{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:45:21Z","timestamp":1725536721168},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642043826"},{"type":"electronic","value":"9783642043833"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04383-3_10","type":"book-chapter","created":{"date-parts":[[2009,8,28]],"date-time":"2009-08-28T14:14:35Z","timestamp":1251468875000},"page":"126-137","source":"Crossref","is-referenced-by-count":0,"title":["A Diffusion Approximation Analysis of Multilevel Ad Hoc and Sensor Networks"],"prefix":"10.1007","author":[{"given":"Jerzy","family":"Martyna","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1016\/S1389-1286(01)00302-4","volume":"38","author":"I.F. Akyildiz","year":"2002","unstructured":"Akyildiz, I.F., Su, W., Sankasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. Computer Networks\u00a038, 393\u2013422 (2002)","journal-title":"Computer Networks"},{"key":"10_CR2","volume-title":"An Introduction to Probability Theory and Its Applications","author":"W. Feller","year":"1966","unstructured":"Feller, W.: An Introduction to Probability Theory and Its Applications, vol.\u00a0II. John Wiley and Sons, Chichester (1966)"},{"issue":"6","key":"10_CR3","doi-asserted-by":"publisher","first-page":"856","DOI":"10.1109\/JSAC.1986.1146393","volume":"4","author":"H. Heffes","year":"1986","unstructured":"Heffes, H., Lucatoni, D.M.: A Markov Modulated Characterization of Packetized Voice and Data Traffic and Related Statistical Multiplexer Performance. IEEE J. on Select. Areas in Comm.\u00a04(6), 856\u2013868 (1986)","journal-title":"IEEE J. on Select. Areas in Comm."},{"key":"10_CR4","volume-title":"Ad-Hoc Networks: Fundamental Properties and Network Topologies","author":"R. Hekmat","year":"2006","unstructured":"Hekmat, R.: Ad-Hoc Networks: Fundamental Properties and Network Topologies. Springer, Heidelberg (2006)"},{"key":"10_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/0470095121","volume-title":"Protocols and Architectures for Wireless Sensor Networks","author":"H. Karl","year":"2005","unstructured":"Karl, H., Willig, A.: Protocols and Architectures for Wireless Sensor Networks. John Wiley and Sons, Chichester (2005)"},{"issue":"2","key":"10_CR6","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1145\/321812.321827","volume":"21","author":"H. Kobayashi","year":"1974","unstructured":"Kobayashi, H.: Application of the Diffusion Approximation to Queueing Networks I: Equilibrium Queue Distributions. J. of the ACM\u00a021(2), 316\u2013328 (1974)","journal-title":"J. of the ACM"},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1145\/321832.321844","volume":"21","author":"H. Kobayashi","year":"1974","unstructured":"Kobayashi, H.: Application of the Diffusion Approximation to Queueing Networks II: Nonequilibrium Distributions and Applications to Computer Modeling. J. of the ACM\u00a021(3), 459\u2013469 (1974)","journal-title":"J. of the ACM"},{"issue":"1","key":"10_CR8","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1109\/TCOM.1977.1093707","volume":"25","author":"H. Kobayashi","year":"1977","unstructured":"Kobayashi, H., Onozato, Y., Huynh, D.: An Approximation Method for Design and Analysis of an ALOHA System. IEEE Trans. on Commun.\u00a025(1), 148\u2013157 (1977)","journal-title":"IEEE Trans. on Commun."},{"key":"10_CR9","unstructured":"Kobayashi, H.: Steady State Approximation Analysis for ATM Multiplexer by Diffusion Process Without Reflection Barrier. In: Proc. the Symp. on Performance Models for Information Communications Networks, pp. 309\u2013320 (1994)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/0166-5316(94)00049-P","volume":"23","author":"K. Kobayashi","year":"1995","unstructured":"Kobayashi, K., Takahashi, Y.: Steady-State Analysis of ATM Multiplexer with Variable Input Rate Through Diffusion Approximation. Performance Evaluation\u00a023, 163\u2013184 (1995)","journal-title":"Performance Evaluation"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Kochhal, M., Schwiebert, L., Gupta, S.: Role-Based Hierarchical Self-Organization for Wireless Ad Hoc Sensor Networks. In: Proc. of the 2nd ACM Int. Workshop on Wireless Sensor Networks and Applications (WSNA), San Diego, CA, pp. 98\u2013107 (2003)","DOI":"10.1145\/941350.941364"},{"issue":"10","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1016\/j.comcom.2004.07.024","volume":"28","author":"S. Ray","year":"2005","unstructured":"Ray, S., Starobinski, D., Carruthers, J.B.: Performance of Wireless Networks Networks with Hidden Nodes: A Queueing-theoretic Analysis. Computer Communications\u00a028(10), 1179\u20131192 (2005)","journal-title":"Computer Communications"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"828","DOI":"10.1137\/0151041","volume":"51","author":"A. Simonian","year":"1991","unstructured":"Simonian, A.: Stationary Analysis of a Fluid Queue with Input Rate Varying as an Ornstein-Uhlenbeck Process. SIAM, J. Appl. Math.\u00a051(3), 828\u2013842 (1991)","journal-title":"SIAM, J. Appl. Math."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Tickoo, O., Sikdar, B.: A Queueing Model for Finite Load IEEE 802.11 Random Access MAC. In: Proc. of IEEE ICC, Paris, pp. 175\u2013179 (2004)","DOI":"10.1109\/ICC.2004.1312475"},{"key":"10_CR15","unstructured":"Zeng, G., Zhu, H., Chlamtac, I.: A Novel Queueing Model for 802.11 Wireless LANs. In: Proc. of WNCG Wireless Networking Symposium (2003)"}],"container-title":["Lecture Notes in Computer Science","Ad-Hoc, Mobile and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04383-3_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T11:05:32Z","timestamp":1547895932000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04383-3_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642043826","9783642043833"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04383-3_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}