{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T12:18:32Z","timestamp":1649074712870},"reference-count":30,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1991,11,1]],"date-time":"1991-11-01T00:00:00Z","timestamp":688953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Performance Evaluation"],"published-print":{"date-parts":[[1991,11]]},"DOI":"10.1016\/0166-5316(91)90049-9","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T17:52:02Z","timestamp":1062611522000},"page":"253-265","source":"Crossref","is-referenced-by-count":0,"title":["Problems in expediting protocol processing: performance analysis of kernel mode priority scheduling and front end protocol processors"],"prefix":"10.1016","volume":"13","author":[{"given":"Andr\u00e9B","family":"Bondi","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0166-5316(91)90049-9_BIB1","series-title":"The Design of the UNIX (TM) Operating System","author":"Bach","year":"1986"},{"key":"10.1016\/0166-5316(91)90049-9_BIB2","article-title":"Approximate solutions of queueing network models of computer systems","author":"Balbo","year":"1979"},{"issue":"2","key":"10.1016\/0166-5316(91)90049-9_BIB3","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1145\/321879.321887","article-title":"Open, closed, and mixed networks of queues with different classes of customers","volume":"22","author":"Baskett","year":"1975","journal-title":"J. ACM"},{"key":"10.1016\/0166-5316(91)90049-9_BIB4","series-title":"Proc. Performance '84, IFIP Working Group 7.3","first-page":"303","article-title":"Modeling the effect of local area network contention on the performance of host computers","author":"Bondi","year":"1984"},{"key":"10.1016\/0166-5316(91)90049-9_BIB5","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1016\/0166-5316(88)90004-1","article-title":"A new MVA-based approximation for closed queueing networks with a preemptive priority server","volume":"8","author":"Bondi","year":"1988","journal-title":"Performance Evaluation"},{"key":"10.1016\/0166-5316(91)90049-9_BIB6","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1016\/0166-5316(86)90019-2","article-title":"The effects of service time variability in a closed network of queues","volume":"6","author":"Bondi","year":"1986","journal-title":"Performance Evaluation"},{"key":"10.1016\/0166-5316(91)90049-9_BIB7","article-title":"Performance aspects of kernel mode priority execution in UNIX","author":"Bondi","year":"1987"},{"issue":"4","key":"10.1016\/0166-5316(91)90049-9_BIB8","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1145\/357401.357406","article-title":"The MVA priority approximation","volume":"2","author":"Bryant","year":"1984","journal-title":"TOCS"},{"key":"10.1016\/0166-5316(91)90049-9_BIB9","series-title":"Proc. ACM SIGMETRICS Conf. on Measurement and Modeling of Computer Systems","article-title":"The MVA pre-empt resume priority approximation","author":"Bryant","year":"1983"},{"key":"10.1016\/0166-5316(91)90049-9_BIB10","first-page":"313","article-title":"A use of complex probabilities in the theory of stochastic processes","volume":"51","author":"Cox","year":"1955"},{"key":"10.1016\/0166-5316(91)90049-9_BIB11","series-title":"Queues","author":"Cox","year":"1961"},{"issue":"3","key":"10.1016\/0166-5316(91)90049-9_BIB12","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1145\/356733.356735","article-title":"The operational analysis of queueing network models","volume":"10","author":"Denning","year":"1978","journal-title":"Comput. Surveys"},{"issue":"10","key":"10.1016\/0166-5316(91)90049-9_BIB13","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1145\/358769.358787","article-title":"Low contention semaphores and ready lists","volume":"24","author":"Denning","year":"1981","journal-title":"Comm. ACM"},{"key":"10.1016\/0166-5316(91)90049-9_BIB14","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1287\/opre.15.2.266","article-title":"Cyclic queueing systems with restricted length queues","volume":"15","author":"Gordon","year":"1967","journal-title":"Oper. Res."