{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T05:16:32Z","timestamp":1738300592520,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689805"},{"type":"electronic","value":"9783540689829"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68982-9_21","type":"book-chapter","created":{"date-parts":[[2008,6,2]],"date-time":"2008-06-02T07:20:54Z","timestamp":1212391254000},"page":"295-309","source":"Crossref","is-referenced-by-count":6,"title":["Contention-Based Polling Efficiency in Broadband Wireless Networks"],"prefix":"10.1007","author":[{"given":"Sergey D.","family":"Andreev","sequence":"first","affiliation":[]},{"given":"Andrey M.","family":"Turlikov","sequence":"additional","affiliation":[]},{"given":"Alexey V.","family":"Vinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"IEEE Std 802.16e-2005, Piscataway, NJ, USA (December 2005)","DOI":"10.1258\/095646205774988190"},{"issue":"5","key":"21_CR2","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TIT.1979.1056095","volume":"25","author":"I. Rubin","year":"1979","unstructured":"Rubin, I.: Access-control disciplines for multi-access communication channels: Reservation and tdma schemes. IEEE Transactions on Information Theory\u00a025(5), 516\u2013536 (1979)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"21_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIT.1987.1057295","volume":"33","author":"D. Aldous","year":"1987","unstructured":"Aldous, D.: Ultimate instability of exponential back-off protocol for acknowledgment based transmission control of random access communication channels. IEEE Transactions on Information Theory\u00a033(2), 219\u2013233 (1987)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1145\/44483.44488","volume":"35","author":"J. Goodman","year":"1988","unstructured":"Goodman, J., Greenberg, A., Madras, N., March, P.: Stability of binary exponential backoff. Journal of the ACM\u00a035(3), 579\u2013602 (1988)","journal-title":"Journal of the ACM"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1109\/TCOM.1987.1096696","volume":"35","author":"M. Paterakis","year":"1987","unstructured":"Paterakis, M., Georgiadis, L., Papantoni-Kazakos, P.: On the relation between the finite and the infinite population models for a class of raa\u2019s. IEEE Transactions on Communications\u00a035, 1239\u20131240 (1987)","journal-title":"IEEE Transactions on Communications"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Chlebus, B.: Randomized Communication in Radio Networks. In: Pardalos, P., Rajasekaran, S., Reif, J., Rolim, J.(eds.), Handbook of Randomized Computing, vol.\u00a01, pp. 401\u2013456 (2001)","DOI":"10.1007\/978-1-4615-0013-1_11"},{"issue":"2","key":"21_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/TIT.1985.1057023","volume":"31","author":"B. Tsybakov","year":"1985","unstructured":"Tsybakov, B.: Survey of ussr contributions to random multiple-access communications. IEEE Transactions on Information Theory\u00a031(2), 143\u2013165 (1985)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"21_CR8","first-page":"259","volume":"14","author":"B. Tsybakov","year":"1978","unstructured":"Tsybakov, B., Mikhailov, V.: Free synchronous packet access in a broadcast channel with feedback. Problems of Information Transmission\u00a014(4), 259\u2013280 (1978)","journal-title":"Problems of Information Transmission"},{"key":"21_CR9","volume-title":"Data Networks","author":"D. Bertsekas","year":"1992","unstructured":"Bertsekas, D., Gallager, R.: Data Networks. Prentice-Hall, Englewood Cliffs (1992)"},{"key":"21_CR10","doi-asserted-by":"crossref","first-page":"289","DOI":"10.6028\/jres.108.027","volume":"108","author":"N. Song","year":"2003","unstructured":"Song, N., Kwak, B., Miller, L.: On the stability of exponential backoff. Journal Research of NIST\u00a0108, 289\u2013297 (2003)","journal-title":"Journal Research of NIST"},{"issue":"3","key":"21_CR11","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G. Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance analysis of the ieee 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications\u00a018(3), 535\u2013547 (2000)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"21_CR12","doi-asserted-by":"crossref","unstructured":"Lin, L., Jia, W., Lu, W.: Performance analysis of ieee 802.16 multicast and broadcast polling based bandwidth request. In: IEEE Wireless Communications and Networking Conference, vol.\u00a01, pp. 1854\u20131859 (2007)","DOI":"10.1109\/WCNC.2007.348"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Alanen, O.: Multicast polling and efficient voip connections in ieee 802.16 networks. In: 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems, vol.\u00a01, pp. 289\u2013295 (2007)","DOI":"10.1145\/1298126.1298177"},{"issue":"3","key":"21_CR14","first-page":"224","volume":"23","author":"B. Tsybakov","year":"1987","unstructured":"Tsybakov, B., Likhanov, N.: Upper bound on the capacity of a random multiple-access system. Problems of Information Transmission\u00a023(3), 224\u2013236 (1987)","journal-title":"Problems of Information Transmission"},{"key":"21_CR15","unstructured":"Turlikov, A., Vinel, A.: Capacity estimation of centralized reservation-based random multiple-access system. In: Symposium on Problems of Redundancy in Information and Control Systems, vol.\u00a01, pp. 154\u2013160 (2007)"},{"issue":"4","key":"21_CR16","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1109\/18.923737","volume":"47","author":"B. Tsybakov","year":"2001","unstructured":"Tsybakov, B.: One stochastic process and its application to multiple access in supercritical region. IEEE Transactions on Information Theory\u00a047(4), 1561\u20131569 (2001)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"4","key":"21_CR17","first-page":"305","volume":"16","author":"B. Tsybakov","year":"1980","unstructured":"Tsybakov, B., Mikhailov, V.: Random multiple packet access: Part-and-try algorithm. Problems of Information Transmission\u00a016(4), 305\u2013317 (1980)","journal-title":"Problems of Information Transmission"},{"issue":"1","key":"21_CR18","first-page":"35","volume":"16","author":"B. Tsybakov","year":"1980","unstructured":"Tsybakov, B., Berkovskii, M.: Multiple access with reservation. Problems of Information Transmission\u00a016(1), 35\u201354 (1980)","journal-title":"Problems of Information Transmission"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Vinel, A., Zhang, Y., Ni, Q., Lyakhov, A.: Efficient request mechanisms usage in ieee 802.16. In: IEEE Global Telecommunications Conference, vol.\u00a01, pp. 1\u20135 (2006)","DOI":"10.1109\/GLOCOM.2006.742"},{"issue":"1","key":"21_CR20","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1109\/TCOM.1977.1093713","volume":"25","author":"N. Abramson","year":"1977","unstructured":"Abramson, N.: The throughput of packet broadcasting channels. IEEE Transactions on Communications\u00a025(1), 117\u2013128 (1977)","journal-title":"IEEE Transactions on Communications"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Vinel, A., Zhang, Y., Lott, M., Tiurlikov, A.: Performance analysis of the random access in ieee 802.16. In: IEEE 16th International Symposium on Personal, Indoor and Mobile Radio Communications, vol.\u00a03, pp. 1596\u20131600 (2005)","DOI":"10.1109\/PIMRC.2005.1651713"}],"container-title":["Lecture Notes in Computer Science","Analytical and Stochastic Modeling Techniques and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68982-9_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,30]],"date-time":"2025-01-30T14:38:51Z","timestamp":1738247931000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68982-9_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689805","9783540689829"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68982-9_21","relation":{},"subject":[]}}