{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T22:17:43Z","timestamp":1649110663764},"reference-count":18,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[1992,6,1]],"date-time":"1992-06-01T00:00:00Z","timestamp":707356800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1992,6]]},"DOI":"10.1016\/0950-5849(92)90014-g","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T21:31:39Z","timestamp":1060291899000},"page":"389-395","source":"Crossref","is-referenced-by-count":0,"title":["Hierarchical framework for modelling transaction flow in multiple-access DBMS topology"],"prefix":"10.1016","volume":"34","author":[{"given":"GC","family":"Pentzaropoulos","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0950-5849(92)90014-G_BIB1","series-title":"Principles of database systems","author":"Ullman","year":"1982"},{"issue":"No 4","key":"10.1016\/0950-5849(92)90014-G_BIB2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1035332.1035295","article-title":"Optimal control of thrashing","volume":"Vol 11","author":"Blake","year":"1983","journal-title":"ACM Perform. Eval. Rev."},{"key":"10.1016\/0950-5849(92)90014-G_BIB3","article-title":"Performance comparisons within a computer network of Prime systems","volume":"Vol 1","author":"Barney","year":"1983"},{"key":"10.1016\/0950-5849(92)90014-G_BIB4","series-title":"Decomposability: queueing and computer systems applications","author":"Courtois","year":"1977"},{"key":"10.1016\/0950-5849(92)90014-G_BIB5","series-title":"Proc. Conf. CMG","first-page":"252","article-title":"An iterative solution to the queueing network model of a DBMS with dynamic locking","author":"Thomasian","year":"1982"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90014-G_BIB6","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/1031382.809322","article-title":"A simple analysis of exclusive and shared lock contention in a database system","volume":"Vol 12","author":"Lavenberg","year":"1984","journal-title":"ACM Perform. Eval. Rev."},{"issue":"No 2","key":"10.1016\/0950-5849(92)90014-G_BIB7","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/319566.319567","article-title":"On optimistic methods for concurrency control","volume":"Vol 6","author":"Kung","year":"1981","journal-title":"ACM Trans. Database Syst."},{"issue":"No 11","key":"10.1016\/0950-5849(92)90014-G_BIB8","doi-asserted-by":"crossref","first-page":"624","DOI":"10.1145\/360363.360369","article-title":"The notions of consistency and predicate locks in a database system","volume":"Vol 19","author":"Eswaran","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/0950-5849(92)90014-G_BIB9","series-title":"An introduction to database systems","author":"Date","year":"1983"},{"key":"10.1016\/0950-5849(92)90014-G_BIB10","article-title":"A statistical methodology as an aid in computer performance evaluation and management","author":"Pentzaropoulos","year":"1982"},{"key":"10.1016\/0950-5849(92)90014-G_BIB11","series-title":"Computer systems performance evaluation","author":"Ferrari","year":"1978"},{"key":"10.1016\/0950-5849(92)90014-G_BIB12","series-title":"Fundamentals of queueing theory","author":"Gross","year":"1974"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90014-G_BIB13","doi-asserted-by":"crossref","first-page":"383","DOI":"10.1287\/opre.9.3.383","article-title":"A proof of the queueing formula L = \u03bbW","volume":"Vol 9","author":"Little","year":"1961","journal-title":"Oper. Res."},{"issue":"No 1","key":"10.1016\/0950-5849(92)90014-G_BIB14","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1287\/mnsc.10.1.131","article-title":"Jobshop-like queueing systems","volume":"Vol 10","author":"Jackson","year":"1963","journal-title":"Manage. Sci."},{"issue":"No 2","key":"10.1016\/0950-5849(92)90014-G_BIB15","doi-asserted-by":"crossref","first-page":"248","DOI":"10.1145\/321879.321887","article-title":"Open, closed and mixed networks of queues with different classes of customers","volume":"Vol 22","author":"Baskett","year":"1975","journal-title":"J. ACM"},{"key":"10.1016\/0950-5849(92)90014-G_BIB16_1","volume":"Vol 1","author":"Kleinrock","year":"1975"},{"key":"10.1016\/0950-5849(92)90014-G_BIB16_2","article-title":"Queueing systems","volume":"Vol II","author":"Kleinrock","year":"1976"},{"issue":"No 3","key":"10.1016\/0950-5849(92)90014-G_BIB17","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1016\/0140-3664(91)90067-B","article-title":"Steady-state and asymptotic performance of SATNET under variable packet flow conditions","volume":"Vol 14","author":"Pentzaropoulos","year":"1991","journal-title":"Computer Commun."}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:095058499290014G?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:095058499290014G?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T00:26:49Z","timestamp":1552609609000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/095058499290014G"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,6]]},"references-count":18,"journal-issue":{"issue":"6","published-print":{"date-parts":[[1992,6]]}},"alternative-id":["095058499290014G"],"URL":"https:\/\/doi.org\/10.1016\/0950-5849(92)90014-g","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1992,6]]}}}