{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:59:13Z","timestamp":1649206753402},"reference-count":36,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[1991,11,1]],"date-time":"1991-11-01T00:00:00Z","timestamp":688953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[1991,11]]},"DOI":"10.1016\/0140-3664(91)90110-m","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T22:34:07Z","timestamp":1060295647000},"page":"525-533","source":"Crossref","is-referenced-by-count":1,"title":["Hybrid-token ring: a load sharing local area network"],"prefix":"10.1016","volume":"14","author":[{"given":"Cheoul-Shin","family":"Kang","sequence":"first","affiliation":[]},{"given":"Eun K","family":"Park","sequence":"additional","affiliation":[]},{"given":"James H","family":"Herzog","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0140-3664(91)90110-M_BIB1","series-title":"CSMA\/CD Access Method and Physical Layer Specifications","year":"1985"},{"key":"10.1016\/0140-3664(91)90110-M_BIB2","series-title":"Token-Passing Bus Access Method and Physical Layer Specifications","year":"1985"},{"key":"10.1016\/0140-3664(91)90110-M_BIB3","series-title":"Token-Ring Access Method and Physical Layer Specifications","year":"1985"},{"key":"10.1016\/0140-3664(91)90110-M_BIB4","series-title":"Local Area Networks: Logical Link Control","year":"1985"},{"issue":"No 10","key":"10.1016\/0140-3664(91)90110-M_BIB5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/2.7053","article-title":"Misconceptions about realtime computing","volume":"Vol 21","author":"Stankovic","year":"1988","journal-title":"IEEE Computer"},{"key":"10.1016\/0140-3664(91)90110-M_BIB6","series-title":"Proc. IEEE 13th Conf. on Local Comput. Networks","first-page":"72","article-title":"Interconnection of token ring LANs using bridges: an approximate mean waiting time analysis","author":"Tsai","year":"1988"},{"key":"10.1016\/0140-3664(91)90110-M_BIB7","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/0169-7552(86)90016-4","article-title":"A protocol-less scheme for bridging between IEEE 802 local area networks","volume":"Vol 12","author":"Kummer","year":"1987","journal-title":"Comput. Networks & ISDN Syst."},{"issue":"No 7","key":"10.1016\/0140-3664(91)90110-M_BIB8","doi-asserted-by":"crossref","first-page":"938","DOI":"10.1109\/26.57509","article-title":"Cut-through bridging for CSMA\/CD local area networks","volume":"Vol 38","author":"Kwok","year":"1990","journal-title":"IEEE Trans. Commun."},{"issue":"No 1","key":"10.1016\/0140-3664(91)90110-M_BIB9","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/0140-3664(89)90041-8","article-title":"Performance measurement of interconnected CSMA\/CD LANs","volume":"Vol 12","author":"Poo","year":"1989","journal-title":"Comput. Commun."},{"issue":"No 7","key":"10.1016\/0140-3664(91)90110-M_BIB10","doi-asserted-by":"crossref","first-page":"730","DOI":"10.1109\/TCOM.1987.1096846","article-title":"Interconnection of CSMA local area networks: the frequency division approach","volume":"Vol 35","author":"Merakos","year":"1987","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/0140-3664(91)90110-M_BIB11","series-title":"Proc. IEEE INFOCOM'90","first-page":"617","article-title":"A study of slot reuse in dual bus multiple access networks","author":"Garrett","year":"1990"},{"key":"10.1016\/0140-3664(91)90110-M_BIB12","series-title":"Proc. 7th Texas Conf. Comput. Syst.","article-title":"A distributed double loop computer network","author":"Wolf","year":"1978"},{"key":"10.1016\/0140-3664(91)90110-M_BIB13","series-title":"Proc. IEEE Int. Conf. on Commun.","first-page":"206","article-title":"A CSMA\/CD-token ring hybrid architecture for local area networks","author":"Thanawastien","year":"1986"},{"key":"10.1016\/0140-3664(91)90110-M_BIB14","series-title":"Proc. IEEE INFOCOM'90","first-page":"610","article-title":"Waiting time analysis in a single buffer DQDB (802.6) network","author":"Bisdikian","year":"1990"},{"key":"10.1016\/0140-3664(91)90110-M_BIB15","year":"1987","journal-title":"ANSI Standard X3.139"},{"key":"10.1016\/0140-3664(91)90110-M_BIB16","author":"Pfleeger","year":"1989"},{"issue":"No 4","key":"10.1016\/0140-3664(91)90110-M_BIB17","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/52325.52340","article-title":"A mesh\/token ring hybrid architecture LAN","volume":"Vol 18","author":"Kang","year":"1988","journal-title":"ACM Comput. Commun. Rev."