{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T15:41:26Z","timestamp":1774798886125,"version":"3.50.1"},"reference-count":49,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[1985,3,1]],"date-time":"1985-03-01T00:00:00Z","timestamp":478483200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[1985,3,1]],"date-time":"1985-03-01T00:00:00Z","timestamp":478483200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[1985,3,1]],"date-time":"1985-03-01T00:00:00Z","timestamp":478483200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[1985,3]]},"DOI":"10.1109\/tit.1985.1057024","type":"journal-article","created":{"date-parts":[[2004,4,27]],"date-time":"2004-04-27T14:27:04Z","timestamp":1083076024000},"page":"166-175","source":"Crossref","is-referenced-by-count":8,"title":["On queueing problems in random-access communications"],"prefix":"10.1109","volume":"31","author":[{"given":"L.","family":"Kleinrock","sequence":"first","affiliation":[{"name":"University of California, Los Angeles, CA, USA"}]}],"member":"263","reference":[{"key":"ref34b","year":"1980","journal-title":"IEEE Comp Commun"},{"key":"ref39","author":"takagi","year":"1983","journal-title":"Analysis of Polling Systems"},{"key":"ref34a","author":"yemini","year":"1980","journal-title":"Broadcasting in an URN An optimal adaptive multiaccess scheme"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094751"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/800081.802669"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095764"},{"key":"ref31","first-page":"f1.6.1","article-title":"Performance modeling of buffered CSMA ?An iterative approach","author":"silvester","year":"1982","journal-title":"Proc IEEE Global Telecomm Conf GLOBECOM"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/322344.322345"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094462"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1983.1145982"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095083"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1983.1145994"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1985.1096402"},{"key":"ref29","doi-asserted-by":"crossref","DOI":"10.1145\/322344.322345","article-title":"Distributions of packet delay and interdeparture time in slotted ALOHA channels","volume":"29","author":"tobagi","year":"1982","journal-title":"JACM"},{"key":"ref2","first-page":"11","article-title":"Resource allocation in computer systems and computer communication networks","author":"kleinrock","year":"1974","journal-title":"Information Processing '74 Proc IFIP Cong"},{"key":"ref1","volume":"i","author":"kleinrock","year":"1975","journal-title":"Queueing Systems"},{"key":"ref20","author":"levy","year":"1984","journal-title":"Non-uniform sturctures and synchronization patterns in shared-channel communication networks"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093733"},{"key":"ref21","article-title":"Performance of distributed multi-access computer-communication systems","author":"kleinrock","year":"1977","journal-title":"Information Processing 77"},{"key":"ref24","author":"tobagi","year":"1979","journal-title":"Performance analysis of carrier sense multiple access with collision detection"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095881"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096168"},{"key":"ref25","author":"lam","year":"1979","journal-title":"A carrier sense multiple access protocol for local networks"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1478462.1478502"},{"key":"ref11","author":"ferguson","year":"1975","journal-title":"The study of unslotted ALOHA with arbitrary message lengths"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094529"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093706"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093885"},{"key":"ref14","volume":"ii","author":"kleinrock","year":"1976","journal-title":"Queueing Systems"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092917"},{"key":"ref16","author":"ferguson","year":"1974","journal-title":"On the control stability and waiting time in a slotted ALOHA random access system"},{"key":"ref17","author":"fayolle","year":"1982","journal-title":"On a functional equation arising in the analysis of a protocol for a multi-access broadcast channel"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1499586.1499752"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092768"},{"key":"ref4","article-title":"Research directions in distributed computing and communications","author":"yemini","year":"1984","journal-title":"Proc IEEE Joint Conf Information Theory"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095740"},{"key":"ref6","author":"kurose","year":"1984","journal-title":"Real-time communications in computer networks"},{"key":"ref5","author":"shubik","year":"1983","journal-title":"Game Theory in the Social Sciences"},{"key":"ref8","author":"gross","year":"1974","journal-title":"Fundamentals of Queueing Theory"},{"key":"ref7","article-title":"On a new class of queueing models for distributed environments","author":"kleinrock","year":"1979","journal-title":"Proc Ninth Int Teletraffic Congress"},{"key":"ref9","author":"shannon","year":"1949","journal-title":"The Mathematical Theory of Communication"},{"key":"ref46","article-title":"Optimum transmission radii tor packet radio networks, or Why six is a magic number","author":"silvester","year":"1978","journal-title":"Proc NTC"},{"key":"ref45","first-page":"381","article-title":"Throughput analysis of multihop packet radio networks under various channel access schemes","author":"tobagi","year":"1983","journal-title":"Proc IEEE INFOCOM 83"},{"key":"ref48","author":"takagi","year":"1983","journal-title":"Analysis of throughput and delay for single- and multi-hop packet radio networks"},{"key":"ref47","author":"nelson","year":"1982","journal-title":"Channel access protocols for multi-hop broadcast packet radio networks"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1983.1145998"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1983.1676317"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1987.1096769"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1975.1092767"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/22747\/01057024.pdf?arnumber=1057024","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,21]],"date-time":"2025-07-21T18:07:44Z","timestamp":1753121264000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/1057024\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,3]]},"references-count":49,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tit.1985.1057024","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[1985,3]]}}}