{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:19:54Z","timestamp":1729635594702,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1109\/icumt.2009.5345457","type":"proceedings-article","created":{"date-parts":[[2009,12,10]],"date-time":"2009-12-10T10:43:49Z","timestamp":1260441829000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Traffic performance for a time-out scheme communication system"],"prefix":"10.1109","author":[{"given":"Kentaro","family":"Hoshi","sequence":"first","affiliation":[]},{"given":"Sumito","family":"Iijima","sequence":"additional","affiliation":[]},{"given":"Yoshitaka","family":"Takahashi","sequence":"additional","affiliation":[]},{"given":"Naohisa","family":"Komatsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"681","article-title":"Diffusion approximation s for the GI\/G\/c\/K queue","author":"takahashi","year":"2007","journal-title":"Proc 16th ICCCN"},{"journal-title":"Heavy Traffic Limit Theory","year":"1971","author":"whitt","key":"22"},{"journal-title":"Red Hat Linux Internet Server","year":"2003","author":"sery","key":"17"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6377(82)90033-5"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1287\/moor.4.2.162"},{"journal-title":"Application 0\/ Queuing Theory","year":"1971","author":"newell","key":"15"},{"key":"16","first-page":"174","article-title":"Queueing with balking and reneging in M\/G\/1 systems","volume":"12","author":"rao","year":"1968","journal-title":"Metrika"},{"key":"13","first-page":"129","article-title":"Traffic analysis for a token ring system with exhaustive or gated service -renewal batch inputs model-","volume":"j71 b","author":"kimura","year":"1988","journal-title":"IEICE Trans"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/1106026"},{"key":"11","first-page":"59","article-title":"A stochastic approach for deriving the parameters arising out of a diffusion model","volume":"108","author":"hoshi","year":"2008","journal-title":"Tech Rept"},{"key":"12","first-page":"25","article-title":"Internet traffic modeling : Towards queueing theory for the internet design","author":"kasahara","year":"2002","journal-title":"Tech Rept"},{"key":"21","first-page":"264","article-title":"Queue in communication network","volume":"43","author":"takine","year":"1998","journal-title":"Commun Operations Res Jpn"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1287\/opre.5.5.644"},{"key":"20","first-page":"317","article-title":"Diffusion approximation for the single server system with batch arrivals of multi-class calls","volume":"j 69 a","author":"takahashi","year":"1986","journal-title":"IEICE Trans"},{"journal-title":"Probability Statistics and Queuing Theory With Computer Science Applications","year":"1990","author":"allen","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3362-9"},{"year":"0","key":"10"},{"journal-title":"Analysis and synthesis of computer systems","year":"1980","author":"gelenbe","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1093\/biomet\/47.1-2.45","article-title":"Deterministic customer impatience in the queueing system GI\/MlI","volume":"47","author":"finch","year":"1960","journal-title":"Biometrika"},{"journal-title":"Renewal Theory","year":"1962","author":"cox","key":"5"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1287\/opre.5.5.644"},{"journal-title":"Introduction to Statistical Mathematics","year":"1984","author":"honma","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1975.tb02055.x"}],"event":{"name":"Workshops (ICUMT)","start":{"date-parts":[[2009,10,12]]},"location":"St. Petersburg, Russia","end":{"date-parts":[[2009,10,14]]}},"container-title":["2009 International Conference on Ultra Modern Telecommunications &amp; Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5340227\/5345316\/05345457.pdf?arnumber=5345457","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T22:40:30Z","timestamp":1497825630000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5345457\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icumt.2009.5345457","relation":{},"subject":[],"published":{"date-parts":[[2009,10]]}}}