{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T05:40:11Z","timestamp":1739425211998,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642106248"},{"type":"electronic","value":"9783642106255"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10625-5_3","type":"book-chapter","created":{"date-parts":[[2009,11,10]],"date-time":"2009-11-10T11:23:01Z","timestamp":1257852181000},"page":"34-51","source":"Crossref","is-referenced-by-count":0,"title":["Risk-Aware QoP\/QoS Optimization for Multimedia Applications in Wireless Networks"],"prefix":"10.1007","author":[{"given":"Yanping","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Chuang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yixin","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Xiaowen","family":"Chu","sequence":"additional","affiliation":[]},{"given":"Shengling","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Barry, M.G., Campbell, A.T., Veres, A.: Distributed Control Algorithm for Service Differentiation in Wireless Packet Network. In: Proc. IEEE INFOCOM (2001)","DOI":"10.1109\/INFCOM.2001.916786"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Hanley, G., Murphy, S., Murphy, L.: Adapting WLAN MAC Parameters to Enhance VoIP Call Capacity. In: Proc. of the 8th ACM MSWiM 2005, October 2005, pp. 250\u2013254 (2005)","DOI":"10.1145\/1089444.1089488"},{"key":"3_CR3","unstructured":"Yu, J., Choi, S., Lee, J.: Enhancement of VoIP over IEEE 802.11 WLAN via Dual Queue Strategy. In: Proc. IEEE ICC (2004)"},{"key":"3_CR4","unstructured":"Ong, C.S., Nahrstedt, K., Yuan, W.: Quality of Protection for Mobile Multimedia Applications. In: Proc. IEEE ICME, vol.\u00a02, pp. 137\u2013140 (2003)"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Liang, W., Wang, W.: An Analytical Study on the Impact of Authentication Local Area Networks. In: Proc. IEEE 13th Intel. Conf. and Networks (ICCCN 2004), pp. 361\u2013366 (2004)","DOI":"10.1109\/ICCCN.2004.1401670"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Liang, W., Wang, W.: A Quantitative Study of Authentication Networks. In: Proc. IEEE INFOCOM, vol.\u00a02, pp. 1478\u20131489 (2005)","DOI":"10.1109\/INFCOM.2005.1498383"},{"issue":"2","key":"3_CR7","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.comnet.2004.10.016","volume":"48","author":"W. Liang","year":"2005","unstructured":"Liang, W., Wang, W.: On Performance Analysis of Challenge\/Response Based Authentication in Wireless Networks. Computer Networks\u00a048(2), 267\u2013288 (2005)","journal-title":"Computer Networks"},{"issue":"6","key":"3_CR8","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1002\/wcm.335","volume":"5","author":"W. Wang","year":"2005","unstructured":"Wang, W., Liang, W., Agarwal, A.K.: Integration of Authentication and Mobility Management in Third Generation and WLAN Data Networks. Wireless Comm. and Mobile Computing (WCMC)\u00a05(6), 665\u2013678 (2005)","journal-title":"Wireless Comm. and Mobile Computing (WCMC)"},{"key":"3_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11036-006-0009-6","volume":"12","author":"A.K. Agarwal","year":"2007","unstructured":"Agarwal, A.K., Wang, W.: On the Impact of Quality of Protection in Wireless Local Area Networks with IP Mobility. Mobile Networks and Applications\u00a012, 93\u2013101 (2007)","journal-title":"Mobile Networks and Applications"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Schneck, P.A., Schwan, K.: Dynamic Authentication for High performance Networked Application. In: Proc. of the sixth International Workshop on QoS, pp. 127\u2013136 (1998)","DOI":"10.1109\/IWQOS.1998.675229"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"He, W., Nahrstedt, K.: An Integrated Solution to Delay and Security Support in wireless network. In: Proc. IEEE WCNC, Las Vegas, vol.\u00a04, pp. 2211\u20132215 (2006)","DOI":"10.1109\/WCNC.2006.1696639"},{"key":"3_CR12","unstructured":"He, W., Nahrstedt, K.: Impact of Upper Layer Adaptation on End-to-End Delay Management in Wireless Ad Hoc Networks. In: Proc. IEEE Real-Time Embedded Technology and Application Symposium, RTAS 2006, April 2006, pp. 59\u201370 (2006)"},{"issue":"9","key":"3_CR13","doi-asserted-by":"publisher","first-page":"1138","DOI":"10.1109\/TMC.2007.70754","volume":"7","author":"Z. Shen","year":"2008","unstructured":"Shen, Z., Thomas, J.P.: Security and QoS Self-Optimization in Mobile Ad Hoc Networks. IEEE Trans. on Mobile Computing\u00a07(9), 1138\u20131151 (2008)","journal-title":"IEEE Trans. on Mobile Computing"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Agarwal, A.K., Wang, W.: DSPM: Dynamic Security Policy Management for Optimizing Performance in wireless networks. In: Proc. IEEE MILCOM 2006, pp. 1\u20137 (2006)","DOI":"10.1109\/MILCOM.2006.302203"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Agarwal, A.K., Wang, W., Gupta, R.A., Chow, M.: LAP: Link-Aware Protection for Improving Performance of Loss and Delay Sensitive Applications in Wireless Lans. In: Proc. IEEE MILCOM 2007, pp. 1\u20137 (2007)","DOI":"10.1109\/MILCOM.2007.4454948"},{"key":"3_CR16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/505666.505669","volume":"31","author":"R. Cole","year":"2001","unstructured":"Cole, R., Rosenbluth, J.: Voice over IP performance monitoring. ACM Comput. Commun. Rev.\u00a031, 9\u201324 (2001)","journal-title":"ACM Comput. Commun. Rev."},{"key":"3_CR17","unstructured":"ITU-T Recommendation G.107, The E-model, a Computational Model for Use in Transmission Planning (1998)"},{"key":"3_CR18","unstructured":"Dai, W.: Crypto++, http:\/\/www.eskimo.com\/weidai\/cryptlib.html"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Hariri, S., Qu, G., Modukuri, R., Chen, H., Yousif, M.: Quality-of-Protection (QoP) \u2013 An Online Monitoring and Self-Protection Mechanism. IEEE Journal on Selected Areas in Communications\u00a023(10) (2005)","DOI":"10.1109\/JSAC.2005.854122"},{"key":"3_CR20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511619755","volume-title":"Security and Quality of Service in Ad Hoc Wireless Networks","author":"A. Mishra","year":"2008","unstructured":"Mishra, A.: Security and Quality of Service in Ad Hoc Wireless Networks. Cambridge University Press, Cambridge (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quality of Service in Heterogeneous Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10625-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T04:33:10Z","timestamp":1739421190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10625-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642106248","9783642106255"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10625-5_3","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}