{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T18:01:05Z","timestamp":1648836065077},"reference-count":24,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1990,4,1]],"date-time":"1990-04-01T00:00:00Z","timestamp":638928000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1990,4]]},"DOI":"10.1016\/0140-3664(90)90101-l","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"157-164","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and simulation of the priority scheme in token bus protocols"],"prefix":"10.1016","volume":"13","author":[{"family":"Seung Ho Hong","sequence":"first","affiliation":[]},{"given":"Asok","family":"Ray","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(90)90101-L_BIB1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1115\/1.3188739","article-title":"Research directions in computer networking for manufacturing systems","author":"Ray","year":"1989","journal-title":"ASME J. Eng. Industry"},{"issue":"No 3","key":"10.1016\/0140-3664(90)90101-L_BIB2","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/65.3272","article-title":"Networking for computer-integrated manufacturing","volume":"Vol 2","author":"Ray","year":"1988","journal-title":"IEEE Netw. Mag. Special Issue on Communications for Manufacturing"},{"key":"10.1016\/0140-3664(90)90101-L_BIB3","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1115\/1.3143869","article-title":"Performance analysis of medium access control protocols for distributed digital avionics","author":"Ray","year":"1987","journal-title":"ASME J. Dynamic Syst. Measure. and Control"},{"key":"10.1016\/0140-3664(90)90101-L_BIB4","series-title":"ANSI\/IEEE Standard 802.4 \u2014 1985 \u2018Token passing bus access method and physical layer specifications\u2019","year":"1985"},{"key":"10.1016\/0140-3664(90)90101-L_BIB5","series-title":"SAE Linear Token Passing Multiplexed Data Bus Standard","year":"1987"},{"key":"10.1016\/0140-3664(90)90101-L_BIB6","unstructured":"Manufacturing Automation Protocol (MAP) 3.0 Implementation Release available through MAP\/TOP Users Group, One SME Drive, PO Box 930, Dearbom, MI 48121, USA"},{"key":"10.1016\/0140-3664(90)90101-L_BIB7","unstructured":"Archambault, J \u2018An IEEE 802.4 token bus network simulation\u2019 Report No. NBSIR 84-2966, (US) National Bureau of Standards"},{"key":"10.1016\/0140-3664(90)90101-L_BIB8","series-title":"Proc. Workshop on Analytic and Simulation Modelling of IEE 802.4 Token Bus LAN","article-title":"Performance analysis of IEEE 802.4 token bus","author":"Jayasumana","year":"1987"},{"key":"10.1016\/0140-3664(90)90101-L_BIB9","series-title":"IEEE\/ACM Symp. Simulation of Computer Networks","article-title":"Simulation and performance evaluation of 802.4 priority scheme","author":"Jayasumana","year":"1987"},{"key":"10.1016\/0140-3664(90)90101-L_BIB10","series-title":"IEEE INFOCOM","article-title":"Performance analysis of a token bus priority scheme","author":"Jayasumana","year":"1987"},{"key":"10.1016\/0140-3664(90)90101-L_BIB11","article-title":"Performance analysis of token bus protocols for integrated control system networks","author":"Hong","year":"1989"},{"issue":"No 6","key":"10.1016\/0140-3664(90)90101-L_BIB12","doi-asserted-by":"crossref","first-page":"997","DOI":"10.1109\/49.1962","article-title":"Analysis and tuning of the FDDI media access control protocol","volume":"Vol SAC-6","author":"Dykeman","year":"1988","journal-title":"IEEE J. Select. Areas Commun."},{"issue":"No 3","key":"10.1016\/0140-3664(90)90101-L_BIB13","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1002\/j.1538-7305.1979.tb02239.x","article-title":"Multiqueue systems with nonexhaustive cyclic service","volume":"Vol 58","author":"Kuehn","year":"1979","journal-title":"Bell Syst. Tech. J."},{"key":"10.1016\/0140-3664(90)90101-L_BIB14","first-page":"231","article-title":"Line accommodation capacity of a communication control unit","volume":"Vol 20","author":"Hashida","year":"1972","journal-title":"Review of the Electrical Communication Laboratories, Nippon Telegraph and Telephone Public Corporation"},{"key":"10.1016\/0140-3664(90)90101-L_BIB15","series-title":"Petri Net Theory and the Modelling of Systems","author":"Peterson","year":"1981"},{"key":"10.1016\/0140-3664(90)90101-L_BIB16","first-page":"419","article-title":"Modelling and analysis of communication and corporation protocols using Petri net based models","volume":"Vol 6","author":"Diaz","year":"1982","journal-title":"Comput. Netw."},{"key":"10.1016\/0140-3664(90)90101-L_BIB17","series-title":"Proc. Int. Workshop on Timed Petri Nets","article-title":"A stochastic Petri net model for Ethernet","author":"Gressier","year":"1985"},{"key":"10.1016\/0140-3664(90)90101-L_BIB18","series-title":"Introduction to SIMAN System","author":"Pegden","year":"1986"},{"issue":"No 5","key":"10.1016\/0140-3664(90)90101-L_BIB19","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1177\/003754978504400503","article-title":"Process-interaction simulation language","volume":"Vol 44","author":"Banks","year":"1985","journal-title":"Simulation"},{"issue":"No 5","key":"10.1016\/0140-3664(90)90101-L_BIB20","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/9.1221","article-title":"Extensions of infinitesimal perturbation analysis","volume":"Vol 33","author":"Ho","year":"1988","journal-title":"IEEE Trans. Aut. Control"},{"key":"10.1016\/0140-3664(90)90101-L_BIB21","series-title":"Proc. Amer. Control. Conference","first-page":"518","article-title":"Perturbation analysis of a token bus protocol for network performance management","author":"Lee","year":"1989"},{"key":"10.1016\/0140-3664(90)90101-L_BIB22","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1115\/1.3152698","article-title":"Integrated communication and control systems: part I \u2014 analysis","author":"Halevi","year":"1988","journal-title":"ASME J. Dyn. Syst. Measure. and Control"},{"key":"10.1016\/0140-3664(90)90101-L_BIB23","doi-asserted-by":"crossref","first-page":"374","DOI":"10.1115\/1.3152699","article-title":"Integrated communication and control systems: part II \u2014 design considerations","author":"Ray","year":"1988","journal-title":"ASME J. Dyn. Syst. Measure. and Control"},{"key":"10.1016\/0140-3664(90)90101-L_BIB24","series-title":"Nonlinear Programming: Theory and Algorithm","author":"Bazarra","year":"1979"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090101L?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649090101L?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:28:20Z","timestamp":1552638500000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014036649090101L"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1990,4]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1990,4]]}},"alternative-id":["014036649090101L"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(90)90101-l","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1990,4]]}}}