{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:11:37Z","timestamp":1730193097240,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/.2006.1629390","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"55-62","source":"Crossref","is-referenced-by-count":2,"title":["The Impacts of Timing Constraints on Virtual Channels Multiplexing in Interconnect Networks*"],"prefix":"10.1109","author":[{"given":"A.","family":"Khonsari","sequence":"first","affiliation":[]},{"given":"M.","family":"Ould-Khaoua","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nayebi","sequence":"additional","affiliation":[]},{"given":"H.","family":"Sarbazi-azad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Performance Analysis of Wormhole Routing in Interconnection Networks","year":"2001","author":"sarbazi-azad","key":"17"},{"journal-title":"Stochastic Modelling and Analysis A Computational Approach","year":"1986","author":"tijms","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019196416987"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/12.817384"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1287\/opre.9.3.383"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.2003.1219038"},{"journal-title":"Performance Modelling and Analysis of Deadlock Recovery Routing Algorithms in Multicomputer Interconnection Networks","year":"2003","author":"khonsari","key":"11"},{"journal-title":"Queueing Systems Theory","year":"1975","author":"kleinrock","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1287\/opre.11.1.88"},{"key":"2","first-page":"84","article-title":"Queueing with impatient customers who leave at random","volume":"13","author":"ancker","year":"1962","journal-title":"The Journal of Industrial Engineering"},{"journal-title":"Abramovitz-Stegun Handbook of Mathematical Functions","year":"1965","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC.2004.1332629"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1987.1676939"},{"journal-title":"Design and Analysis of Routing Schemes and Routers for Wormhole-routed Mesh Architectures","year":"1995","author":"boura","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/2.976921"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1287\/opre.5.5.644"},{"journal-title":"Interconnection Networks An Engineering Approach","year":"2003","author":"duato","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/71.127260"}],"event":{"name":"2006 IEEE International Performance Computing and Communications Conference","location":"Phoenix, AX, USA"},"container-title":["2006 IEEE International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10845\/34183\/01629390.pdf?arnumber=1629390","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T16:29:42Z","timestamp":1489595382000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1629390\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/.2006.1629390","relation":{},"subject":[]}}