},{"key":"10.1016\/0140-3664(91)90110-M_BIB18","series-title":"Proc. IEEE 13th Conf. Local Comput. Networks","first-page":"463","article-title":"Hybrid-Meshnet: a new approach to mesh LANs","author":"Kang","year":"1988"},{"key":"10.1016\/0140-3664(91)90110-M_BIB19","series-title":"Proc. World Conf. on Info. Process.\/Commun.","first-page":"216","article-title":"A new LAN architecture for the 1990s","author":"Kang","year":"1989"},{"key":"10.1016\/0140-3664(91)90110-M_BIB20","first-page":"64","article-title":"A local network design using fiber optics","author":"Neff","year":"1981","journal-title":"COMPCON '81"},{"key":"10.1016\/0140-3664(91)90110-M_BIB21","series-title":"Proc. MELECON '83","first-page":"A2.08","article-title":"Contention-free local area network technique with high channel utilization","author":"Petitpierre","year":"1983"},{"issue":"No 8","key":"10.1016\/0140-3664(91)90110-M_BIB22","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MCOM.1984.1092015","article-title":"Meshed local computer networks","volume":"Vol 22","author":"Petitpierre","year":"1984","journal-title":"IEEE Commun. Mag."},{"key":"10.1016\/0140-3664(91)90110-M_BIB23","article-title":"Fiber optic local area network with arbitrary topology","author":"Pung","year":"1983","journal-title":"IEEE Colloquium on Optical Fiber Local Network"},{"key":"10.1016\/0140-3664(91)90110-M_BIB24","series-title":"Proc. IEEE ICC","first-page":"1154","article-title":"A new flood routing technique for fiber optic local area networks with arbitrary topology","author":"Pung","year":"1984"},{"key":"10.1016\/0140-3664(91)90110-M_BIB25","series-title":"Proc. IEEE INFOCOM '85","first-page":"26","article-title":"Arbitrary fiber optic LANs \u2014 performance and design issues","author":"Pung","year":"1985"},{"key":"10.1016\/0140-3664(91)90110-M_BIB26","series-title":"Proc. 24th Comput. Simulation Conf.","article-title":"A simulation of a CSMA\/CD with connected data links","author":"Al-Salqan","year":"1991"},{"key":"10.1016\/0140-3664(91)90110-M_BIB27","series-title":"Proc. ACM Symposium on Problems in the Optimization of Data Commun.","article-title":"An experimental distributed switching system to handle bursty computer traffic","author":"Farmer","year":"1969"},{"issue":"No 3","key":"10.1016\/0140-3664(91)90110-M_BIB28","article-title":"Quantitative measurement of performance degradation in LANs","volume":"Vol 12","author":"Kang","year":"1990","journal-title":"J. Mini and Microcomputers"},{"key":"10.1016\/0140-3664(91)90110-M_BIB29","author":"Hammond","year":"1986"},{"key":"10.1016\/0140-3664(91)90110-M_BIB30","author":"Takagi","year":"1985"},{"key":"10.1016\/0140-3664(91)90110-M_BIB31","first-page":"1346","article-title":"Status of CCITT description techniques and application to protocol specification","volume":"Vol 71","author":"Dickson","year":"1983"},{"key":"10.1016\/0140-3664(91)90110-M_BIB32","first-page":"1356","article-title":"Formal description techniques","volume":"Vol 71","author":"Vissers","year":"1983"},{"issue":"No 8","key":"10.1016\/0140-3664(91)90110-M_BIB33","doi-asserted-by":"crossref","first-page":"1014","DOI":"10.1145\/63030.63038","article-title":"Benchmarks for LAN performance evaluation","volume":"Vol 31","author":"Press","year":"1988","journal-title":"Commun. ACM"},{"key":"10.1016\/0140-3664(91)90110-M_BIB34","article-title":"LAN speeds surge into gigabit sphere","author":"Weiss","year":"1988","journal-title":"Electr. Eng. Times"},{"key":"10.1016\/0140-3664(91)90110-M_BIB35","series-title":"TMS 380 Adapter Chip set User's Guide","year":"1986"},{"key":"10.1016\/0140-3664(91)90110-M_BIB36","series-title":"Proc. IEEE Real-Time Systems Symposium","first-page":"79","article-title":"Token ring adapter-chip set architectural consideration for real time systems","author":"Marchok","year":"1989"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649190110M?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:014036649190110M?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T08:51:13Z","timestamp":1552639873000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/014036649190110M"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,11]]},"references-count":36,"journal-issue":{"issue":"9","published-print":{"date-parts":[[1991,11]]}},"alternative-id":["014036649190110M"],"URL":"https:\/\/doi.org\/10.1016\/0140-3664(91)90110-m","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[1991,11]]}}}