{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T04:03:05Z","timestamp":1747713785982,"version":"3.40.5"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2000,4,1]],"date-time":"2000-04-01T00:00:00Z","timestamp":954547200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2000,4,1]],"date-time":"2000-04-01T00:00:00Z","timestamp":954547200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Heuristics"],"published-print":{"date-parts":[[2000,4]]},"DOI":"10.1023\/a:1009622011925","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T22:47:08Z","timestamp":1040597228000},"page":"149-166","source":"Crossref","is-referenced-by-count":4,"title":["LP-Based Heuristic Algorithms for Interconnecting Token Rings via Source Routing Bridges"],"prefix":"10.1007","volume":"6","author":[{"given":"V.","family":"Sridhar","sequence":"first","affiliation":[]},{"given":"June S.","family":"Park","sequence":"additional","affiliation":[]},{"given":"Bezalel","family":"Gavish","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"255502_CR1","unstructured":"ASTRAL (Alliance for Strategic Token Ring Advancement and Leadership). (1996). \u2018An Educational Guide to Token Ring.\u2019 (http:\/\/www.astral.org\/astralwp.html)."},{"key":"255502_CR2","volume-title":"Proc. 2nd Int'l Conf. Telecom. Syst.","author":"N. Boisson","year":"1994","unstructured":"Boisson, N., O. Strilka, and A. Sutter. (1994). \u2018A Simulated Annealing Algorithm for LANs Interconnection Networks Design.\u2019 In Proc. 2nd Int'l Conf. Telecom. Syst., Vanderbilt Univ., Nashville, TN."},{"key":"255502_CR3","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1007\/3-540-15191-5_20","volume-title":"Lecture Notes in Computer Science 184: Local Area Networks: An Advanced Course","author":"W. Bux","year":"1985","unstructured":"Bux, W. (1985). \u2018Performance Issues.\u2019 In G. Goos and J. Hartmanis (eds.), Lecture Notes in Computer Science 184: Local Area Networks: An Advanced Course. Berlin, Germany: Springer-Verlag, pp. 108\u2013161."},{"key":"255502_CR4","doi-asserted-by":"crossref","first-page":"1058","DOI":"10.1109\/TCOM.1985.1096217","volume":"33","author":"W. Bux","year":"1985","unstructured":"Bux, W. and D. Grillo. (1985). \u2018Flow Control in Local Area Networks of Interconnected Token Rings,\u2019 IEEE Trans. Commun. 33, 1058\u20131065.","journal-title":"IEEE Trans. Commun."},{"key":"255502_CR5","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1016\/0305-0548(94)00076-K","volume":"22","author":"L.W. Clarke","year":"1995","unstructured":"Clarke, L.W. and G. Anandalingam. (1995). \u2018A Bootstrap Heuristic for Designing Minimum Cost Survivable Networks,\u2019 Computers and Operations Research 22, 921\u2013934.","journal-title":"Computers and Operations Research"},{"key":"255502_CR6","doi-asserted-by":"crossref","first-page":"1172","DOI":"10.1109\/49.245906","volume":"11","author":"C. Ersoy","year":"1993","unstructured":"Ersoy, C. and S.S. Panwar. (1993). \u2018Topological Design of Interconnected LAN\/MAN Networks,\u2019 IEEE J. Select. Areas Commun. 11, 1172\u20131182.","journal-title":"IEEE J. Select. Areas Commun."},{"key":"255502_CR7","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1287\/ijoc.3.4.275","volume":"3","author":"P.C. Fetterolf","year":"1991","unstructured":"Fetterolf, P.C. and G. Anandalingam. (1991). \u2018Optimizing Interconnection of Local Area Networks: An Approach Using Simulated Annealing,\u2019 ORSA J. Computing 3, 275\u2013287.","journal-title":"ORSA J. Computing"},{"key":"255502_CR8","doi-asserted-by":"crossref","first-page":"678","DOI":"10.1287\/opre.40.4.678","volume":"40","author":"P.C. Fetterolf","year":"1992","unstructured":"Fetterolf, P.C. and G. Anandalingam. (1992a). \u2018A Lagrangian Relaxation Technique for Optimizing Interconnection of Local Area Networks,\u2019 Operations Res. 40, 678\u2013688.","journal-title":"Operations Res."},{"key":"255502_CR9","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1007\/BF02094334","volume":"36","author":"P.C. Fetterolf","year":"1992","unstructured":"Fetterolf, P.C. and G. Anandalingam. (1992b). \u2018Optimal Design of LAN-WAN Internetworks: An Approach Using Simulated Annealing,\u2019 Annals Operations Res. 36, 275\u2013298.","journal-title":"Annals Operations Res."