{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:14:40Z","timestamp":1773656080410,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540854999","type":"print"},{"value":"9783540855002","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-85500-2_2","type":"book-chapter","created":{"date-parts":[[2008,8,24]],"date-time":"2008-08-24T02:40:18Z","timestamp":1219545618000},"page":"13-24","source":"Crossref","is-referenced-by-count":3,"title":["SICTA Modifications with Single Memory Location and Resistant to Cancellation Errors"],"prefix":"10.1007","author":[{"given":"Sergey","family":"Andreev","sequence":"first","affiliation":[]},{"given":"Eugeny","family":"Pustovalov","sequence":"additional","affiliation":[]},{"given":"Andrey","family":"Turlikov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","volume-title":"Data Networks","author":"D. Bertsekas","year":"1992","unstructured":"Bertsekas, D., Gallager, R.: Data Networks. Prentice-Hall, Englewood Cliffs (1992)"},{"key":"2_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-3402-9","volume-title":"Multiple Access Protocols: Performance and Analysis","author":"R. Rom","year":"1990","unstructured":"Rom, R., Sidi, M.: Multiple Access Protocols: Performance and Analysis. Springer, Heidelberg (1990)"},{"issue":"4","key":"2_CR3","first-page":"32","volume":"14","author":"B.S. Tsybakov","year":"1978","unstructured":"Tsybakov, B.S., Mikhailov, V.A.: Free synchronous packet access in a broadcast channel with feedback. Problems of Information Transmission\u00a014(4), 32\u201359 (1978)","journal-title":"Problems of Information Transmission"},{"issue":"4","key":"2_CR4","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1109\/TIT.1979.1056093","volume":"25","author":"J.I. Capetanakis","year":"1979","unstructured":"Capetanakis, J.I.: Tree algorithms for packet broadcast channels. IEEE Transactions on Information Theory\u00a025(4), 505\u2013515 (1979)","journal-title":"IEEE Transactions on Information Theory"},{"key":"2_CR5","unstructured":"Andrews, J., Hasan, A.: Analysis of cancellation error for successive interference cancellation with imperfect channel estimation. Technical report, EE-381K: Multiuser Wireless Communications (2002)"},{"key":"2_CR6","first-page":"1908","volume":"3","author":"Y. Yu","year":"2005","unstructured":"Yu, Y., Giannakis, G.B.: Giannakis. Sicta: A 0.693 contention tree algorithm using successive interference cancellation. Proceedings IEEE INFOCOM\u00a03, 1908\u20131916 (2005)","journal-title":"Proceedings IEEE INFOCOM"},{"issue":"9-12","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1041","DOI":"10.1016\/j.peva.2007.06.009","volume":"64","author":"G.T. Peeters","year":"2007","unstructured":"Peeters, G.T., Van Houdt, B., Blondia, C.: A multiaccess tree algorithm with free access, interference cancellation and single signal memory requirements. Performance Evaluation\u00a064(9-12), 1041\u20131052 (2007)","journal-title":"Performance Evaluation"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Van Houdt, B., Peeters, G.T.: Fcfs tree algorithms with interference cancellation and single signal memory requirements. In: International Workshop on Multiple Access Communications, vol.\u00a01 (to be published, 2008)","DOI":"10.1109\/ICTEL.2008.4652691"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, Y., Giannakis, G.B.: A robust high-throughput tree algorithm using successive interference cancellation. In: IEEE Global Telecommunications Conference, vol.\u00a06(28), pp. 5\u201310 (2005)","DOI":"10.1109\/GLOCOM.2005.1578442"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Wang, X., Yu, Y., Giannakis, G.B.: A deadlock-free high-throughput tree algorithm for random access over fading channels. In: 40th Annual Conference on Information Sciences and Systems, vol.\u00a022, pp. 420\u2013425 (2006)","DOI":"10.1109\/CISS.2006.286504"},{"issue":"4","key":"2_CR11","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1134\/S0032946007040072","volume":"43","author":"G.S. Evseev","year":"2007","unstructured":"Evseev, G.S., Turlikov, A.M.: A connection between characteristics of blocked stack algorithms for random multiple access system. Problems of Information Transmission\u00a043(4), 279\u2013345 (2007)","journal-title":"Problems of Information Transmission"},{"key":"2_CR12","first-page":"73","volume":"265","author":"J.L. Massey","year":"1981","unstructured":"Massey, J.L.: Collision resolution algorithm and random access communications. Multiuser Communication Systems, G. Longo, CISM Course and Lecture Notes\u00a0265, 73\u2013131 (1981)","journal-title":"Multiuser Communication Systems, G. Longo, CISM Course and Lecture Notes"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1109\/WCNC.2006.1683601","volume":"2","author":"X. Wang","year":"2006","unstructured":"Wang, X., Yu, Y., Giannakis, G.B.: Combining random backoff with a cross-layer tree algorithm for random access in IEEE 802.16. IEEE Wireless Communications and Networking Conference\u00a02, 972\u2013977 (2006)","journal-title":"IEEE Wireless Communications and Networking Conference"},{"key":"2_CR14","first-page":"214","volume":"10","author":"L. Gyorfi","year":"2007","unstructured":"Gyorfi, L., Gyori, S., Massey, J.L.: Principles of stability analysis for random accessing with feedback. NATO Security through Science Series: Information and Communication Security\u00a010, 214\u2013250 (2007)","journal-title":"NATO Security through Science Series: Information and Communication Security"}],"container-title":["Lecture Notes in Computer Science","Next Generation Teletraffic and Wired\/Wireless Advanced Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-85500-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T17:14:48Z","timestamp":1738343688000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-85500-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540854999","9783540855002"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-85500-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[]}}