{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T06:10:19Z","timestamp":1698300619827},"reference-count":17,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T00:00:00Z","timestamp":1221177600000},"content-version":"vor","delay-in-days":5613,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[1993,5]]},"abstract":"Abstract<\/jats:title>A method for the approximate performance analysis of random multiple\u2010access protocols, such as, ALOHA, URN, random TDMA, is presented. This method is an extension of a previously proposed 2\u2010Markov chain method. It is applicable to systems consisting of a Finite number of identical users, each having a buffer capacity of L<\/jats:italic> packets, where L > 2.<\/jats:italic> [For L<\/jats:italic> = 2 the proposed method is exact]. The performance measures of the system under analysis are computed following the solution of a system of nonlinear equations, the size of which is independent of the buffer size L.<\/jats:italic> The numerical results derived are in very good agreement with simulation.<\/jats:p>","DOI":"10.1002\/ett.4460040316","type":"journal-article","created":{"date-parts":[[2008,9,12]],"date-time":"2008-09-12T13:31:49Z","timestamp":1221226309000},"page":"365-382","source":"Crossref","is-referenced-by-count":0,"title":["Approximate Analysis of Buffered Multiple\u2010Access Protocols"],"prefix":"10.1002","volume":"4","author":[{"given":"George D.","family":"Stamoulis","sequence":"first","affiliation":[]},{"given":"Efstathios O.","family":"Sykas","sequence":"additional","affiliation":[]},{"given":"Emmanuel N.","family":"Protonotarios","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2008,9,12]]},"reference":[{"key":"e_1_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.1016\/0140-3664(85)90126-4"},{"key":"e_1_2_1_3_2","volume-title":"Introduction to queueing theory","author":"Cooper R. B.","year":"1981"},{"key":"e_1_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1987.1096749"},{"key":"e_1_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1979.1094485"},{"key":"e_1_2_1_6_2","unstructured":"L.Kleinrock Y.Yemini:An optimal adaptive scheme for multiple access broadcast communication. Proc. Int. Conf. Commun. 1978 p.721\u2013725."},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1977.1093702"},{"key":"e_1_2_1_8_2","doi-asserted-by":"crossref","unstructured":"K. K.Mittal A. N.Venetsanopoulos:Buffer analysis in random multiple access broadcast communications systems. \u201cCan. Elec. Eng.J\u201d 1984.","DOI":"10.1109\/CEEJ.1985.6594705"},{"key":"e_1_2_1_9_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095083"},{"key":"e_1_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095072"},{"key":"e_1_2_1_11_2","doi-asserted-by":"publisher","DOI":"10.1049\/ip-f-1.1982.0004"},{"key":"e_1_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1981.1102713"},{"key":"e_1_2_1_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094783"},{"key":"e_1_2_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095740"},{"key":"e_1_2_1_15_2","unstructured":"G.Stamoulis:Study of buffered slotted multiple access protocols. \u201cDegree Thesis\u201d NTUA July1987(in Greek)."},{"key":"e_1_2_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1986.1096622"},{"key":"e_1_2_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/322344.322345"},{"key":"e_1_2_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1980.1094698"}],"container-title":["European Transactions on Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fett.4460040316","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.4460040316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T07:34:58Z","timestamp":1698219298000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.4460040316"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,5]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1993,5]]}},"alternative-id":["10.1002\/ett.4460040316"],"URL":"https:\/\/doi.org\/10.1002\/ett.4460040316","archive":["Portico"],"relation":{},"ISSN":["1124-318X","1541-8251"],"issn-type":[{"value":"1124-318X","type":"print"},{"value":"1541-8251","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,5]]}}}