},{"key":"255502_CR10","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1002\/net.3230030202","volume":"3","author":"L. Fratta","year":"1973","unstructured":"Fratta, L., M. Gerla, and L. Kleinrock. (1973). \u2018The Flow Deviation Method: Approach to Store-and Forward Computer Communication Network Design,\u2019 Networks 3, 97\u2013133.","journal-title":"Networks"},{"key":"255502_CR11","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/65.3241","volume":"2","author":"M. Gerla","year":"1988","unstructured":"Gerla, M. and L. Kleinrock. (1988). \u2018Congestion Control in Interconnected LANs,\u2019 IEEE Network 2, 72\u201376.","journal-title":"IEEE Network"},{"key":"255502_CR12","volume-title":"Graphs and Algorithms","author":"M. Gondran","year":"1988","unstructured":"Gondran, M. and M. Minoux. (1988). Graphs and Algorithms. New York: Wiley."},{"key":"255502_CR13","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/BF01158794","volume":"9","author":"S. Gupta","year":"1991","unstructured":"Gupta, S. and K.W. Ross. (1991). \u2018Performance Modeling and Optimization of Networks of Bridged LANs,\u2019 Queueing Syst. 9, 113\u2013132.","journal-title":"Queueing Syst."},{"key":"255502_CR14","unstructured":"IBM. (1991). Optimization Subroutine Library: Guide and Reference. Release 2, Kingston, NY."},{"key":"255502_CR15","unstructured":"IEEE. (1998). IEEE 802.5 Documents. (http:\/\/p8025.york.microvitec.co.uk\/802.5\/documents\/)."},{"key":"255502_CR16","unstructured":"Information Handling Services. (1993). Vendor Master Directory and Vendor Catalogs on CD-ROM. Englewood, CO."},{"key":"255502_CR17","volume-title":"Algorithms for Designing Survivable LAN-Interconnection Networks Using Transparent Bridges","author":"F. Kaefer","year":"1995","unstructured":"Kaefer, F. (1995). \u2018Algorithms for Designing Survivable LAN-Interconnection Networks Using Transparent Bridges.\u2019 Ph.D. Thesis, Univ. of Iowa, Iowa City, IA."},{"key":"255502_CR18","volume-title":"Proc. 3rd Int'l Conf. Telecom. Syst.","author":"F. Kaefer","year":"1995","unstructured":"Kaefer, F. and J.S. Park. (1995). \u2018A Method for Interconnecting LANs with Survivability Considerations.\u2019 In Proc. 3rd Int'l Conf. Telecom. Syst., Vanderbilt Univ., Nashville, TN."},{"key":"255502_CR19","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1287\/ijoc.10.1.25","volume":"10","author":"F. Kaefer","year":"1998","unstructured":"Kaefer, F. and J.S. Park. (1998). \u2018Interconnecting LANs and a FDDI Backbone Using Transparent Bridges: A Model and Solution Algorithms,\u2019 INFORMS J. Computing 10, 25\u201339.","journal-title":"INFORMS J. Computing"},{"key":"255502_CR20","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF02114284","volume":"6","author":"L. LeBlanc","year":"1996","unstructured":"LeBlanc, L., J.S. Park, V. Sridhar, and J. Kalvenes. (1996). \u2018Topology Design and Bridge-Capacity Assignment for Interconnecting Token Ring LANs: A Simulated Annealing Approach,\u2019 Telecom. Syst. 6, 21\u201343.","journal-title":"Telecom. Syst."},{"key":"255502_CR21","series-title":"Working Paper 94\u201320","volume-title":"Design of Survivable LAN-LAN Internetworks with a Hierarchical Topology","author":"F.C.Y. Lee","year":"1995","unstructured":"Lee, F.C.Y., G. Anandalingam, and L. Clarke. (1995). \u2018Design of Survivable LAN-LAN Internetworks with a Hierarchical Topology.\u2019 Working Paper 94\u201320, Dept. of Sys. Eng., Univ. of Pennsylvania, Philadelphia, PA."},{"key":"255502_CR22","volume-title":"Token Ring Migration: A White Paper","author":"R.D. Love","year":"1997","unstructured":"Love, R.D. and J.J. Lynch. (1997). \u2018Token Ring Migration: A White Paper.\u2019 IBM Networking Hardware Division, Research Triangle Park, NC. (http:\/\/www.hstra.com\/articles.html)."},{"key":"255502_CR23","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1287\/opre.43.1.142","volume":"43","author":"T.L. Magnanti","year":"1995","unstructured":"Magnanti, T.L., P. Mirchandani, and R. Vachani. (1995). \u2018Modeling and Solving the Two Facility Capacitated Network Loading Problem,\u2019 Operations Res. 43, 142\u2013157.","journal-title":"Operations Res."},{"key":"255502_CR24","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1287\/opre.37.4.531","volume":"37","author":"C.L. Monma","year":"1989","unstructured":"Monma, C.L. and D.F. Shallcross. (1989). \u2018Methods for Designing Communications Networks with Certain Two-Connected Survivability Constraints,\u2019 Operations Research. 37, 531\u2013541.","journal-title":"Operations Research."},{"key":"255502_CR25","first-page":"107","volume-title":"Local Area and Multiple Access Networks","author":"T. Nishida","year":"1986","unstructured":"Nishida, T., M. Murata, H. Miyahara, and K. Takashima. (1986). \u2018Congestion Control in Interconnected Local Area Networks.