{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:21:10Z","timestamp":1759033270799,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642207976"},{"type":"electronic","value":"9783642207983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20798-3_12","type":"book-chapter","created":{"date-parts":[[2011,4,27]],"date-time":"2011-04-27T07:01:07Z","timestamp":1303887667000},"page":"150-163","source":"Crossref","is-referenced-by-count":3,"title":["EFD: An Efficient Low-Overhead Scheduler"],"prefix":"10.1007","author":[{"given":"Jinbang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Martin","family":"Heusse","sequence":"additional","affiliation":[]},{"given":"Guillaume","family":"Urvoy-Keller","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"QualNet 4.5. Scalable Networks"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Aalto, S., Lassila, P.: Impact of size-based scheduling on flow level performance in wireless downlink data channels. Managing Traffic Performance in Converged Networks, 1096\u20131107 (2007)","DOI":"10.1007\/978-3-540-72990-7_94"},{"key":"12_CR3","unstructured":"Avrachenkov, K., Ayesta, U., Brown, P., Nyberg, E.: Differentiation between short and long tcp flows: Predictability of the response time. In: Proc. IEEE INFOCOM (2004)"},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-12963-6_10","volume-title":"NETWORKING 2010","author":"D.M. Divakaran","year":"2010","unstructured":"Divakaran, D.M., Carofiglio, G., Altman, E., Primet, P.V.B.: A flow scheduler architecture. In: Crovella, M., Feeney, L.M., Rubenstein, D., Raghavan, S.V. (eds.) NETWORKING 2010. LNCS, vol.\u00a06091, pp. 122\u2013134. Springer, Heidelberg (2010)"},{"key":"12_CR5","volume-title":"Multi-armed bandit allocation indices","author":"J.C. Gittins","year":"1989","unstructured":"Gittins, J.: Multi-armed bandit allocation indices. Wiley Interscience, Hoboken (1989)"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Golestani, S.: A self-clocked fair queueing scheme for broadband applications. In: 13th Proceedings IEEE INFOCOM 1994. Networking for Global Communications, vol.\u00a02, pp. 636\u2013646 (June 1994)","DOI":"10.1109\/INFCOM.1994.337677"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Heusse, M., Urvoy-Keller, G., Duda, A., Brown, T.X.: Least attained recent service for packet scheduling over wireless lans. In: WoWMoM 2010 (2010)","DOI":"10.1109\/WOWMOM.2010.5534906"},{"key":"12_CR8","volume-title":"Computer Applications, Queueing Systems","author":"L. Kleinrock","year":"1976","unstructured":"Kleinrock, L.: Computer Applications, 1st edn., Queueing Systems, vol.\u00a02. Wiley Interscience, Hoboken (1976)","edition":"1"},{"key":"12_CR9","unstructured":"Kortebi, A., Oueslati, S., Roberts, J.: Cross-protect: Implicit service differentiation and admission control. In: IEEE HPSR (2004)"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/1454503.1454558","volume-title":"MSWiM 2008: Proceedings of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems","author":"P. Lassila","year":"2008","unstructured":"Lassila, P., Aalto, S.: Combining opportunistic and size-based scheduling in wireless systems. In: MSWiM 2008: Proceedings of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 323\u2013332. ACM, New York (2008)"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Noureddine, W., Tobagi, F.: Improving the performance of interactive tcp applications using service differentiation. Computer Networks Journal, 2002\u20132354 (2002)","DOI":"10.1016\/S1389-1286(02)00265-7"},{"key":"12_CR12","unstructured":"Psounis, K., Ghosh, A., Prabhakar, B., Wang, G.: Sift: A simple algorithm for tracking elephant flows, and taking advantage of power laws. In: 43rd Annual Allerton Conference on Control, Communication and Computing (2005)"},{"key":"12_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MNET.2005.1383435","volume":"19","author":"I.A. Rai","year":"2004","unstructured":"Rai, I.A., Biersack, E.W., Urvoy-keller, G.: Size-based scheduling to improve the performance of short tcp flows. IEEE Network\u00a019, 12\u201317 (2004)","journal-title":"IEEE Network"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1145\/1005686.1005702","volume-title":"SIGMETRICS 2004\/PERFORMANCE 2004: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems","author":"I.A. Rai","year":"2004","unstructured":"Rai, I.A., Urvoy-Keller, G., Vernon, M.K., Biersack, E.W.: Performance analysis of las-based scheduling disciplines in a packet switched network. In: SIGMETRICS 2004\/PERFORMANCE 2004: Proceedings of the Joint International Conference on Measurement and Modeling of Computer Systems, vol.\u00a032, pp. 106\u2013117. ACM Press, New York (2004)"},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1125274.1125276","volume":"6","author":"B. Schroeder","year":"2006","unstructured":"Schroeder, B., Harchol-Balter, M.: Web servers under overload: How scheduling can help. ACM Trans. Internet Technol.\u00a06(1), 20\u201352 (2006)","journal-title":"ACM Trans. Internet Technol."},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1145\/1454503.1454559","volume-title":"MSWiM 2008: Proceedings of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems","author":"G. Urvoy-Keller","year":"2008","unstructured":"Urvoy-Keller, G., Beylot, A.L.: Improving flow level fairness and interactivity in wlans using size-based scheduling policies. In: MSWiM 2008: Proceedings of the 11th International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems, pp. 333\u2013340. ACM, New York (2008)"}],"container-title":["Lecture Notes in Computer Science","NETWORKING 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20798-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,5]],"date-time":"2025-03-05T08:27:34Z","timestamp":1741163254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20798-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642207976","9783642207983"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20798-3_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}