{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T21:26:42Z","timestamp":1706045202870},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,7,31]],"date-time":"2013-07-31T00:00:00Z","timestamp":1375228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Telecommun Syst"],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11235-013-9761-7","type":"journal-article","created":{"date-parts":[[2013,7,30]],"date-time":"2013-07-30T17:59:00Z","timestamp":1375207140000},"page":"25-39","source":"Crossref","is-referenced-by-count":11,"title":["Capacity and interference modeling of CSMA\/CA networks using SSI point processes"],"prefix":"10.1007","volume":"57","author":[{"given":"Anthony","family":"Busson","sequence":"first","affiliation":[]},{"given":"Guillaume","family":"Chelius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,7,31]]},"reference":[{"key":"9761_CR1","unstructured":"Network simulator 3-ns3. http:\/\/www.nsnam.org ."},{"issue":"2","key":"9761_CR2","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1109\/TIT.2005.862098","volume":"52","author":"F. Baccelli","year":"2006","unstructured":"Baccelli, F., B\u0142aszczyszyn, B., & M\u00fchlethaler, P. (2006). An aloha protocol for multihop mobile wireless networks. IEEE Transactions on Information Theory, 52(2), 421\u2013436.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9761_CR3","series-title":"WiOPT 2008","volume-title":"6th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks and workshops","author":"F. Baccelli","year":"2008","unstructured":"Baccelli, F., Blaszczyszyn, B., & Muhlethaler, P. (2008). On the performance of time-space opportunistic routing in multihop mobile ad hoc networks. In 6th international symposium on modeling and optimization in mobile, ad hoc, and wireless networks and workshops (WiOPT 2008), Berlin, Germany, April 2008. New York: IEEE Press."},{"issue":"2","key":"9761_CR4","first-page":"87","volume":"10","author":"E. Hamida Ben","year":"2008","unstructured":"Ben Hamida, E., Chelius, G., Busson, A., & Fleury, E. (2008). Neighbor discover in multi-hop wireless networks: evaluation and dimensioning with interference considerations. Discrete Mathematics and Theoretical Computer Science, 10(2), 87\u2013114.","journal-title":"Discrete Mathematics and Theoretical Computer Science"},{"key":"9761_CR5","volume-title":"48th annual Allerton conference on communication, control, and computing","author":"B. Blaszczyszyn","year":"2010","unstructured":"Blaszczyszyn, B., & Yogeshwaran, D. (2010). Connectivity in sub-Poisson networks. In 48th annual Allerton conference on communication, control, and computing, Allerton, USA, April 2010. New York: SIAM."},{"key":"9761_CR6","volume-title":"Sixth ACM international symposium on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN 2009)","author":"A. Busson","year":"2009","unstructured":"Busson, A., & Chelius, G. (2009). Point processes for interference modeling in CSMA\/CA ad-hoc networks. In Sixth ACM international symposium on performance evaluation of wireless ad hoc, sensor, and ubiquitous networks (PE-WASUN 2009), Tenerife, Spain, October 2009. New York: IEEE Press."},{"key":"9761_CR7","unstructured":"Busson, A., Chelius, G., & Gorce, J.-M. (2008). Interference modeling in CSMA multi-hop wireless networks. Research report RR-6624, INRIA."},{"key":"9761_CR8","volume-title":"SUPERCOMM\/ICC","author":"T. G. Cheng","year":"1990","unstructured":"Cheng, T. G., & Robertazzi, Y.-C. (1990). A new spatial point process for multihop radio network modeling. In SUPERCOMM\/ICC."},{"key":"9761_CR9","unstructured":"Cho, B. (2010). A simulation study on interference in CSMA\/CA ad-hoc networks using point process. Master thesis, Aalto University, School of Science and Technology, December 2010."},{"issue":"4","key":"9761_CR10","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/MCOM.2007.343617","volume":"45","author":"M. Conti","year":"2007","unstructured":"Conti, M., & Giordano, S. (2007). Multihop ad hoc networking: the reality. IEEE Communications Magazine, 45(4), 88\u201395.","journal-title":"IEEE Communications Magazine"},{"key":"9761_CR11","volume-title":"An introduction to the theory of point processes","author":"D. J. Daley","year":"2003","unstructured":"Daley, D. J., & Vere-Jones, D. (2003). An introduction to the theory of point processes. New York: Springer."},{"issue":"2","key":"9761_CR12","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1109\/TNET.2005.845546","volume":"13","author":"O. Dousse","year":"2005","unstructured":"Dousse, O., Baccelli, F., & Thiran, P. (2005). Impact of interferences on connectivity in ad hoc networks. IEEE\/ACM Transactions on Networking, 13(2), 425\u2013436.