{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T06:37:51Z","timestamp":1648881471397},"reference-count":31,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[1990,11,1]],"date-time":"1990-11-01T00:00:00Z","timestamp":657417600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1990,11]]},"DOI":"10.1016\/0140-3664(90)90007-4","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"558-570","source":"Crossref","is-referenced-by-count":3,"title":["Integrated methodology for supporting packet network performance management and planning"],"prefix":"10.1016","volume":"13","author":[{"given":"Jonathan L","family":"Wang","sequence":"first","affiliation":[]},{"given":"Ellen A","family":"White","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(90)90007-4_BIB1","year":"1986","journal-title":"Bellcore Technical Reference TR-TSY-000301 Issue 1"},{"key":"10.1016\/0140-3664(90)90007-4_BIB2","doi-asserted-by":"crossref","unstructured":"Lawser, J and Oxley, P \u2018Common channel signalling network evolution\u2019 AT&T Tech. J. Vol 66 No 3 (May\/June 19870 pp 13\u201320","DOI":"10.1002\/j.1538-7305.1987.tb00206.x"},{"key":"10.1016\/0140-3664(90)90007-4_BIB3","year":"1987","journal-title":"Bellcore Technical Reference TR-NPL-000246 Issue 2"},{"key":"10.1016\/0140-3664(90)90007-4_BIB4","first-page":"147","article-title":"\u2018Knocking on users\u2019 doors: Signalling System 7","author":"Roehr","year":"1989","journal-title":"Data Commun."},{"key":"10.1016\/0140-3664(90)90007-4_BIB5","first-page":"52","article-title":"SMDS: An alternative to private network?","author":"Shantz","year":"1989","journal-title":"Telecommun. Mag."},{"key":"10.1016\/0140-3664(90)90007-4_BIB6","first-page":"66","article-title":"Sending high-speed data on the public network","author":"Hemrick","year":"1989","journal-title":"Telecommun. Int."},{"key":"10.1016\/0140-3664(90)90007-4_BIB7","year":"1989","journal-title":"Bellcore Technical Advisory TA-TSY-000772 Issue 3"},{"key":"10.1016\/0140-3664(90)90007-4_BIB8","series-title":"Proc. 8th Int. Conf. Comp. Comm.","first-page":"199","article-title":"Distributed queuing: a fast and efficient packet access protocol for QPSX","author":"Newman","year":"1986"},{"key":"10.1016\/0140-3664(90)90007-4_BIB9","series-title":"Proc. Network Management and Control Workshop","first-page":"192","article-title":"Fault isolation in communication networks","author":"Yuang","year":"1989"},{"key":"10.1016\/0140-3664(90)90007-4_BIB10","series-title":"Proc. Network Management and Control Workshop","first-page":"216","article-title":"On the design of observers for fault detection of discrete event system","author":"Bouloutas","year":"1989"},{"key":"10.1016\/0140-3664(90)90007-4_BIB11","series-title":"Proc. Network Management and Control Workshop","first-page":"344","article-title":"Defense data network fault isolation system","author":"Kim","year":"1989"},{"key":"10.1016\/0140-3664(90)90007-4_BIB12","series-title":"Proc. IEEE INFOCOM","first-page":"269","article-title":"Performance analysis for the traffic engineering of packet network","author":"Sheng","year":"1986"},{"key":"10.1016\/0140-3664(90)90007-4_BIB13","series-title":"13th International Teletraffic Congress","article-title":"Estimation of point-to-point traffic demands in dynamic routing networks","author":"Tu","year":"1990"},{"key":"10.1016\/0140-3664(90)90007-4_BIB14","series-title":"Regression and the Moore-Penrose Pseudo-Inverse","author":"Albert","year":"1972"},{"key":"10.1016\/0140-3664(90)90007-4_BIB15","series-title":"Proc. IEEE Globecom","first-page":"456","article-title":"Performance analysis methodology for packet network design","author":"Sheng","year":"1983"},{"key":"10.1016\/0140-3664(90)90007-4_BIB16","volume":"Vol. 1","author":"Kleinrock","year":"1976"},{"key":"10.1016\/0140-3664(90)90007-4_BIB17","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MCOM.1987.1093464","article-title":"Service provisioning operations for public packet switched network (PPSN) access","volume":"Vol 25","author":"Rathore","year":"1987","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/0140-3664(90)90007-4_BIB18","series-title":"Load balancing algorithms for public packet switched networks in INPLANS","author":"Wang","year":"1989"},{"key":"10.1016\/0140-3664(90)90007-4_BIB19","series-title":"Computers and Intractability \u2014 A Guide to the Theory of NP-Completeness","author":"Garey","year":"1979"},{"key":"10.1016\/0140-3664(90)90007-4_BIB20","series-title":"A Practical Guide to Teletraffic Engineering and Administration","author":"Lawson","year":"1983"},{"key":"10.1016\/0140-3664(90)90007-4_BIB21","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1145\/321879.321887","article-title":"Open, closed, and mixed networks or queues with different classes of customers","author":"Basket","year":"1975","journal-title":"J. ACM"},{"key":"10.1016\/0140-3664(90)90007-4_BIB22","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1147\/rd.193.0283","article-title":"Queuing networks with multiple closed chains: theory and computational algorithms","volume":"Vol 19","author":"Reiser","year":"1975","journal-title":"IBM J. Res. Develop."},{"key":"10.1016\/0140-3664(90)90007-4_BIB23","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/322186.322195","article-title":"Mean value analysis of closed multichain queuing networks","volume":"Vol 27","author":"Reiser","year":"1980","journal-title":"J. ACM"},{"key":"10.1016\/0140-3664(90)90007-4_BIB24","unstructured":"Chang, T \u2018A branch and bound method with a tight slack cost lower bound for solving a K-shortest path problem\u2019 in preparation"},{"key":"10.1016\/0140-3664(90)90007-4_BIB25","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1007\/BF01386390","article-title":"A note on two problems in connexion with graphs","volume":"Vol 1","author":"Dijkstra","year":"1959","journal-title":"Numerische Math."},{"key":"10.1016\/0140-3664(90)90007-4_BIB26","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1090\/qam\/102435","article-title":"On a routing problem","volume":"Vol 16","author":"Bellman","year":"1958","journal-title":"Quart. Appl. Math."},{"key":"10.1016\/0140-3664(90)90007-4_BIB27","doi-asserted-by":"crossref","first-page":"526","DOI":"10.1090\/qam\/253822","article-title":"An algorithm for finding shortest routes from all source nodes to a given destination in general networks","volume":"Vol 27","author":"Yen","year":"1970","journal-title":"Quart. Appl. Math."},{"key":"10.1016\/0140-3664(90)90007-4_BIB28","series-title":"Analytical end-to-end common channel signalling network delay models in INPLANS","author":"Wang","year":"1989"},{"key":"10.1016\/0140-3664(90)90007-4_BIB29","series-title":"Performance modeling and traffic engineering for common channel signalling link sets in INPLANS","author":"Wang","year":"1990"},{"key":"10.1016\/0140-3664(90)90007-4_BIB30","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1145\/3166.3170","article-title":"Designing for usability: key principles and what designers think","author":"Gould","year":"1985","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(90)90007-4_BIB31","series-title":"Handbook of Human-Computer Interaction","article-title":"Usability engineering: our experiences and evolution","author":"Whiteside","year":"1988"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366490900074?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366490900074?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T04:56:35Z","timestamp":1585112195000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366490900074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,11]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[1990,11]]}},"alternative-id":["0140366490900074"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(90)90007-4","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1990,11]]}}}