{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:44:42Z","timestamp":1730195082135,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aiccsa.2005.1387067","type":"proceedings-article","created":{"date-parts":[[2005,4,1]],"date-time":"2005-04-01T15:16:50Z","timestamp":1112368610000},"page":"375-382","source":"Crossref","is-referenced-by-count":1,"title":["On multicast scheduling and routing in multistage Clos networks"],"prefix":"10.1109","author":[{"family":"Bin Tang","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/40.988685"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/12.83662"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/49.594847"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/12.467692"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/90.541321"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/26.701325"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230020303"},{"key":"16","first-page":"8","volume":"8","author":"paxson","year":"1994","journal-title":"Growth Trends in Wide-area Tcp Connections"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/49.12886"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/DIGCOM.1988.4709"},{"journal-title":"Starlite A Wideband Digital Switch","year":"1984","author":"huang","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1986.1096441"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2001.936946"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/49.594845"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/26.2794"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/90.374114"},{"journal-title":"Scheduling Algorithms for Input-queued Switches Randomized Techniques and Experimental Evaluation","year":"2000","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2002.1039254"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/78952.78953"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1953.tb01433.x"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/26.285153"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1992.268157"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/279345.279352"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/179606.179627"}],"event":{"name":"The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005.","location":"Cairo, Egypt"},"container-title":["The 3rd ACS\/IEEE International Conference onComputer Systems and Applications, 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9525\/30191\/01387067.pdf?arnumber=1387067","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T00:04:33Z","timestamp":1489536273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1387067\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2005.1387067","relation":{},"subject":[]}}