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"9761_CR13","volume-title":"Conference on computer communications (INFOCOM)","author":"O. Dousse","year":"2004","unstructured":"Dousse, O., & Thiran, P. (2004). Connectivity vs capacity in dense ad hoc networks. In Conference on computer communications (INFOCOM), Hong Kong, China, March 2004. New York: IEEE Press."},{"key":"9761_CR14","volume-title":"Conference on computer communications (INFOCOM)","author":"O. Dousse","year":"2002","unstructured":"Dousse, O., Thiran, P., & Hasler, M. (2002). Connectivity in ad-hoc and hybrid networks. In Conference on computer communications (INFOCOM), New York, USA, June 2002. New York: IEEE Press."},{"issue":"3","key":"9761_CR15","doi-asserted-by":"crossref","first-page":"1009","DOI":"10.1109\/TIT.2006.890791","volume":"53","author":"M. Franceschetti","year":"2007","unstructured":"Franceschetti, M., Dousse, O., Tse, D., & Thiran, P. (2007). Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 53(3), 1009\u20131018.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"9","key":"9761_CR16","doi-asserted-by":"crossref","first-page":"631","DOI":"10.1109\/LCOMM.2009.090837","volume":"13","author":"R. K. Ganti","year":"2009","unstructured":"Ganti, R. K., & Haenggi, M. (2009). Spatial and temporal correlation of the interference in aloha ad hoc networks. IEEE Communications Letters, 13(9), 631\u2013633.","journal-title":"IEEE Communications Letters"},{"issue":"2","key":"9761_CR17","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/18.825799","volume":"46","author":"P. Gupta","year":"2000","unstructured":"Gupta, P., & Kumar, P. (2000). Capacity of wireless networks. IEEE Transactions on Information Theory, 46(2), 388\u2013404.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9761_CR18","volume-title":"Introduction to the theory of coverage processes","author":"P. Hall","year":"1988","unstructured":"Hall, P. (1988). Introduction to the theory of coverage processes. New York: Wiley."},{"key":"9761_CR19","volume-title":"IEEE 19th international symposium on personal, indoor and mobile radio communications (PIMRC 2008)","author":"J. Hoydis","year":"2008","unstructured":"Hoydis, J., Petrova, M., & Mahonen, P. (2008). Effects of topology on local throughput-capacity of ad hoc networks. In IEEE 19th international symposium on personal, indoor and mobile radio communications (PIMRC 2008), Cannes, France, September 2008. New York: IEEE Press."},{"issue":"7","key":"9761_CR20","first-page":"631","volume":"27","author":"H. Kaibin","year":"2009","unstructured":"Kaibin, H., Lau, V. K. N., & Chen, Y. (2009). Spectrum sharing between cellular and mobile ad hoc networks: transmission-capacity trade-off. IEEE Journal on Selected Areas in Communications, 27(7), 631\u2013633.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"1\u20132","key":"9761_CR21","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11235-009-9220-7","volume":"44","author":"B. Lauwens","year":"2010","unstructured":"Lauwens, B., Scheers, B., & Van de Capelle, A. (2010). Performance analysis of unslotted CSMA\/ca in wireless networks. Telecommunications Systems, 44(1\u20132), 109\u2013123.","journal-title":"Telecommunications Systems"},{"key":"9761_CR22","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1080\/00949658208810596","volume":"15","author":"H. W. Lotwick","year":"1982","unstructured":"Lotwick, H. W. (1982). Simulations of some spatial hard-core models, and the complete packing problems. Journal of Statistical Computation and Simulation, 15, 295\u2013314.","journal-title":"Journal of Statistical Computation and Simulation"},{"issue":"5","key":"9761_CR23","first-page":"1","volume":"49","author":"B. Mat\u00e9rn","year":"1960","unstructured":"Mat\u00e9rn, B. (1960). Spatial variation. Meddelanden Fran Statens Skogsforskningsinstitut, 49(5), 1\u2013144.","journal-title":"Meddelanden Fran Statens Skogsforskningsinstitut"},{"key":"9761_CR24","series-title":"Lecture notes in statistic","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-7892-5","volume-title":"Spatial variation","author":"B. Mat\u00e9rn","year":"1986","unstructured":"Mat\u00e9rn, B. (1986). Spatial variation. Lecture notes in statistic: Vol.\u00a036. Berlin: Springer."},{"issue":"6","key":"9761_CR25","doi-asserted-by":"crossref","first-page":"2494","DOI":"10.1109\/TIT.2009.2019336","volume":"55","author":"V. Mhatre","year":"2009","unstructured":"Mhatre, V., Rosenberg, C., & Mazumdar, R. (2009). The capacity of random ad hoc networks under a realistic link layer model. IEEE Transactions on Information Theory, 55(6), 2494\u20132498.","journal-title":"IEEE Transactions on Information Theory"},{"key":"9761_CR26","volume-title":"Conference on computer communications (INFOCOM)","author":"H. Q. Nguyen","year":"2007","unstructured":"Nguyen, H. Q., Baccelli, F., & Kofman, D. (2007). A stochastic geometry analysis of dense IEEE 802.11 networks. In Conference on computer communications (INFOCOM), Anchorage, USA, May 2007. New York: IEEE Press."