F. Baskett, K. Chandy, R. Muntz, and F. Palacios, "Open, closed, and mixed networks of queues with different classes of customers," J. ACM, vol. 22, no. 2, April 1975.
 A. Harbitter and D. A. Menascé, "A methodology for analyzing the performance of authentication protocols," ACM Trans. Information Systems Security, vol. 5, no. 4, November 2002, pp. 458-491.
 A. M. Law and W. D. Kelton, Simulation Modeling and Techniques, 3rd ed., McGraw-Hill, New York, 2000.
 M. H. MacDougall, Simulating Computer Systems: Techniques and Tools, MIT Press, Cambridge, Mass., 1987.
 S. M. Ross, A Course in Simulation, Macmillan, New York, 1990.
 D. A. Menascé, "Two-level iterative queuing modeling of software contention," Proc. Tenth IEEE/ACM International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS 2002), Fort Worth, Texas, October 12-16, 2002, pp. 267 276.
 D. A. Menascé and V. A. F. Almeida, Scaling for E-business: technologies, Models, Performance, and Capacity Planning, Prentice Hall, Upper Saddle River, New Jersey 2000.
 J. Rolia and K. C. Sevcik, "The method of layers," IEEE Tr. Software Engineering, vol. 21, no. 8, 1995, pp. 689 700.
 A. Thomasian, "Performance analysis of concurrency control methods," in Performance Evaluation: Origins and Directions, G. Haring, C. Lindemann, and M. Reiser (eds.), Springer, Berlin, 2000, pp. 329 354.