190(90)90211-F_BIB9","first-page":"276","article-title":"A new interpretation of instabilities in computer performance models","volume":"16","author":"Gunther","year":"1988","journal-title":"Proc. ACM SIGMETRICS Conf. on Measurement and Modeling of Computer Systems"},{"issue":"1","key":"10.1016\/0020-0190(90)90211-F_BIB10","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0020-0190(89)90061-6","article-title":"Path integral methods for computer performance analysis","volume":"32","author":"Gunther","year":"1989","journal-title":"Inform. Process. Lett."},{"key":"10.1016\/0020-0190(90)90211-F_BIB11","article-title":"Bilinear model of blocking transients in circuit-switched networks","author":"Gunther","year":"1989","journal-title":"Xerox PARC"},{"key":"10.1016\/0020-0190(90)90211-F_BIB12","article-title":"Unstable processes in computer systems","author":"Gunther","year":"1989","journal-title":"Xerox PARC Video Document"},{"key":"10.1016\/0020-0190(90)90211-F_BIB13","article-title":"Instantons and tunneling instabilities in computational systems","author":"Gunther","year":"1989","journal-title":"Xerox PARC"},{"issue":"6","key":"10.1016\/0020-0190(90)90211-F_BIB14","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1137\/0145059","article-title":"The metastable behavior of infrequently observed weakly random, one-dimensional diffusion processes","volume":"45","author":"Kipnis","year":"1985","journal-title":"SIAM J. Appl. Math."},{"key":"10.1016\/0020-0190(90)90211-F_BIB15","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/TCOM.1975.1092814","article-title":"Packet switching in a multiaccess broadcast channel: performance evaluation","volume":"23","author":"Kleinrock","year":"1975","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0020-0190(90)90211-F_BIB16","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/TCOM.1977.1093707","article-title":"An approximation method for the design and analysis of an ALOHA system","volume":"25","author":"Kobayashi","year":"1977","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0020-0190(90)90211-F_BIB17","first-page":"279","author":"Kogan","year":"1985","journal-title":"Topics in the Theoretical Bases and Applications of Computer Science: Proc.IV Hungarian Comp. Sci. Conf."},{"key":"10.1016\/0020-0190(90)90211-F_BIB18","year":"1988"},{"key":"10.1016\/0020-0190(90)90211-F_BIB19","article-title":"Steady-state analysis of a slotted and controlled ALOHA system with blocking","author":"Metcalfe","year":"1973","journal-title":"Proc. VIth Hawaii Conf. on System Sciences"},{"issue":"7","key":"10.1016\/0020-0190(90)90211-F_BIB20","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1145\/360248.360253","article-title":"Ethernet: distributed packet switching for local computer networks","volume":"19","author":"Metcalfe","year":"1976","journal-title":"Comm. ACM"},{"key":"10.1016\/0020-0190(90)90211-F_BIB21","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1145\/28869.28878","article-title":"Stochastic catastrophe theory in computer performance modeling","volume":"34","author":"Nelson","year":"1987","journal-title":"J. Assoc. Comput. Mech."},{"issue":"6","key":"10.1016\/0020-0190(90)90211-F_BIB22","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/JSAC.1986.1146399","article-title":"The asymptotic analysis of some packet radio networks","volume":"4","author":"Pinsky","year":"1986","journal-title":"IEEE J. Select. Areas Comm."},{"key":"10.1016\/0020-0190(90)90211-F_BIB23","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1093\/comjnl\/9.2.200","article-title":"A method for finding the optimum successive over relaxation parameter","volume":"9","author":"Reid","year":"1966","journal-title":"Comput. J."},{"issue":"10","key":"10.1016\/0020-0190(90)90211-F_BIB24","doi-asserted-by":"crossref","first-page":"994","DOI":"10.1109\/TAC.1983.1103155","article-title":"On the instability of the slotted ALOHA multiaccess algorithm","volume":"28","author":"Rosenkrantz","year":"1983","journal-title":"IEEE Trans. Automat. Control"},{"key":"10.1016\/0020-0190(90)90211-F_BIB25","series-title":"Analysis and Simulation of Semiconductor Devices","author":"Selberherr","year":"1984"},{"key":"10.1016\/0020-0190(90)90211-F_BIB26","series-title":"Performance '87","article-title":"Stability analysis of large Markov Chains","author":"Semal","year":"1988"},{"key":"10.1016\/0020-0190(90)90211-F_BIB27","series-title":"Computer Networks","author":"Tanenbaum","year":"1981"},{"key":"10.1016\/0020-0190(90)90211-F_BIB28","series-title":"Implementation of Finite-Element Methods for Navier\u2013Stokes Equations","author":"Thomaset","year":"1981"},{"key":"10.1016\/0020-0190(90)90211-F_BIB29","series-title":"Eigenfunction Expansions Associated with Second-Order Differential Equations, Part I","author":"Titchmarsh","year":"1962"},{"key":"10.1016\/0020-0190(90)90211-F_BIB30","series-title":"Large Deviations And Applications","author":"Varadhan","year":"1984"},{"key":"10.1016\/0020-0190(90)90211-F_BIB31","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/0304-4149(87)90036-6","article-title":"Diffusion first passage times: approximations and related differential equations","volume":"27","author":"Wenocur","year":"1988","journal-title":"Stochast. Process. Appl."},{"issue":"2","key":"10.1016\/0020-0190(90)90211-F_BIB32","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/26.20080","article-title":"An exact analysis and performance evaluation of framed ALOHA with capture","volume":"37","author":"Wieselthier","year":"1989","journal-title":"IEEE Trans. Comm."}],"container-title":["Information Processing Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002001909090211F?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:002001909090211F?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,12]],"date-time":"2019-04-12T16:58:28Z","timestamp":1555088308000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/002001909090211F"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,2]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1990,2]]}},"alternative-id":["002001909090211F"],"URL":"https:\/\/doi.org\/10.1016\/0020-0190(90)90211-f","relation":{},"ISSN":["0020-0190"],"issn-type":[{"value":"0020-0190","type":"print"}],"subject":[],"published":{"date-parts":[[1990,2]]}}}