{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:26:56Z","timestamp":1775179616625,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T00:00:00Z","timestamp":1452556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["51174263"],"award-info":[{"award-number":["51174263"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100013286","name":"Specialized Research Fund for the Doctoral Program of Higher Education of China","doi-asserted-by":"crossref","award":["20124116120004"],"award-info":[{"award-number":["20124116120004"]}],"id":[{"id":"10.13039\/501100013286","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Henan Research Program of Application Foundation and Advanced Technology","award":["142300410144"],"award-info":[{"award-number":["142300410144"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Netw"],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1007\/s11276-015-1184-9","type":"journal-article","created":{"date-parts":[[2016,1,12]],"date-time":"2016-01-12T10:25:55Z","timestamp":1452594355000},"page":"749-758","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["A backoff algorithm based on self-adaptive contention window update factor for IEEE 802.11 DCF"],"prefix":"10.1007","volume":"23","author":[{"given":"Changsen","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Pengpeng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jianji","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Xiaofei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Athanasios V.","family":"Vasilakos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,1,12]]},"reference":[{"issue":"1","key":"1184_CR1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s11036-011-0316-4","volume":"17","author":"X-F Wang","year":"2012","unstructured":"Wang, X.-F., Vasilakos, A. V., Chen, M., et al. (2012). A survey of green mobile networks: Opportunities and challenges. ACM\/Springer Mobile Networks and Applications, 17(1), 4\u201320.","journal-title":"ACM\/Springer Mobile Networks and Applications"},{"key":"1184_CR2","volume-title":"Delay tolerant networks: Protocols and applications","author":"AV Vasilakos","year":"2012","unstructured":"Vasilakos, A. V., Zhang, Y., & Spyropoulos, T. (2012). Delay tolerant networks: Protocols and applications. Boca Raton: CRC Press."},{"issue":"3","key":"1184_CR3","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/MCOM.2015.7060498","volume":"53","author":"H-J Zhang","year":"2013","unstructured":"Zhang, H.-J., Chu, X.-L., Guo, W.-S., & Wang, S.-Y. (2013). Coexistence of Wi-Fi and heterogeneous small cell networks sharing unlicensed spectrum. IEEE Communications Magazine, 53(3), 158\u2013164.","journal-title":"IEEE Communications Magazine"},{"issue":"3","key":"1184_CR4","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MWC.2015.7143331","volume":"22","author":"H-J Zhang","year":"2015","unstructured":"Zhang, H.-J., Jiang, C.-X., Cheng, J.-L., & Leung, V. C. M. (2015). Cooperative interference mitigation and handover management for heterogeneous cloud small cell networks. IEEE Wireless Communications, 22(3), 92\u201399.","journal-title":"IEEE Wireless Communications"},{"key":"1184_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X.-F., Chen, M., Zhu, H., et al. (2014). TOSS: Traffic offloading by social network service-based opportunistic sharing in mobile social networks. In The 33rd annual IEEE international conference on computer communications, pp. 2346\u20132354.","DOI":"10.1109\/INFOCOM.2014.6848179"},{"issue":"2","key":"1184_CR6","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1109\/MCOM.2014.6736753","volume":"52","author":"X-F Wang","year":"2014","unstructured":"Wang, X.-F., Chen, M., Taleb, T., et al. (2014). Cache in the air: Exploiting content caching and delivery techniques for 5G systems. IEEE Communication Magazine, 52(2), 131\u2013139.","journal-title":"IEEE Communication Magazine"},{"key":"1184_CR7","unstructured":"IEEE Std 802.11. (2007). Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. Part 11. New York: IEEE Press."},{"issue":"2","key":"1184_CR8","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1109\/TNET.2005.845533","volume":"13","author":"B-J Kwak","year":"2005","unstructured":"Kwak, B.-J., Song, N.-O., & Miller, M. E. (2005). Performance analysis of exponential backoff. IEEE\/ACM Transactions on Networking, 13(2), 343\u2013355.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"3","key":"1184_CR9","doi-asserted-by":"crossref","first-page":"529","DOI":"10.3724\/SP.J.1016.2012.00529","volume":"35","author":"Y-L Liu","year":"2012","unstructured":"Liu, Y.-L., Pu, J.-H., Fang, W.-W., et al. (2012). A MAC layer optimization algorithm in wireless sensor network. Chinese Journal of Computer, 35(3), 529\u2013539.","journal-title":"Chinese Journal of Computer"},{"issue":"1","key":"1184_CR10","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1109\/TNET.2013.2295242","volume":"23","author":"X-H Sun","year":"2015","unstructured":"Sun, X.-H., & Lin, D. (2015). Backoff design for IEEE 802.11 DCF networks: Fundamental tradeoff and design criterion. IEEE\/ACM Transactions on Networking, 23(1), 300\u2013316.","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"8","key":"1184_CR11","doi-asserted-by":"crossref","first-page":"867","DOI":"10.1002\/wcm.260","volume":"4","author":"Q-X Pang","year":"2004","unstructured":"Pang, Q.-X., Liew, S. C., et al. (2004). Performance evaluation of an adaptive backoff scheme for WLAN. Wireless Communications and Mobile Computing, 4(8), 867\u2013879.","journal-title":"Wireless Communications and Mobile Computing"},{"issue":"1","key":"1184_CR12","doi-asserted-by":"crossref","first-page":"204","DOI":"10.1109\/TNET.2012.2202323","volume":"21","author":"Y He","year":"2013","unstructured":"He, Y., Sun, J., Ma, X.