{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T00:47:20Z","timestamp":1652662040912},"reference-count":17,"publisher":"Elsevier BV","issue":"15","license":[{"start":{"date-parts":[[2003,9,1]],"date-time":"2003-09-01T00:00:00Z","timestamp":1062374400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2003,9]]},"DOI":"10.1016\/s0140-3664(03)00052-5","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T13:19:33Z","timestamp":1049721573000},"page":"1792-1799","source":"Crossref","is-referenced-by-count":6,"title":["Freeze TCP with timestamps for fast packet loss recovery after disconnections"],"prefix":"10.1016","volume":"26","author":[{"given":"G.M.T.","family":"Da Costa","sequence":"first","affiliation":[]},{"given":"H.R.","family":"Sirisena","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/S0140-3664(03)00052-5_BIB1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/35.917504","article-title":"TCP performance issues over wireless links","volume":"39","author":"Xylomenos","year":"2001","journal-title":"IEEE Communications Magazine"},{"issue":"5","key":"10.1016\/S0140-3664(03)00052-5_BIB2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/269790.269794","article-title":"M-TCP: TCP for mobile cellular networks","volume":"27","author":"Brown","year":"1997","journal-title":"ACM SIGCOMM Computer Communication Review (CCR)"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB3","series-title":"2000 IEEE International Conference on Communications (ICC 2000)","volume":"vol. 3","author":"Elaoud","year":"2000"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB4","series-title":"Proceedings of the IEEE INFOCOM' 2000","volume":"vol. 3","author":"Goff","year":"2000"},{"issue":"5","key":"10.1016\/S0140-3664(03)00052-5_BIB5","first-page":"850","article-title":"Improving the performance of reliable transport protocols in mobile computing environments","volume":"13","author":"C\u00e0ceres","year":"1995","journal-title":"IEEE JSAC"},{"issue":"4","key":"10.1016\/S0140-3664(03)00052-5_BIB6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/BF01985757","article-title":"Improving reliable transport and handoff performance in cellular wireless networks","volume":"1","author":"Balakrishnan","year":"1995","journal-title":"ACM\/Baltzer Wireless Networks Journal"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB7","unstructured":"N. Vaidya, M. Metha, C. Perkins, G. Montenegro, Delayed Duplicate Acknowledgements: A TCP Unaware Approach to Improve Performance of TCP over Wireless, Technical Report 99-003, Computer Science Department, Texas A&M University, February 1999."},{"key":"10.1016\/S0140-3664(03)00052-5_BIB8","series-title":"Proceedings of the 15th International Conference on Distributed Computing Systems, June","author":"Bakre","year":"1995"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB9","doi-asserted-by":"crossref","unstructured":"R. Braden, Requirements for Internet Hosts-Communication Layers, Request for Comments RFC1122, Internet engineering Task Force, October 1989.","DOI":"10.17487\/rfc1122"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB10","series-title":"Internet Conference 2000 (IC2000)","author":"Onoe","year":"2000"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB11","doi-asserted-by":"crossref","unstructured":"V. Jacobson, R. Braden, D. Borman, TCP Extensions for High Performance, Request for Comments RFC1323, Internet engineering Task Force, May 1992.","DOI":"10.17487\/rfc1323"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB12","author":"Stevens","year":"1994"},{"issue":"1","key":"10.1016\/S0140-3664(03)00052-5_BIB13","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1145\/505688.505692","article-title":"The Eifel algorithm: making TCP robust against spurious retransmissions","volume":"30","author":"Ludwig","year":"2000","journal-title":"ACM Computer Communication Review"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB14","unstructured":"H. Inamura, G. Montenegro, R. Ludwig, A. Gurtov, F. Khafizov, TCP Over Second (2.5G) and Third (3G) Generation Wireless Networks, Internet Draft, draft-ietf-pilc-2.5g3g-10 2002."},{"key":"10.1016\/S0140-3664(03)00052-5_BIB15","author":"Stevens","year":"1994"},{"key":"10.1016\/S0140-3664(03)00052-5_BIB16","unstructured":"J. Widmer, Extensions to the ns Network Simulator, 2001, http:\/\/www.icsi.berkeley.edu\/~widmer\/mnav\/ns-extension\/."},{"key":"10.1016\/S0140-3664(03)00052-5_BIB17","unstructured":"E. Blanton, dup ACK behaviour with SACK, 2000, http:\/\/www.isi.edu\/nsnam\/archive\/ns-users\/webarch\/2000\/msg03497.html."}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000525?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366403000525?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,27]],"date-time":"2019-03-27T04:53:56Z","timestamp":1553662436000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366403000525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,9]]},"references-count":17,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2003,9]]}},"alternative-id":["S0140366403000525"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(03)00052-5","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2003,9]]}}}