{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,6]],"date-time":"2023-10-06T09:37:02Z","timestamp":1696585022395},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2007,8,21]],"date-time":"2007-08-21T00:00:00Z","timestamp":1187654400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s11276-007-0057-2","type":"journal-article","created":{"date-parts":[[2007,8,20]],"date-time":"2007-08-20T14:05:55Z","timestamp":1187618755000},"page":"407-418","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of a deterministic power level selection algorithm with small and large power steps for Aloha networks under saturation"],"prefix":"10.1007","volume":"15","author":[{"given":"Behrouz","family":"Khoshnevis","sequence":"first","affiliation":[]},{"given":"Babak H.","family":"Khalaj","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,8,21]]},"reference":[{"issue":"2","key":"57_CR1","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/TIT.1987.1057295","volume":"33","author":"D. J. Aldous","year":"1987","unstructured":"Aldous, D. J. (1987). Ultimate instability of exponential back-off protocol for acknowledgment-based transmission control of random access communication channels. IEEE Transactions on Information Theory, 33(2), 219\u2013223.","journal-title":"IEEE Transactions on Information Theory"},{"key":"57_CR2","doi-asserted-by":"crossref","first-page":"1557","DOI":"10.1214\/aop\/1176991993","volume":"15","author":"F. P. Kelly","year":"1987","unstructured":"Kelly, F. P., & MacPhee, I. M. (1987). The number of packets transmitted by collision detect random access schemes. Annals of Probability, 15, 1557\u20131568.","journal-title":"Annals of Probability"},{"issue":"3","key":"57_CR3","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1145\/44483.44488","volume":"35","author":"J. Goodman","year":"1988","unstructured":"Goodman, J., Greenberg, A. G., Madras, N., & March, P. (1988). Stability of binary exponential backoff. Journal of ACM, 35(3), 579\u2013602.","journal-title":"Journal of ACM"},{"issue":"4","key":"57_CR4","doi-asserted-by":"crossref","first-page":"740","DOI":"10.1137\/S0097539792233828","volume":"25","author":"J. H\u00e5stad","year":"1996","unstructured":"H\u00e5stad, J., Leighton, T., & Rogoff, B. (1996). Analysis of backoff protocols for multiple access channels. SIAM Journal of Computing, 25(4), 740\u2013744.","journal-title":"SIAM Journal of Computing"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"Al-Ammal, H., Goldberg, L. A., & MacKenzie, P. (2000). Binary exponential backoff is stable for high arrival rates. In Proceedings of the 17th International Symposium on Theoretical Aspects of Computer Science, Lille, France, Feb. 2000.","DOI":"10.1007\/3-540-46541-3_14"},{"key":"57_CR6","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s00224-001-0005-y","volume":"30","author":"H. Al-Ammal","year":"2001","unstructured":"Al-Ammal, H., Goldberg, L. A., & MacKenzie, P. (2001). An improved stability bound for binary exponential backoff. Theory of Computing Systems, 30, 229\u2013244.","journal-title":"Theory of Computing Systems"},{"issue":"3","key":"57_CR7","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G. Bianchi","year":"2000","unstructured":"Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communication, 18(3), 535\u2013547.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"57_CR8","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/TNET.2005.845533","volume":"13","author":"B. J. Kwak","year":"2005","unstructured":"Kwak, B. J., Song, N. O., & Miller, L. (2005). Performance analysis of exponential backoff. IEEE\/ACM Transactions on Networking, 13, 343\u2013355.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"57_CR9","unstructured":"Air Interface for Fixed Broadband Wireless Access Systems, IEEE Std. 802.16, 2001."},{"key":"57_CR10","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1109\/TCOM.1976.1093317","volume":"24","author":"J. J. Metzner","year":"1976","unstructured":"Metzner, J. J. (1976). On improving utilization in ALOHA network. IEEE Transactions on Communications, 24, 447\u2013448.","journal-title":"IEEE Transactions on Communications"},{"key":"57_CR11","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/JSAC.1987.1146610","volume":"5","author":"C. C. Lee","year":"1987","unstructured":"Lee, C. C. (1987). Random signal levels for channel access in packet broadcast networks. IEEE Journal on Selected Areas in Communication, 5, 1026\u20131034.","journal-title":"IEEE Journal on Selected Areas in Communication"},{"key":"57_CR12","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1023\/A:1019164308540","volume":"4","author":"R. O. LaMaire","year":"1998","unstructured":"LaMaire, R. O., Krishna, A., & Zorzi, M. (1998). On the randomization of transmitter power levels to increase throughput in multiple access radio systems. Wireless Networks, 4, 263\u2013277.","journal-title":"Wireless Networks"},{"key":"57_CR13","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/26.618300","volume":"45","author":"Y. Leung","year":"1997","unstructured":"Leung, Y. (1997). Mean power consumption of artificial power capture in wireless networks. IEEE Transactions on Communication, 45, 957\u2013964.","journal-title":"IEEE Transactions on Communication"},{"key":"57_CR14","doi-asserted-by":"crossref","unstructured":"Khoshnevis, B., & Khalaj, B. H. Optimum power selection algorithms in Aloha networks: Random and deterministic approaches. IEEE Transactions on Wireless Communications (accepted for publication).","DOI":"10.1109\/TWC.2007.06039"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"Altman, E., Barman, D., Benslimane, A., & El-Azouzi, R. (2005). Slotted Aloha with priorities and random power. In Proceedings Networking, Ontario, Canada, pp. 610\u2013622.","DOI":"10.1007\/11422778_49"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-007-0057-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-007-0057-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-007-0057-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T09:01:56Z","timestamp":1559379716000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-007-0057-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,8,21]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["57"],"URL":"https:\/\/doi.org\/10.1007\/s11276-007-0057-2","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,8,21]]}}}