{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T10:03:43Z","timestamp":1648721023790},"reference-count":17,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1981,9,1]],"date-time":"1981-09-01T00:00:00Z","timestamp":368150400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks (1976)"],"published-print":{"date-parts":[[1981,9]]},"DOI":"10.1016\/0376-5075(81)90057-x","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T19:11:16Z","timestamp":1060283476000},"page":"341-349","source":"Crossref","is-referenced-by-count":4,"title":["File assignment in a computer network"],"prefix":"10.1016","volume":"5","author":[{"given":"Derrell V","family":"Foster","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lawrence W","family":"Dowdy","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"suffix":"IV","given":"James E","family":"Ames","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/0376-5075(81)90057-X_BIB1","article-title":"Dynamic file allocation in a distributed data base system","author":"Ames","year":"1978"},{"key":"10.1016\/0376-5075(81)90057-X_BIB2","article-title":"ASQ manual: user's guide to ASQ version 7.3","author":"Asplund","year":"1976"},{"issue":"2","key":"10.1016\/0376-5075(81)90057-X_BIB3","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/321752.321762","article-title":"Optimization of static loading and sizing of multilevel memory systems","volume":"20","author":"Arora","year":"1973","journal-title":"JACM"},{"issue":"9","key":"10.1016\/0376-5075(81)90057-X_BIB4","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1145\/362342.362345","article-title":"Computational alogorithms for closed queuing networks with exponential servers","volume":"16","author":"Buzen","year":"1973","journal-title":"Comm. of ACM"},{"key":"10.1016\/0376-5075(81)90057-X_BIB5","unstructured":"R.G. Casey, Allocation of copies of a file in an information network. Proc. AFIPS 1972 SJCC, Vol. 40, 617\u2013625."},{"key":"10.1016\/0376-5075(81)90057-X_BIB6","doi-asserted-by":"crossref","unstructured":"P.P.S. Chen, Optimal file allocation in multi-level storage systems. Proc. AFIPS 1973 NCC. Vol. 42, 277\u2013282.","DOI":"10.1145\/1499586.1499662"},{"key":"10.1016\/0376-5075(81)90057-X_BIB7","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1109\/T-C.1969.222542","article-title":"Optimal file allocation in multiple computer system","volume":"10","author":"Chu","year":"1969","journal-title":"IEEE Trans. Computers C-18"},{"key":"10.1016\/0376-5075(81)90057-X_BIB8","article-title":"Optimal branching probabilities and their relationship to computer network file distribution","author":"Dowdy","year":"1978"},{"key":"10.1016\/0376-5075(81)90057-X_BIB9","article-title":"File assignment in memory hierarchies","author":"Foster","year":"1974"},{"key":"10.1016\/0376-5075(81)90057-X_BIB10","series-title":"Proc. Modellingand Performance Evaluation of Computer Systems","first-page":"119","article-title":"File assignment in memory hierarchies","author":"Foster","year":"1976"},{"key":"10.1016\/0376-5075(81)90057-X_BIB11","article-title":"Optimization and analysis of queueing networks","author":"Hogarth","year":"1975"},{"key":"10.1016\/0376-5075(81)90057-X_BIB12","series-title":"Queuing systems - volume 2: Computer applications","author":"Kleinrock","year":"1976"},{"key":"10.1016\/0376-5075(81)90057-X_BIB13","series-title":"Introduction to linear and nonlinear programming","author":"Luenberger","year":"1973"},{"issue":"1","key":"10.1016\/0376-5075(81)90057-X_BIB14","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/320434.320449","article-title":"Optimal allocation of resources in distributed information networks","volume":"1","author":"Mahmoud","year":"1976","journal-title":"ACM Trans. on Database Systems"},{"issue":"6","key":"10.1016\/0376-5075(81)90057-X_BIB15","doi-asserted-by":"crossref","first-page":"567","DOI":"10.1147\/rd.166.0567","article-title":"Computational model of a closed queuing network with exponential servers","volume":"16","author":"Moore","year":"1972","journal-title":"IBM J. Res. Develop."},{"issue":"3","key":"10.1016\/0376-5075(81)90057-X_BIB16","doi-asserted-by":"crossref","first-page":"426","DOI":"10.1145\/321592.321596","article-title":"Optimization of memory hierarchies in multiprogrammed systems","volume":"17","author":"Ramamoorthy","year":"1970","journal-title":"JACM"},{"key":"10.1016\/0376-5075(81)90057-X_BIB17","series-title":"Principles of operations research","author":"Wagner","year":"1975"}],"container-title":["Computer Networks (1976)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:037650758190057X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:037650758190057X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T03:54:20Z","timestamp":1552622060000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/037650758190057X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1981,9]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1981,9]]}},"alternative-id":["037650758190057X"],"URL":"https:\/\/doi.org\/10.1016\/0376-5075(81)90057-x","relation":{},"ISSN":["0376-5075"],"issn-type":[{"value":"0376-5075","type":"print"}],"subject":[],"published":{"date-parts":[[1981,9]]}}}