{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:53:55Z","timestamp":1725490435687},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540729891"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-72990-7_98","type":"book-chapter","created":{"date-parts":[[2007,9,1]],"date-time":"2007-09-01T20:23:08Z","timestamp":1188678188000},"page":"1149-1160","source":"Crossref","is-referenced-by-count":15,"title":["Is ALOHA Causing Power Law Delays?"],"prefix":"10.1007","author":[{"given":"Predrag R.","family":"Jelenkovi\u0107","sequence":"first","affiliation":[]},{"given":"Jian","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"98_CR1","doi-asserted-by":"crossref","unstructured":"Abramson, N.: The Aloha system - another alternative for computer communications. Proc. of the Fall Joint Computer Conference, 281\u2013285 (1970)","DOI":"10.21236\/AD0707853"},{"key":"98_CR2","doi-asserted-by":"publisher","first-page":"1932","DOI":"10.1109\/TCOM.1980.1094614","volume":"28","author":"S. Bellini","year":"1980","unstructured":"Bellini, S., Borgonovo, F.: On the throughput of an ALOHA channel with variable length packets. IEEE Transactions on Communications\u00a028, 1932\u20131935 (1980)","journal-title":"IEEE Transactions on Communications"},{"key":"98_CR3","volume-title":"Data Networks","author":"D.P. Bertsekas","year":"1992","unstructured":"Bertsekas, D.P., Gallager, R.: Data Networks, 2nd edn. Prentice-Hall, Englewood Cliffs (1992)","edition":"2"},{"key":"98_CR4","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TCOM.1977.1093885","volume":"25","author":"F. M. J.","year":"1977","unstructured":"M. J., F.: An approximate analysis of delay for fixed and variable length packets in an unslotted ALOHA channel. IEEE Transactions on Communications\u00a025, 644\u2013654 (1977)","journal-title":"IEEE Transactions on Communications"},{"issue":"2","key":"98_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1101892.1101898","volume":"33","author":"P.M. Fiorini","year":"2005","unstructured":"Fiorini, P.M., Sheahan, R., Lipsky, L.: On unreliable computing systems when heavy-tails appear as a result of the recovery procedure. ACM SIGMETRICS Performance Evaluation Review\u00a033(2), 15\u201317 (2005)","journal-title":"ACM SIGMETRICS Performance Evaluation Review"},{"key":"98_CR6","volume-title":"Proceedings of IEEE INFOCOM\u201907","author":"P.R. Jelenkovi\u0107","year":"2007","unstructured":"Jelenkovi\u0107, P.R., Tan, J.: Can retransmissions of superexponential documents cause subexponential delays? In: Proceedings of IEEE INFOCOM\u201907, Anchorage, Alaska, USA, May 2007, IEEE Computer Society Press, Los Alamitos (2007), http:\/\/www.comet.columbia.edu\/~predrag\/pub_list.html"},{"key":"98_CR7","doi-asserted-by":"crossref","unstructured":"Naware, V., Mergen, G., Tong, L.: Stability and delay of finite user slotted ALOHA with multipacket reception. 51(7), 2636\u20132656 (2005)","DOI":"10.1109\/TIT.2005.850060"},{"key":"98_CR8","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-3402-9","volume-title":"Multiple access protocols: performance and analysis","author":"R. Rom","year":"1990","unstructured":"Rom, R., Sidi, M.: Multiple access protocols: performance and analysis. Springer, New York (1990)"},{"key":"98_CR9","volume-title":"Telecommunication networks: protocols, modeling and analysis","author":"M. Schwartz","year":"1986","unstructured":"Schwartz, M.: Telecommunication networks: protocols, modeling and analysis. Addison-Wesley Longman Publishing, Boston (1986)"},{"key":"98_CR10","doi-asserted-by":"crossref","unstructured":"Sheahan, R., Lipsky, L., Fiorini, P.M., Asmussen, S.: On the completion time distribution for tasks that must restart from the beginning if a failure occurs. In: MAMA 2006 Workshop, Saint-Malo, France, June 2006 (2006)","DOI":"10.1145\/1215956.1215967"}],"container-title":["Lecture Notes in Computer Science","Managing Traffic Performance in Converged Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72990-7_98.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:53:42Z","timestamp":1619517222000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72990-7_98"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540729891"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72990-7_98","relation":{},"subject":[]}}