{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T00:23:46Z","timestamp":1755217426672,"version":"3.43.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[1999,3,1]],"date-time":"1999-03-01T00:00:00Z","timestamp":920246400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1999,3,1]],"date-time":"1999-03-01T00:00:00Z","timestamp":920246400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Queueing Systems"],"published-print":{"date-parts":[[1999,3]]},"DOI":"10.1023\/a:1019102112869","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T18:30:27Z","timestamp":1045679427000},"page":"125-135","source":"Crossref","is-referenced-by-count":3,"title":["Simple bounds for closed queueing networks"],"prefix":"10.1007","volume":"31","author":[{"given":"Arie","family":"Harel","sequence":"first","affiliation":[]},{"given":"Su","family":"Namn","sequence":"additional","affiliation":[]},{"given":"Jacob","family":"Sturm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"329543_CR1","doi-asserted-by":"crossref","first-page":"527","DOI":"10.1145\/362342.362345","volume":"16","author":"J.P. Buzen","year":"1973","unstructured":"J.P. Buzen, Computational algorithms for closed queueing networks with exponential servers, Comm. ACM. 16 (1973) 527\u2013531.","journal-title":"Comm. ACM."},{"key":"329543_CR2","first-page":"1","volume":"50","author":"G.L. Choudhury","year":"1995","unstructured":"G.L. Choudhury, K.K. Leung and W. Whitt, Calculating normalization constants of closed queueing networks by numerically inverting their generating functions, J. ACM 50 (1995) 1\u201330.","journal-title":"J. ACM"},{"key":"329543_CR3","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0167-6377(87)90034-4","volume":"6","author":"A. Dallery","year":"1987","unstructured":"A. Dallery, An improved balanced job bound analysis of closed queueing networks, Oper. Res. Lett. 6 (1987) 77\u201382.","journal-title":"Oper. Res. Lett."},{"key":"329543_CR4","doi-asserted-by":"crossref","first-page":"863","DOI":"10.1287\/opre.38.5.863","volume":"38","author":"J.J. Gordon","year":"1990","unstructured":"J.J. Gordon, The evaluation of normalizing constants in closed queueing networks, Oper. Res. 38 (1990) 863\u2013869.","journal-title":"Oper. Res."},{"key":"329543_CR5","unstructured":"A. Harel, S. Namn and J. Sturm, Zeros of successive derivatives and closed queueing networks, Working Paper (1996)."},{"key":"329543_CR6","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1287\/opre.33.2.464","volume":"33","author":"P.G. Harrison","year":"1985","unstructured":"P.G. Harrison, On normalizing constants in queueing networks, Oper. Res. 33 (1985) 464\u2013468.","journal-title":"Oper. Res."},{"key":"329543_CR7","unstructured":"D.L. Eager, Bounding algorithms for queueing network models of computer systems, Ph.D. thesis, Department of Computer Science, University of Toronto, Canada (1984)."},{"key":"329543_CR8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1057\/jors.1958.3","volume":"9","author":"E. Koenigsberg","year":"1958","unstructured":"E. Koenigsberg, Cyclic queues, Oper. Res. Quart. 9 (1958) 22\u201335.","journal-title":"Oper. Res. Quart."},{"key":"329543_CR9","volume-title":"Symmetric Functions and Hall Polynomials","author":"I.G. Macdonald","year":"1979","unstructured":"I.G. Macdonald, Symmetric Functions and Hall Polynomials (Oxford Univ. Press, Oxford, 1979)."},{"key":"329543_CR10","volume-title":"Inequalities: Theory of Majorization and Its Applications","author":"A.W. Marshall","year":"1979","unstructured":"A.W. Marshall and I. Olkin, Inequalities: Theory of Majorization and Its Applications (Academic Press, New York, 1979)."},{"key":"329543_CR11","volume-title":"Inequalities","author":"G.H. Hardy","year":"1952","unstructured":"G.H. Hardy, J.E. Littlewood and G. P\u00f3lya, Inequalities (Cambridge Univ. Press, Cambridge, 1952)."},{"key":"329543_CR12","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1145\/322186.322195","volume":"27","author":"M. Reiser","year":"1980","unstructured":"M. Reiser and S.S. Lavenberg, Mean value analysis of closed multi-chain queueing networks, J. ACM 27 (1980) 314\u2013322.","journal-title":"J. ACM"},{"key":"329543_CR13","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1145\/195613.195630","volume":"41","author":"K. Ross","year":"1994","unstructured":"K. Ross, D.H.K Tsang and J. Wang, Monte Carlo summation and integration applied to multiclass queueing networks, J. ACM 41 (1994) 1110\u20131135.","journal-title":"J. ACM"},{"key":"329543_CR14","volume-title":"Computer Systems Performance Modeling","author":"C.H. Sauer","year":"1981","unstructured":"C.H. Sauer and K.M. Chandy, Computer Systems Performance Modeling (Prentice-Hall, Englewood Cliffs, NJ, 1981)."},{"key":"329543_CR15","doi-asserted-by":"crossref","first-page":"1911","DOI":"10.1002\/j.1538-7305.1984.tb00084.x","volume":"63","author":"W. Whitt","year":"1984","unstructured":"W. Whitt, Open and closed models of queues, AT & T Bell Lab. Tech. J. 63 (1984) 1911\u20131979.","journal-title":"AT & T Bell Lab. Tech. J."},{"key":"329543_CR16","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1145\/358396.358447","volume":"25","author":"J. Zahorjan","year":"1982","unstructured":"J. Zahorjan, K.C. Sevcik, D.L. Eager and B. Galler, Balanced job bound analysis of queueing networks, Comm. ACM 25 (1982) 134\u2013141.","journal-title":"Comm. ACM"}],"container-title":["Queueing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019102112869.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1019102112869\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1019102112869.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,5]],"date-time":"2025-08-05T12:55:39Z","timestamp":1754398539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1019102112869"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,3]]},"references-count":16,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[1999,3]]}},"alternative-id":["329543"],"URL":"https:\/\/doi.org\/10.1023\/a:1019102112869","relation":{},"ISSN":["0257-0130","1572-9443"],"issn-type":[{"type":"print","value":"0257-0130"},{"type":"electronic","value":"1572-9443"}],"subject":[],"published":{"date-parts":[[1999,3]]}}}