{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,14]],"date-time":"2023-02-14T03:27:05Z","timestamp":1676345225843},"reference-count":21,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1990,4,1]],"date-time":"1990-04-01T00:00:00Z","timestamp":638928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1990,4]]},"DOI":"10.1016\/0140-3664(90)90098-2","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T18:34:07Z","timestamp":1060281247000},"page":"136-142","source":"Crossref","is-referenced-by-count":8,"title":["Analysis of interconnected systems of token ring networks"],"prefix":"10.1016","volume":"13","author":[{"given":"Oliver C","family":"Ibe","sequence":"first","affiliation":[]},{"family":"Xian Cheng","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(90)90098-2_BIB1","series-title":"ANSI\/IEEE Standard 802.3 Carrier Sense Multiple Access with Collision Detection Access Method","year":"1985"},{"key":"10.1016\/0140-3664(90)90098-2_BIB2","series-title":"ANSI\/IEEE Standard 802.4 Token-Passing Bus Access Method","year":"1985"},{"key":"10.1016\/0140-3664(90)90098-2_BIB3","series-title":"ANSI\/IEEE Standard 802.5 Token Ring Access Method","year":"1985"},{"key":"10.1016\/0140-3664(90)90098-2_BIB4","series-title":"ANSI FDDI Token Ring Media Access Control (MAC)","year":"1986"},{"issue":"No 5","key":"10.1016\/0140-3664(90)90098-2_BIB5","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1016\/0169-7552(85)90069-8","article-title":"MAC layer interconnection of IEEE 802 local area networks","volume":"Vol 10","author":"Bernsten","year":"1985","journal-title":"Comput. Netw. ISDN Syst."},{"issue":"No 10","key":"10.1016\/0140-3664(90)90098-2_BIB6","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/TCOM.1985.1096217","article-title":"Flow control in local-area networks of interconnected token rings","volume":"Vol COM-33","author":"Bux","year":"1985","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0140-3664(90)90098-2_BIB7","series-title":"Analysis of Polling Systems","author":"Takagi","year":"1986"},{"key":"10.1016\/0140-3664(90)90098-2_BIB8","series-title":"Technical Report","article-title":"Analysis of a Single Server Model with Two Queues Having Different Service Disciplines","author":"Ozawa","year":"1987"},{"key":"10.1016\/0140-3664(90)90098-2_BIB9","series-title":"Proc. 12th Int. Teletraffic Congress","article-title":"Waiting-time approximations for cyclic-service systems with mixed service strategies","author":"Groenendijk","year":"1988"},{"key":"10.1016\/0140-3664(90)90098-2_BIB10","series-title":"Internal Report","article-title":"Analysis of Polling Systems with Mixed Service Disciplines","author":"Ibe","year":"1989"},{"issue":"No 3","key":"10.1016\/0140-3664(90)90098-2_BIB11","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TCOM.1985.1096285","article-title":"Exact results for asymmetric single-service token-passing systems","volume":"Vol COM-33","author":"Ferguson","year":"1985","journal-title":"IEEE Trans. Commun."},{"issue":"No 7","key":"10.1016\/0140-3664(90)90098-2_BIB12","doi-asserted-by":"crossref","first-page":"719","DOI":"10.1109\/TCOM.1986.1096599","article-title":"Simple approximations for token rings","volume":"COM-34","author":"Everitt","year":"1986","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0140-3664(90)90098-2_BIB13","series-title":"Performance '84","first-page":"521","article-title":"Performance evaluation of cyclic service strategies: a survey","author":"Watson","year":"1984"},{"key":"10.1016\/0140-3664(90)90098-2_BIB14","doi-asserted-by":"crossref","first-page":"949","DOI":"10.2307\/3214218","article-title":"Pseudo-conservation laws in cyclic-service systems","volume":"Vol 24","author":"Boxma","year":"1987","journal-title":"J. Appl. Prob."},{"issue":"No 6","key":"10.1016\/0140-3664(90)90098-2_BIB15","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1109\/26.31141","article-title":"Approximate analysis of asymmetric single-service token-passing systems","volume":"Vol 37","author":"Ibe","year":"1989","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0140-3664(90)90098-2_BIB16","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1287\/opre.9.3.383","article-title":"A proof of the formula: L = \u03bbW","volume":"Vol 9","author":"Little","year":"1961","journal-title":"Operat. Res."},{"issue":"No 3","key":"10.1016\/0140-3664(90)90098-2_BIB17","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1002\/j.1538-7305.1979.tb02239.x","article-title":"Multiqueue systems with nonexhaustive cyclic service","volume":"Vol 58","author":"Kuehn","year":"1979","journal-title":"Bell Syst. Tech. J."},{"issue":"No 4","key":"10.1016\/0140-3664(90)90098-2_BIB18","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/0166-5316(85)90027-6","article-title":"Mean message waiting times in symmetric multiqueue systems with cyclic service","volume":"Vol 5","author":"Takagi","year":"1985","journal-title":"Perf. Eval."},{"issue":"No 1","key":"10.1016\/0140-3664(90)90098-2_BIB19","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/62058.62059","article-title":"Queueing analysis of polling systems","volume":"Vol 20","author":"Takagi","year":"1988","journal-title":"ACM Comput. Surv."},{"issue":"No 4","key":"10.1016\/0140-3664(90)90098-2_BIB20","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1016\/0166-5316(87)90015-0","article-title":"Waiting time approximations for cyclic service systems with switchover times","volume":"Vol 7","author":"Boxma","year":"1987","journal-title":"Perf. Eval."},{"key":"10.1016\/0140-3664(90)90098-2_BIB21","series-title":"SIMSCRIPT II.5 Programming Language CACI","year":"1983"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366490900982?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0140366490900982?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T04:28:22Z","timestamp":1552624102000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0140366490900982"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,4]]},"references-count":21,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1990,4]]}},"alternative-id":["0140366490900982"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(90)90098-2","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1990,4]]}}}