{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:28:43Z","timestamp":1649104123432},"reference-count":31,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1987,4,1]],"date-time":"1987-04-01T00:00:00Z","timestamp":544233600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1987,4]]},"DOI":"10.1016\/0140-3664(87)90103-4","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"70-78","source":"Crossref","is-referenced-by-count":0,"title":["Decomposition approaches to modelling LAN contention and host computer performance"],"prefix":"10.1016","volume":"10","author":[{"given":"Andr\u00e9B","family":"Bondi","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"No 12","key":"10.1016\/0140-3664(87)90103-4_BIB1","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1145\/359038.359044","article-title":"Measured performance of an Ethernet local network","volume":"Vol 23","author":"Schoch","year":"1980","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(87)90103-4_BIB2","series-title":"Quantitative system performance: computer system analysis using queueing network models","author":"Lazowska","year":"1984"},{"key":"10.1016\/0140-3664(87)90103-4_BIB3","series-title":"Computer systems performance modeling","author":"Sauer","year":"1981"},{"key":"10.1016\/0140-3664(87)90103-4_BIB4","series-title":"Computer systems performance evaluation","author":"Ferrari","year":"1978"},{"issue":"No 10","key":"10.1016\/0140-3664(87)90103-4_BIB5","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1145\/359015.359019","article-title":"A model of shared DASD and multipathing","volume":"Vol 23","author":"Bard","year":"1980","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(87)90103-4_BIB6","first-page":"118","article-title":"I\/O systems with dynamic path selection and general transmission networks","volume":"Vol 11","author":"Bard","year":"1982"},{"key":"10.1016\/0140-3664(87)90103-4_BIB7","article-title":"A reliable token-ring system for localarea communication","author":"Bux","year":"1981"},{"key":"10.1016\/0140-3664(87)90103-4_BIB8","series-title":"On ring architected local neworks Proteon Report","author":"Salwen","year":"1982"},{"key":"10.1016\/0140-3664(87)90103-4_BIB9","article-title":"Ethernet: distributed packet switching for local computer networks","author":"Metcalfe","year":"1975"},{"issue":"No 10","key":"10.1016\/0140-3664(87)90103-4_BIB10","first-page":"1645","article-title":"Local area subnetworks: a performance comparison","volume":"Vol COM-29","author":"Bux","year":"1981","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0140-3664(87)90103-4_BIB11","series-title":"Proc. Performance '84, IFIP Working Group 7.3","first-page":"303","article-title":"Modeling the effect of local area network contention on the performance of host computers","author":"Bondi","year":"1984"},{"key":"10.1016\/0140-3664(87)90103-4_BIB12","article-title":"Incorporating open queueing models into closed queueing network algorithms","author":"Bondi","year":"1984"},{"issue":"No 9","key":"10.1016\/0140-3664(87)90103-4_BIB13","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1145\/362342.362345","article-title":"Computational algorithms for closed queueing networks with exponential servers","volume":"Vol 16","author":"Buzen","year":"1973","journal-title":"Commun. ACM"},{"issue":"No 2","key":"10.1016\/0140-3664(87)90103-4_BIB14","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/322186.322195","article-title":"Mean value analysis of closed multichain queueing networks","volume":"Vol 27","author":"Reiser","year":"1980","journal-title":"J. Assoc. Comput. Mach."},{"key":"10.1016\/0140-3664(87)90103-4_BIB15","series-title":"Computational algorithms for closed queueing networks","author":"Bruell","year":"1980"},{"key":"10.1016\/0140-3664(87)90103-4_BIB16","first-page":"250","article-title":"Modeling the Cambridge ring","volume":"Vol 11","author":"King","year":"1982"},{"issue":"No 7","key":"10.1016\/0140-3664(87)90103-4_BIB17","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1002\/spe.4380110707","article-title":"Message transport in the Cambridge ring: a simulation study","volume":"Vol 11","author":"Lunn","year":"1981","journal-title":"Software Pract. & Exper."},{"issue":"No 3","key":"10.1016\/0140-3664(87)90103-4_BIB18","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1145\/6420.6423","article-title":"File access performance of discless workstations","volume":"Vol 4","author":"Lazowska","year":"1986","journal-title":"Trans. Comput. Syst."},{"issue":"No 2","key":"10.1016\/0140-3664(87)90103-4_BIB19","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1145\/321879.321887","article-title":"Open, closed, and mixed networks of queues with different classes of customers","volume":"Vol 22","author":"Baskett","year":"1975","journal-title":"J. Assoc. Comput. Mach."},{"issue":"No 2","key":"10.1016\/0140-3664(87)90103-4_BIB20","article-title":"Methodes iteratives de resolution de modeles mathematiques de systemes informatiques","volume":"Vol 12","author":"Marie","year":"1978","journal-title":"RAIRO informatique\/computer science"},{"issue":"No 9","key":"10.1016\/0140-3664(87)90103-4_BIB21","doi-asserted-by":"crossref","first-page":"2779","DOI":"10.1002\/j.1538-7305.1983.tb03204.x","article-title":"The queueing network analyser","volume":"Vol 62","author":"Whitt","year":"1983","journal-title":"Bell Syst. Tech. J."},{"issue":"No 9","key":"10.1016\/0140-3664(87)90103-4_BIB22","doi-asserted-by":"crossref","first-page":"2817","DOI":"10.1002\/j.1538-7305.1983.tb03205.x","article-title":"Performance of the queueing network analyser","volume":"Vol 62","author":"Whitt","year":"1983","journal-title":"Bell. Syst. Tech. J."},{"key":"10.1016\/0140-3664(87)90103-4_BIB23","series-title":"Queues","author":"Cox","year":"1961"},{"issue":"No 3","key":"10.1016\/0140-3664(87)90103-4_BIB24","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/0166-5316(86)90019-2","article-title":"The effects of service time variability in a closed network of queues","volume":"Vol 6","author":"Bondi","year":"1986","journal-title":"Perf. Eval."},{"key":"10.1016\/0140-3664(87)90103-4_BIB25","series-title":"Proc. ACM Sigmetrics Conf.","first-page":"266","article-title":"Performance models of token ring local area networks","author":"Berry","year":"1983"},{"key":"10.1016\/0140-3664(87)90103-4_BIB26","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1002\/j.1538-7305.1979.tb02239.x","article-title":"Multiqueue systems with non-exhaustive cyclic service","author":"Kuehn","year":"1979","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/0140-3664(87)90103-4_BIB27","series-title":"Recal: a new efficient algorithm for the exact analysis of multiplechain closed queueing networks","author":"Conway","year":"1985"},{"key":"10.1016\/0140-3664(87)90103-4_BIB28","article-title":"The behaviour of Ethernet-like computer communications networks","author":"Almes","year":"1979"},{"key":"10.1016\/0140-3664(87)90103-4_BIB29","series-title":"Proc. ACM Sigmetrics Conf. Measure. & Model. Comput. Syst.","first-page":"130","article-title":"Multiple class memory constrained queueing networks","author":"Lazowska","year":"1982"},{"key":"10.1016\/0140-3664(87)90103-4_BIB30","series-title":"Proc. ACM Sigmetrics Conf.","first-page":"70","article-title":"The influence of workload representation on response times in queueing models of computer systems","author":"Zahorjan","year":"1983"},{"key":"10.1016\/0140-3664(87)90103-4_BIB31","series-title":"Introduction to simulation and slam","author":"Pritsker","year":"1979"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366487901034?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366487901034?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:20:38Z","timestamp":1552638038000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366487901034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1987,4]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1987,4]]}},"alternative-id":["0140366487901034"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(87)90103-4","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1987,4]]}}}