\u2019 In R.L. Pickholtz (ed.), Local Area and Multiple Access Networks. Rockville, MD: Computer Science Press, pp. 107\u2013136."},{"key":"255502_CR26","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1287\/opre.33.4.842","volume":"33","author":"M.W. Padberg","year":"1985","unstructured":"Padberg, M.W., T.J. Van Roy, and L.A. Wolsey. (1985). \u2018Valid Linear Inequalities for Fixed Charge Problems,\u2019 Operations Res. 33, 842\u2013861.","journal-title":"Operations Res."},{"key":"255502_CR27","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1287\/ijoc.7.2.149","volume":"7","author":"J.S. Park","year":"1995","unstructured":"Park, J.S., R. Bartoszynski, and W.A. Rosenkrantz. (1995). \u2018Stability of p-Persistent CSMA\/CD\u2019 ORSA J. Computing 7, 149\u2013159.","journal-title":"ORSA J. Computing"},{"key":"255502_CR28","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1007\/BF02136162","volume":"1","author":"J.S. Park","year":"1993","unstructured":"Park, J.S., and K. Kang. (1993). \u2018Delay Analysis of Multidimensional Queuing Process in CSMA\/CD Local Area Networks,\u2019 Telecom. Syst. 1, 217\u2013242.","journal-title":"Telecom. Syst."},{"key":"255502_CR29","unstructured":"Park, J.S., L. LeBlanc, and B.H. Lim. (1996). \u2018Interconnecting Remote LANs Using SMDS: A Model and solution algorithms.\u2019 In Proc. 4th In'l Conf. Telecom. Syst. Nashville, TN."},{"key":"255502_CR30","volume-title":"Interconnections: Bridges and Routers","author":"R. Perlman","year":"1992","unstructured":"Perlman, R. (1992) Interconnections: Bridges and Routers. Reading, MA: Addison-Wesley."},{"key":"255502_CR31","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/65.3236","volume":"2","author":"M. Soha","year":"1988","unstructured":"Soha, M. and R. Perlman. (1988). \u2018Comparison of Two LAN Bridge Approaches,\u2019 IEEE Network 2, 72\u201376.","journal-title":"IEEE Network"},{"key":"255502_CR32","volume-title":"Optimal Design of Interconnected Local Area Networks","author":"V. Sridhar","year":"1994","unstructured":"Sridhar, V. (1994). \u2018Optimal Design of Interconnected Local Area Networks.\u2019 Ph.D. Dissertation, Univ. of Iowa, Iowa City, IA."},{"key":"255502_CR33","unstructured":"Sridhar, V., B. Gavish, and J.S. Park. (1995). \u2018Reliable Interconnection of LANs Using Source Routing Bridges.\u2019 In Proc. 3rd ORSA Telecom. Conf., Boca Raton, FL."},{"key":"255502_CR34","volume-title":"High Speed Token Ring: A Technology White Paper","author":"M. Taylor","year":"1997","unstructured":"Taylor, M. (1997). \u2018High Speed Token Ring: A Technology White Paper.\u2019 Madge Networks, San Jose, CA, (http:\/\/www.hstra.com\/articles.html)."},{"key":"255502_CR35","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1137\/0208032","volume":"8","author":"L.G. Valiant","year":"1979","unstructured":"Valiant, L.G. (1979). \u2018The Complexity of Enumeration and Reliability Problems,\u2019 SIAM J. Computing 8, 410\u2013421.","journal-title":"SIAM J. Computing"},{"key":"255502_CR36","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/BF01589102","volume":"45","author":"L.A. Wolsey","year":"1989","unstructured":"Wolsey, L.A. (1989). \u2018Strong Formulation for Mixed Integer Programming: A Survey,\u2019 Math. Programming 45, 173\u2013191.","journal-title":"Math. Programming"},{"key":"255502_CR37","doi-asserted-by":"crossref","first-page":"712","DOI":"10.1287\/mnsc.17.11.712","volume":"17","author":"J.Y. Yen","year":"1971","unstructured":"Yen, J.Y. (1971). \u2018Finding the k Shortest Loopless Paths in a Network,\u2019 Management Sci. 17, 712\u2013716.","journal-title":"Management Sci."},{"key":"255502_CR38","unstructured":"Ziff-Davis Publishing. (1993). Data Sources-the Complete Computer Product Book: Hardware and Data Communications Volume. New York, NY."}],"container-title":["Journal of Heuristics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009622011925.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1009622011925\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1009622011925.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T10:54:48Z","timestamp":1747652088000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1009622011925"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,4]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2000,4]]}},"alternative-id":["255502"],"URL":"https:\/\/doi.org\/10.1023\/a:1009622011925","relation":{},"ISSN":["1381-1231","1572-9397"],"issn-type":[{"type":"print","value":"1381-1231"},{"type":"electronic","value":"1572-9397"}],"subject":[],"published":{"date-parts":[[2000,4]]}}}