{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T06:00:55Z","timestamp":1775628055880,"version":"3.50.1"},"reference-count":21,"publisher":"Elsevier BV","issue":"6","license":[{"start":{"date-parts":[[2002,8,1]],"date-time":"2002-08-01T00:00:00Z","timestamp":1028160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2002,8]]},"DOI":"10.1016\/s1389-1286(02)00248-7","type":"journal-article","created":{"date-parts":[[2002,10,14]],"date-time":"2002-10-14T10:29:16Z","timestamp":1034591356000},"page":"789-808","source":"Crossref","is-referenced-by-count":30,"title":["State-dependent M\/G\/1 type queueing analysis for congestion control in data networks"],"prefix":"10.1016","volume":"39","author":[{"given":"Eitan","family":"Altman","sequence":"first","affiliation":[]},{"given":"Kostya","family":"Avrachenkov","sequence":"additional","affiliation":[]},{"given":"Chadi","family":"Barakat","sequence":"additional","affiliation":[]},{"given":"Rudesindo","family":"N\u00fa\u00f1ez-Queija","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S1389-1286(02)00248-7_BIB1","unstructured":"The ATM Forum Technical Committee, Trafic Management Specification, Version 4.0, 95-0013R8, 1995"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB2","series-title":"Investigation of a queueing system with service depending on queue length","author":"Abramov","year":"1991"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB3","series-title":"TCP in presence of bursty losses","author":"Altman","year":"2000"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB4","series-title":"A stochastic model of TCP\/IP with stationary random losses","author":"Altman","year":"2000"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB5","doi-asserted-by":"crossref","DOI":"10.1145\/205511.205512","article-title":"TCP and Explicit congestion notification","author":"Floyd","year":"1994","journal-title":"ACM Comput. Commun. Rev."},{"key":"10.1016\/S1389-1286(02)00248-7_BIB6","doi-asserted-by":"crossref","unstructured":"S. Floyd, T. Henderson, The NewReno modification to TCP's fast recovery algorithm, RFC 2582, 1999","DOI":"10.17487\/rfc2582"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB7","doi-asserted-by":"crossref","unstructured":"J. Heinanen, T. Finland, F. Baker, W. Weiss, J. Wroclawski, Assured forwarding PHB group, RFC 2597, 1999","DOI":"10.17487\/rfc2597"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB8","series-title":"Congestion avoidance and control","author":"Jacobson","year":"1988"},{"issue":"3","key":"10.1016\/S1389-1286(02)00248-7_BIB9","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1137\/0146033","article-title":"Asymptotic analysis of a state-dependent M\/G\/1 queueing system","volume":"46","author":"Knessl","year":"1986","journal-title":"SIAM J. Appl. Math."},{"issue":"2","key":"10.1016\/S1389-1286(02)00248-7_BIB10","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1017\/S0956792500001418","article-title":"A statedependent GI\/G\/1 queue","volume":"5","author":"Knessl","year":"1994","journal-title":"Eur. J. Appl. Math."},{"key":"10.1016\/S1389-1286(02)00248-7_BIB12","doi-asserted-by":"crossref","DOI":"10.1145\/263932.264023","article-title":"The macroscopic behavior of the TCP congestion avoidance algorithm","author":"Mathis","year":"1997","journal-title":"ACM Comput. Commun. Rev."},{"key":"10.1016\/S1389-1286(02)00248-7_BIB13","unstructured":"V. Misra, W.-B. Gong, D. Towsley, Stochastic differential equation modeling and analysis of TCP-windowsize behavior, Performance'99, Istanbul, Turkey, October, 1999. Available from <http:\/\/wwwnet.cs.umass.edu\/papers\/papers.html>"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB14","doi-asserted-by":"crossref","unstructured":"A. Misra, T. Ott, J. Baras, The window distribution of multiple TCPs with random queues, IEEE GLOBECOM, December 1999","DOI":"10.1109\/GLOCOM.1999.832455"},{"issue":"3","key":"10.1016\/S1389-1286(02)00248-7_BIB15","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1002\/nav.3800280313","article-title":"On queues with dependent interarrival and service times","volume":"28","author":"Niu","year":"1981","journal-title":"Naval Res. Logist. Quart."},{"key":"10.1016\/S1389-1286(02)00248-7_BIB16","unstructured":"T.J. Ott, J.H.B. Kemperman, M. Mathis, The stationary behavior of ideal TCP congestion avoidance. Available from <ftp:\/\/ftp.telcordia.com\/pub\/tjo\/TCPwindow.ps>, August, 1996"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB17","doi-asserted-by":"crossref","unstructured":"J. Padhye, V. Firoiu, D. Towsley, J. Kurose, Modeling TCP throughput: a simple model and its empirical validation, ACM SIGCOMM, September 1998","DOI":"10.1145\/285237.285291"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB18","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1287\/opre.21.2.610","article-title":"Single-server queues with service time dependent onwaiting time","volume":"21","author":"Posner","year":"1973","journal-title":"Oper. Res."},{"key":"10.1016\/S1389-1286(02)00248-7_BIB19","doi-asserted-by":"crossref","unstructured":"S. Sahu, D. Towsley, J. Kurose, A quantitative study of differentiated services for the internet, IEEE GLOBECOM, December 1999","DOI":"10.1109\/GLOCOM.1999.832474"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB20","doi-asserted-by":"crossref","unstructured":"M. Shalmon, The GI\/GI\/1 Queue and its variations via the LCFS preemptive resume discipline, Prob. Engng. Inform. Sci. 2 (1988) 215\u2013230","DOI":"10.1017\/S0269964800000747"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB21","doi-asserted-by":"crossref","unstructured":"W. Stevens, TCP slow start, congestion avoidance, fast retransmit, and fast recovery algorithms, RFC 2001, January 1997","DOI":"10.17487\/rfc2001"},{"key":"10.1016\/S1389-1286(02)00248-7_BIB22","series-title":"Stochastic Models\u2013\u2013An Algorithmic Approach","author":"Tijms","year":"1994"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128602002487?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128602002487?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T04:25:28Z","timestamp":1556425528000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128602002487"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,8]]},"references-count":21,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2002,8]]}},"alternative-id":["S1389128602002487"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(02)00248-7","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2002,8]]}}}