},{"issue":"1","key":"9761_CR27","first-page":"353","volume":"5","author":"I. Palasti","year":"1960","unstructured":"Palasti, I. (1960). On some random space filling problem. A Magyar Tudom\u00e1nyos Akad\u00e9mia Matematikai Kutat\u00f3 Int\u00e9zet\u00e9nek K\u00f6zlem\u00e9nyei, 5(1), 353\u2013359.","journal-title":"A Magyar Tudom\u00e1nyos Akad\u00e9mia Matematikai Kutat\u00f3 Int\u00e9zet\u00e9nek K\u00f6zlem\u00e9nyei"},{"issue":"1\u20133","key":"9761_CR28","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1007\/s11235-006-9013-1","volume":"33","author":"D. H. Park","year":"2006","unstructured":"Park, D. H., Han, C. G., & Ahn, S. J. (2006). Performance analysis of mac layer protocols in the IEEE 802.11 wireless lan. Telecommunications Systems, 33(1\u20133), 233\u2013253.","journal-title":"Telecommunications Systems"},{"key":"9761_CR29","volume-title":"Antennas and propagation for wireless communication systems","author":"S. Saunders","year":"1999","unstructured":"Saunders, S. (1999). Antennas and propagation for wireless communication systems. New York: Wiley."},{"key":"9761_CR30","unstructured":"IEEE\u00a0Computer Society (1999). IEEE standard for information technology-telecommunications and information exchange between systems\u2014local and metropolitan area networks\u2014specific requirements. Part 11: Wireless lan medium access control (mac) and physical layer (phy) specifications: high-speed physical layer in the 5 GHz band. Technical report, IEEE Computer Society"},{"key":"9761_CR31","unstructured":"IEEE\u00a0Computer Society (2006). IEEE standard for information technology-telecommunications and information exchange between systems\u2014local and metropolitan area networks\u2014specific requirements. Part 15.4: Wireless medium access control (mac) and physical layer (phy) specifications for low-rate wireless personal area networks (wpans). Technical report, IEEE Computer Society (2006)."},{"key":"9761_CR32","doi-asserted-by":"crossref","first-page":"2571","DOI":"10.1080\/03610928608829274","volume":"15","author":"H. Solomon","year":"1986","unstructured":"Solomon, H., & Weiner, H. (1986). A review of the packing problem. Commun. Stat. Theor. Meth., 15, 2571\u20132607.","journal-title":"Commun. Stat. Theor. Meth."},{"key":"9761_CR33","volume-title":"Stochastic geometry and its applications","author":"D. Stoyan","year":"1996","unstructured":"Stoyan, D., Kendall, W., & Mecke, J. (1996). Stochastic geometry and its applications (2nd ed.). Chichester: Wiley.","edition":"2"},{"issue":"1\u20132","key":"9761_CR34","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/s11235-008-9090-4","volume":"38","author":"K. Szczypiorski","year":"2008","unstructured":"Szczypiorski, K., & Lubacz, J. (2008). Saturation throughput analysis of IEEE 802.11g (erp-ofdm) networks. Telecommunications Systems, 38(1\u20132), 45\u201352.","journal-title":"Telecommunications Systems"},{"issue":"3\u20134","key":"9761_CR35","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/s11235-008-9103-3","volume":"38","author":"M. Tahir","year":"2008","unstructured":"Tahir, M., & Mazumder, S. K. (2008). Markov chain model for performance analysis of transmitter power control in contention based wireless mac protocol. Telecommunications Systems, 38(3\u20134), 99\u2013110.","journal-title":"Telecommunications Systems"},{"key":"9761_CR36","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/BF02480293","volume":"31","author":"M. Tanemura","year":"1979","unstructured":"Tanemura, M. (1979). On random complete packing by disks. Annals of the Institute of Statistical Mathematics, 31, 351\u2013365.","journal-title":"Annals of the Institute of Statistical Mathematics"},{"issue":"1","key":"9761_CR37","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/TSP.2002.806591","volume":"51","author":"X. Yang","year":"2003","unstructured":"Yang, X., & Petropulu, A. P. (2003). Co-channel interference modeling and analysis in a Poisson field of interferers in wireless communications. IEEE Transactions on Signal Processing, 51(1), 64\u201376.","journal-title":"IEEE Transactions on Signal Processing"}],"container-title":["Telecommunication Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9761-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11235-013-9761-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11235-013-9761-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T06:50:15Z","timestamp":1559371815000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11235-013-9761-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7,31]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["9761"],"URL":"https:\/\/doi.org\/10.1007\/s11235-013-9761-7","relation":{},"ISSN":["1018-4864","1572-9451"],"issn-type":[{"value":"1018-4864","type":"print"},{"value":"1572-9451","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,31]]}}}