{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:15:17Z","timestamp":1737436517426,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748328"},{"type":"electronic","value":"9783540748335"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74833-5_33","type":"book-chapter","created":{"date-parts":[[2007,8,22]],"date-time":"2007-08-22T06:39:58Z","timestamp":1187764798000},"page":"393-408","source":"Crossref","is-referenced-by-count":1,"title":["On the Optimality and the Stability of Backoff Protocols"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Lukyanenko","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"33_CR1","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/TIT.1987.1057295","volume":"33","author":"D.J. Aldous","year":"1987","unstructured":"Aldous, D.J.: Ultimate Instability of Exponential Back-Off Protocol for Acknowledgement-Based Transmission Control of Random Access Communication Channel. IEEE Trans. on Information Theory, IT\u00a033(2), 219\u2013223 (1987)","journal-title":"IEEE Trans. on Information Theory, IT"},{"key":"33_CR2","first-page":"281","volume":"37","author":"N. Abramson","year":"1970","unstructured":"Abramson, N.: The ALOHA system-another alternative for computer communications. AFIPS\u00a037, 281\u2013285 (1970)","journal-title":"AFIPS"},{"issue":"2","key":"33_CR3","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/TIT.1985.1057021","volume":"31","author":"N. Abramson","year":"1985","unstructured":"Abramson, N.: Development of the ALOHANE. IEEE Trans. on Inform. Theory\u00a031(2), 119\u2013123 (1985)","journal-title":"IEEE Trans. on Inform. Theory"},{"issue":"2","key":"33_CR4","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1109\/TNET.2005.845533","volume":"13","author":"B. Kwak","year":"2005","unstructured":"Kwak, B., Song, N., Miller, L.E.: Performance analysis of exponential backoff. IEEE\/ACM Trans. Netw.\u00a013(2), 343\u2013355 (2005)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"33_CR5","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G. Bianchi","year":"2000","unstructured":"Bianchi, G.: Performance Analysis of the IEEE 802.11 Distributed Coordination Function. IEEE J. on Sel. Areas in Commun.\u00a018(3), 535\u2013547 (2000)","journal-title":"IEEE J. on Sel. Areas in Commun."},{"issue":"4","key":"33_CR6","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1137\/S0097539792233828","volume":"25","author":"J. H\u00e5stad","year":"1996","unstructured":"H\u00e5stad, J., Leighton, T., Rogoff, B.: Analysis of backoff protocols for multiple access channel. SIAM J. Comput.\u00a025(4), 740\u2013774 (1996)","journal-title":"SIAM J. Comput."},{"unstructured":"Metcalfe, R., Boggs, D.: Ethernet: Distributed Packet Switching for Local Computer Networks","key":"33_CR7"},{"key":"33_CR8","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1111\/j.2517-6161.1985.tb01367.x","volume":"B 47","author":"F.P. Kelly","year":"1985","unstructured":"Kelly, F.P.: Stochastic models of computer communication systems. J. Roy. Statist. Soc.\u00a0B 47, 379\u2013395 (1985)","journal-title":"J. Roy. Statist. Soc."},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"1557","DOI":"10.1214\/aop\/1176991993","volume":"15","author":"F.P. Kelly","year":"1987","unstructured":"Kelly, F.P., MacPhee, I.M.: The number of packets transmitted by collision detect random access scheme. Annals of Prob.\u00a015, 1557\u20131568 (1987)","journal-title":"Annals of Prob."},{"issue":"3","key":"33_CR10","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1145\/44483.44488","volume":"35","author":"J. Goodman","year":"1988","unstructured":"Goodman, J., Greenberg, A.G., Madras, N., March, P.: Stability of binary exponential backoff. J. of the ACM\u00a035(3), 579\u2013602 (1988)","journal-title":"J. of the ACM"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"441","DOI":"10.2307\/1427308","volume":"18","author":"G. Fayolle","year":"1986","unstructured":"Fayolle, G., Flajolet, P., Hofri, M.: On a functional equation arising in the analysis of a protocol for a multi-access broadcast channel. Adv. Appl. Prob.\u00a018, 441\u2013472 (1986)","journal-title":"Adv. Appl. Prob."},{"unstructured":"Rosenkrantz, W.A.: Some theorems on the instability of the exponential back-off protocol. Performance 1984, 199\u2013205 (1985)","key":"33_CR12"},{"key":"33_CR13","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1006\/jcss.1998.1590","volume":"58","author":"L.A. Goldberg","year":"1999","unstructured":"Goldberg, L.A., MacKenzie, P.: Analysis of Practical Backoff Protocols for Contention Resolution with Multiple Servers. J. of Comp. and System Sciences\u00a058, 232\u2013258 (1999)","journal-title":"J. of Comp. and System Sciences"},{"issue":"6","key":"33_CR14","doi-asserted-by":"publisher","first-page":"1048","DOI":"10.1145\/355541.355567","volume":"47","author":"L.A. Goldberg","year":"2000","unstructured":"Goldberg, L.A., MacKenzie, P., Paterson, M., Srinivasan, A.: Contention Resolution with Constant Expected Delay. Journal of the ACM (JACM)\u00a047(6), 1048\u20131096 (2000)","journal-title":"Journal of the ACM (JACM)"},{"key":"33_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-3267-7","volume-title":"Markov Chains and Stochastic Stability","author":"S.P. Meyn","year":"1993","unstructured":"Meyn, S.P., Tweedie, R.L.: Markov Chains and Stochastic Stability. Springer, London (1993)"}],"container-title":["Lecture Notes in Computer Science","Next Generation Teletraffic and Wired\/Wireless Advanced Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74833-5_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T14:26:55Z","timestamp":1737383215000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74833-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748328","9783540748335"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74833-5_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}