{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,26]],"date-time":"2025-07-26T09:35:21Z","timestamp":1753522521117,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031757778"},{"type":"electronic","value":"9783031757785"}],"license":[{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,18]],"date-time":"2024-11-18T00:00:00Z","timestamp":1731888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-75778-5_16","type":"book-chapter","created":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T12:09:09Z","timestamp":1731845349000},"page":"338-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Avoiding Spurious Timeouts"],"prefix":"10.1007","author":[{"given":"Lenore D.","family":"Zuck","sequence":"first","affiliation":[]},{"given":"Zhongkai","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,18]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Alves, D.S., Obraczka, K.: An empirical characterization of internet round-trip times. In: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks, pp.\u00a023\u201330 (2017)","DOI":"10.1145\/3132114.3132123"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Arun, V., Arashloo, M.T., Saeed, A., Alizadeh, M., Balakrishnan, H.: Toward formally verifying congestion control behavior. In: ACM SIGCOMM 2021 Conference, Virtual Event, USA, 23\u201327 August 2021, pp.\u00a01\u201316. ACM (2021)","DOI":"10.1145\/3452296.3472912"},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1016\/j.adhoc.2018.06.015","volume":"80","author":"S Bolettieri","year":"2018","unstructured":"Bolettieri, S., Tanganelli, G., Vallati, C., Mingozzi, E.: pCoCoA: a precise congestion control algorithm for CoAP. Ad Hoc Netw. 80, 116\u2013129 (2018)","journal-title":"Ad Hoc Netw."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chen, X., Kim, H., Aman, J.M., Chang, W., Lee, M., Rexford, J.: Measuring TCP round-trip time in the data plane. In: Proceedings of the Workshop on Secure Programmable Network Infrastructure, pp.\u00a035\u201341 (2020)","DOI":"10.1145\/3405669.3405823"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Elrahim, A.G.A., Elsayed, H.A., Ramly, S.E., Ibrahim, M.M.: Improving TCP congestion control for wireless sensor networks. In: 2011 4th Annual Caneus Fly by Wireless Workshop, pp.\u00a01\u20136 (2011)","DOI":"10.1109\/FBW.2011.5965554"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Elteto, T., Molnar, S.: On the distribution of round-trip delays in TCP\/IP networks. In: Proceedings 24th Conference on Local Computer Networks. LCN 1999, pp.\u00a0172\u2013181. IEEE (1999)","DOI":"10.1109\/LCN.1999.802014"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Flinta, C., Yan, W., Johnsson, A.: Predicting round-trip time distributions in IoT systems using histogram estimators. In: NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium, pp.\u00a01\u20139 (2020)","DOI":"10.1109\/NOMS47738.2020.9110315"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Gurtov, A., Henderson, T., Floyd, S., Nishida, Y.: The NewReno Modification to TCP\u2019s Fast Recovery Algorithm. RFC 6582 (2012)","DOI":"10.17487\/rfc6582"},{"issue":"5","key":"16_CR9","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1145\/1400097.1400105","volume":"42","author":"S Ha","year":"2008","unstructured":"Ha, S., Rhee, I., Xu, L.: Cubic: a new TCP-friendly high-speed TCP variant. ACM SIGOPS Oper. Syst. Rev. 42(5), 64\u201374 (2008)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Hoe, J.C.: Improving the start-up behavior of a congestion control scheme for TCP. In: Conference Proceedings on Applications, Technologies, Architectures, and Protocols for Computer Communications, 28\u201330 August 1996, pp.\u00a0270\u2013280. ACM, New York (1996)","DOI":"10.1145\/248156.248180"},{"key":"16_CR11","unstructured":"https:\/\/github.com\/idmidr\/ns-allinone 2.35 (2018)"},{"issue":"4","key":"16_CR12","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1145\/52325.52356","volume":"18","author":"V Jacobson","year":"1988","unstructured":"Jacobson, V.: Congestion avoidance and control. ACM SIGCOMM Comput. Commun. Rev. 18(4), 314\u2013329 (1988)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Jero, S., Hoque, M.E., Choffnes, D.R., Mislove, A., Nita-Rotaru, C.: Automated attack discovery in TCP congestion control using a model-guided approach. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 18\u201321 February 2018. The Internet Society (2018)","DOI":"10.14722\/ndss.2018.23115"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Karn, P., Partridge, C.: Improving round-trip time estimates in reliable transport protocols. SIGCOMM Comput. Commun. Rev. 17(5), 2\u20137 (1987)","DOI":"10.1145\/55483.55484"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Sengupta, S., Kim, H., Rexford, J.: Continuous in-network round-trip time monitoring. In: Proceedings of the ACM SIGCOMM 2022 Conference, pp.\u00a0473\u2013485 (2022)","DOI":"10.1145\/3544216.3544222"},{"key":"16_CR16","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-031-37765-5_4","volume-title":"11th International Conference, NETYS 2023, Benguerir, Morocco, May 22\u201324, 2023","author":"M von Hippel","year":"2023","unstructured":"von Hippel, M., McMillan, K.L., Nita-Rotaru, C., Zuck, L.D.: A formal analysis of Karn\u2019s algorithm. In: Systems, N. (ed.) NETYS 2023. LNCS, vol. 14067, pp. 43\u201361. Springer, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-37765-5_4"}],"container-title":["Lecture Notes in Computer Science","Principles of Verification: Cycling the Probabilistic Landscape"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-75778-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,17]],"date-time":"2024-11-17T13:03:16Z","timestamp":1731848596000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-75778-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,18]]},"ISBN":["9783031757778","9783031757785"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-75778-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,11,18]]},"assertion":[{"value":"18 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}