{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:02:50Z","timestamp":1725512570858},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540688051"},{"type":"electronic","value":"9783540688075"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68807-5_2","type":"book-chapter","created":{"date-parts":[[2008,5,19]],"date-time":"2008-05-19T07:51:36Z","timestamp":1211183496000},"page":"13-26","source":"Crossref","is-referenced-by-count":4,"title":["Cross-Layer Modeling of TCP SACK Performance over Wireless Channels with Completely Reliable ARQ\/FEC"],"prefix":"10.1007","author":[{"given":"Dmitri","family":"Moltchanov","sequence":"first","affiliation":[]},{"given":"Roman","family":"Dunaytsev","sequence":"additional","affiliation":[]},{"given":"Yevgeni","family":"Koucheryavy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Gurtov, A.: Efficient Data Transport in Wireless Overlay Networks. Ph.D. Thesis, University of Helsinki, Finland (2004)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Mathis, M., Mahdavi, J., Floyd, S., Romanow, A.: TCP Selective Acknowledgement Options. RFC 2018 (1996)","DOI":"10.17487\/rfc2018"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Floyd, S., Mahdavi, J., Mathis, M., Podolsky, M.: An Extension to the Selective Acknowledgement (SACK) Option for TCP. RFC 2883 (2000)","DOI":"10.17487\/rfc2883"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Blanton, E., Allman, M., Fall, K., Wang, L.: A Conservative Selective Acknowledgement (SACK)-based Loss Recovery Algorithm for TCP. RFC 3517 (2003)","DOI":"10.17487\/rfc3517"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Paxson, V., Allman, M.: Computing TCP\u2019s Retransmission Timer. RFC 2988 (2000)","DOI":"10.17487\/rfc2988"},{"issue":"2","key":"2_CR6","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/25.580783","volume":"46","author":"M. Zorzi","year":"1997","unstructured":"Zorzi, M., Rao, R., Milstein, L.: ARQ Error Control for Fading Mobile Radio Channels. IEEE Transactions on Vehicular Technology\u00a046(2), 445\u2013455 (1997)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Zorzi, M., Rao, R.: Throughput Analysis of Go-Back-N ARQ in Markov Channels with Unreliable Feedback. IEEE ICC, 1232\u20131237 (1995)","DOI":"10.1109\/ICC.1995.524296"},{"issue":"2","key":"2_CR8","first-page":"384","volume":"19","author":"M. Krunz","year":"2001","unstructured":"Krunz, M., Kim, J.-G.: Fluid Analysis of Delay and Packet Discard Performance for QoS Support in Wireless Networks. IEEE JSAC\u00a019(2), 384\u2013395 (2001)","journal-title":"IEEE JSAC"},{"issue":"2","key":"2_CR9","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1109\/25.492849","volume":"45","author":"A. Fantacci","year":"1996","unstructured":"Fantacci, A.: Queuing Analysis of the Selective Repeat Automatic Repeat Request Protocol for Wireless Packet Networks. IEEE Transactions on Vehicular Technology\u00a045(2), 258\u2013264 (1996)","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"2_CR10","first-page":"117","volume":"1","author":"J. Swarts","year":"1999","unstructured":"Swarts, J., Ferreira, H.: On the Evaluation and Application of Markov Channel Models in Wireless Communications. IEEE VTC\u00a01, 117\u2013121 (1999)","journal-title":"IEEE VTC"},{"key":"2_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/11424505_23","volume-title":"Wired\/Wireless Internet Communications","author":"D. Moltchanov","year":"2005","unstructured":"Moltchanov, D., Koucheryavy, Y., Harju, J.: Simple, Accurate and Computationally Efficient Wireless Channel Modeling Algorithm. In: Braun, T., Carle, G., Koucheryavy, Y., Tsaoussidis, V. (eds.) WWIC 2005. LNCS, vol.\u00a03510, pp. 234\u2013245. Springer, Heidelberg (2005)"},{"issue":"3","key":"2_CR12","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/263932.264023","volume":"27","author":"M. Mathis","year":"1997","unstructured":"Mathis, M., Semke, J., Mahdavi, J., Ott, T.: The Macroscopic Behavior of the TCP Congestion Avoidance Algorithm. Computer Communication Review\u00a027(3), 67\u201382 (1997)","journal-title":"Computer Communication Review"},{"key":"2_CR13","unstructured":"Braden, R. (ed.): Requirements for Internet Hosts. RFC 1122 (1989)"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Fu, S., Atiquzzaman, M.: Modelling TCP Reno with Spurious Timeouts in Wireless Mobile Environments. ICCCN, 391\u2013396 (2003)","DOI":"10.1109\/ICCCN.2003.1284199"},{"key":"2_CR15","unstructured":"Guan, Y., et al.: Simulation Study of TCP Eifel Algorithms. OPNETWORK (2005)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Cardwell, N., Savage, S., Anderson, T.: Modeling TCP Latency. In: IEEE INFOCOM, pp. 1742\u20131751 (2000)","DOI":"10.1109\/INFCOM.2000.832574"}],"container-title":["Lecture Notes in Computer Science","Wired\/Wireless Internet Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68807-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:13:46Z","timestamp":1620015226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68807-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540688051","9783540688075"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68807-5_2","relation":{},"subject":[]}}