Modelling and analysis of token-passing computer networks

Full text