-J., Vasilakos, A. V., et al. (2013). Semi-random backoff: Towards resource reservation for channel access in wireless LANs. IEEE\/ACM Transactions on Networking, 21(1), 204\u2013217.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1184_CR13","unstructured":"Wu, H. T., Cheng, S. D., Peng, Y., et al. (2002). IEEE 802.11 distributed coordination function (DCF): Analysis and enhancement. In IEEE international conference on communications (ICC), pp. 605\u2013609."},{"key":"1184_CR14","unstructured":"Ni, Q., Aad, I., Turletti, T., et al. (2003). Modeling and analysis of slow CW decrease IEEE 802.11 WLAN. In 14th IEEE proceedings on personal, indoor and mobile radio communications, (PIMRC), pp. 1717\u20131721."},{"key":"1184_CR15","unstructured":"Song, N.-O., Kwak, B.-J., Song, J., et al. (2003). Enhancement of IEEE 802.11 distributed coordination function with exponential increase exponential decrease backoff algorithm. In 57th IEEE semiannual vehicular technology conference (VTC), pp. 2775\u20132778."},{"issue":"6","key":"1184_CR16","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1109\/90.893874","volume":"8","author":"F Cali","year":"2000","unstructured":"Cali, F., Conti, M., & Gregori, E. (2000). Dynamic tuning of the IEEE 802.11 protocol to achieve a theoretical throughput limit. IEEE\/ACM Transactions on Networking, 8(6), 785\u2013799.","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"1184_CR17","unstructured":"Shurman, M., Al-Shua\u2019b, B., Alsaedeen, M., et al. (2014). N-BEB: New backoff algorithm for IEEE 802.11 MAC protocol. In 37th International convention on information and communication technology, electronics and microelectronics (MIPRO), pp. 540\u2013544."},{"key":"1184_CR18","doi-asserted-by":"crossref","unstructured":"Krishnan, M. N., Yang, S.-O., & Zakhor, A. (2014). Contention window adaptation using the busy-idle signal in 802.11 WLANs. In 2014 IEEE global communications conference (GLOBECOM), pp. 4794\u20134800.","DOI":"10.1109\/GLOCOM.2014.7037565"},{"issue":"10","key":"1184_CR19","first-page":"1651","volume":"46","author":"J-B Mao","year":"2009","unstructured":"Mao, J.-B., Mao, Y.-M., Leng, S.-P., et al. (2009). Performance analysis of multi-channel MAC schemes based on 802.11. Journal of Computer Research and Development, 46(10), 1651\u20131659.","journal-title":"Journal of Computer Research and Development"},{"key":"1184_CR20","unstructured":"Wang, G., Zhong, X.-F., Mei, S.-L., et al. (2011). A new constrained-send mechanism to enhance the performance of IEEE 802.11 DCF. In 6th international ICST conference on communications and networking in China (CHINACOM), pp. 448\u2013452."},{"key":"1184_CR21","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1109\/ACCESS.2015.2435000","volume":"3","author":"Z-G Sheng","year":"2015","unstructured":"Sheng, Z.-G., Mahapatra, C., Zhu, C.-S., & Leung, V. C. M. (2015). Recent advances in industrial wireless sensor networks toward efficient management in IoT. IEEE Accesss, 3, 622\u2013637.","journal-title":"IEEE Accesss"},{"issue":"12","key":"1184_CR22","doi-asserted-by":"crossref","first-page":"2538","DOI":"10.1109\/JPROC.2013.2257631","volume":"101","author":"M Li","year":"2013","unstructured":"Li, M., Li, Z.-J., & Vasilakos, A. V. (2013). A survey on topology control in wireless sensor networks, taxonomy, comparative study, and open issues. Proceedings of the IEEE, 101(12), 2538\u20132557.","journal-title":"Proceedings of the IEEE"},{"issue":"7","key":"1184_CR23","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1109\/MCOM.2013.6553686","volume":"51","author":"K Han","year":"2013","unstructured":"Han, K., Luo, J., Liu, Y., & Vasilakos, A. V. (2013). Algorithm design for data communications in duty-cycled wireless sensor networks: A survey. IEEE Communications Magazine, 51(7), 107\u2013113.","journal-title":"IEEE Communications Magazine"},{"issue":"11","key":"1184_CR24","first-page":"3422","volume":"31","author":"C-S Zhang","year":"2014","unstructured":"Zhang, C.-S., & Min, J. (2014). Research of adaptive aggregation algorithm to balance delay and accuracy. Application Research of Computers, 31(11), 3422\u20133425.","journal-title":"Application Research of Computers"},{"key":"1184_CR25","unstructured":"Gou, H., & Yoo, Y. (2012). An energy efficient MAC protocol based on IEEE 802.11 DCF for wireless sensor networks in port logistics. In IEEE 9th international conference on embedded software and systems (HPCC-ICESS), pp. 728\u2013733."},{"issue":"3","key":"1184_CR26","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"G Bianchi","year":"2000","unstructured":"Bianchi, G. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18(3), 535\u2013547.","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1184-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11276-015-1184-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1184-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11276-015-1184-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,16]],"date-time":"2020-05-16T09:15:32Z","timestamp":1589620532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11276-015-1184-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,12]]},"references-count":26,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,4]]}},"alternative-id":["1184"],"URL":"https:\/\/doi.org\/10.1007\/s11276-015-1184-9","relation":{},"ISSN":["1022-0038","1572-8196"],"issn-type":[{"value":"1022-0038","type":"print"},{"value":"1572-8196","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,12]]}}}