},{"key":"10.1016\/0166-5316(91)90049-9_BIB15","article-title":"Installing and operating 4.3BSD on the VAX","author":"Karels","year":"1986"},{"key":"10.1016\/0166-5316(91)90049-9_BIB16","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1016\/0166-5316(84)90031-2","article-title":"Approximation methods for networks of queues with priorities","volume":"4","author":"Kaufman","year":"1984","journal-title":"Perform. Eval."},{"key":"10.1016\/0166-5316(91)90049-9_BIB17","author":"Kleinrock","year":"1975"},{"key":"10.1016\/0166-5316(91)90049-9_BIB18","author":"Kleinrock","year":"1976"},{"issue":"2","key":"10.1016\/0166-5316(91)90049-9_BIB19","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1145\/321941.321952","article-title":"A queueing model with finite waiting room and blocking","volume":"23","author":"Konheim","year":"1976","journal-title":"J. ACM"},{"key":"10.1016\/0166-5316(91)90049-9_BIB20","series-title":"Quantitative System Performance: Computer System Analysis using Queueing Network Models","author":"Lazowska","year":"1984"},{"key":"10.1016\/0166-5316(91)90049-9_BIB21","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/800199.806155","article-title":"Calculating equilibrium probabilities for LAMBDA(n)\/Ck\/1\/N queues","author":"Marie","year":"1980","journal-title":"Performance '80"},{"issue":"3","key":"10.1016\/0166-5316(91)90049-9_BIB22","article-title":"Methodes iteratives de resolution de mod\u00e8les mathematiques de syst\u00e8mes informatiques","volume":"12","author":"Marie","year":"1978","journal-title":"RAIRO Informatique\/Comput. Sci."},{"key":"10.1016\/0166-5316(91)90049-9_BIB23","series-title":"Matrix-Geometric Solutions in Stochastic Models: An Algorithmic Approach","author":"Neuts","year":"1981"},{"key":"10.1016\/0166-5316(91)90049-9_BIB24","series-title":"Introduction to Simulation and SLAM II","author":"Pritsker","year":"1984"},{"key":"10.1016\/0166-5316(91)90049-9_BIB25","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1002\/j.1538-7305.1988.tb00256.x","article-title":"An analytical model for UNIX (TM) systems","author":"Ramamurthy","year":"1988","journal-title":"AT&T Techn. J."},{"issue":"2","key":"10.1016\/0166-5316(91)90049-9_BIB26","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/322186.322195","article-title":"Mean value analysis of closed multichain queueing networks","volume":"27","author":"Reiser","year":"1980","journal-title":"J. ACM"},{"key":"10.1016\/0166-5316(91)90049-9_BIB27","series-title":"Proc. IFIP Congress 77","first-page":"565","article-title":"Priority scheduling disciplines in queueing network models of computer systems","author":"Sevcik","year":"1977"},{"key":"10.1016\/0166-5316(91)90049-9_BIB28","series-title":"Performance of Computer Systems","first-page":"319","article-title":"The distribution of queueing network states at input and output instants","author":"Sevcik","year":"1979"},{"key":"10.1016\/0166-5316(91)90049-9_BIB29","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1145\/1031382.809321","article-title":"A new \u2018building block\u2019 for performance evaluation of queueing networks with finite buffers","author":"Suri","year":"1984","journal-title":"ACM SIGMETRICS (Performance Evaluation Review)"},{"issue":"9","key":"10.1016\/0166-5316(91)90049-9_BIB30","doi-asserted-by":"crossref","first-page":"2779","DOI":"10.1002\/j.1538-7305.1983.tb03204.x","article-title":"The queueing network analyser","volume":"62","author":"Whitt","year":"1983","journal-title":"Bell System Techn. 7"}],"container-title":["Performance Evaluation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0166531691900499?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0166531691900499?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T08:57:40Z","timestamp":1551085060000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0166531691900499"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,11]]},"references-count":30,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1991,11]]}},"alternative-id":["0166531691900499"],"URL":"https:\/\/doi.org\/10.1016\/0166-5316(91)90049-9","relation":{},"ISSN":["0166-5316"],"issn-type":[{"value":"0166-5316","type":"print"}],"subject":[],"published":{"date-parts":[[1991,11]]}}}