{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T22:40:59Z","timestamp":1682376059356},"reference-count":26,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[2003,2,1]],"date-time":"2003-02-01T00:00:00Z","timestamp":1044057600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2003,2]]},"DOI":"10.1016\/s1389-1286(02)00374-2","type":"journal-article","created":{"date-parts":[[2003,2,4]],"date-time":"2003-02-04T20:48:55Z","timestamp":1044391735000},"page":"193-210","source":"Crossref","is-referenced-by-count":11,"title":["Transient behaviors of TCP-friendly congestion control protocols"],"prefix":"10.1016","volume":"41","author":[{"given":"Y.Richard","family":"Yang","sequence":"first","affiliation":[]},{"given":"Min Sik","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Simon S.","family":"Lam","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"4","key":"10.1016\/S1389-1286(02)00374-2_BIB1","doi-asserted-by":"crossref","first-page":"458","DOI":"10.1109\/90.793002","article-title":"Promoting the use of end-to-end congestion control in the Internet","volume":"7","author":"Floyd","year":"1999","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB2","doi-asserted-by":"crossref","unstructured":"V. Jacobson, Congestion avoidance and control, in: Proceedings of ACM SIGCOMM\u201988, 1988","DOI":"10.1145\/52324.52356"},{"issue":"2","key":"10.1016\/S1389-1286(02)00374-2_BIB3","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1109\/6046.766738","article-title":"Real-time Internet video using error resilient scalable compression and TCP-friendly transport protocol","volume":"1","author":"Tan","year":"1999","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB4","unstructured":"J. Mahdavi, S. Floyd, TCP-friendly unicast rate-based flow control, note sent to the end2end-interest mailing list, 1997"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB5","unstructured":"T. Turletti, S.F. Parisis, J.-C. Bolot, Experiments with a layered transmission scheme over the Internet, Research Report No 3296, INRIA, November 1997"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB6","unstructured":"D. Sisalem, H. Schulzrinne, The loss-delay based adjustment algorithm: A TCP-friendly adaptation scheme, in: Proceedings of NOSSDAV\u201998, 1998"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB7","doi-asserted-by":"crossref","unstructured":"S. Cen, C. Pu, J. Walpole, Flow and congestion control for Internet streaming applications, in: Proceedings of Multimedia Computing and Networking 1998, 1998","DOI":"10.1117\/12.298426"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB8","doi-asserted-by":"crossref","unstructured":"R. Rejaie, M. Handley, D. Estrin, RAP: An end-to-end rate-based congestion control mechanism for realtime streams in the Internet, in: Proceedings of IEEE INFOCOM\u201999, vol. 3, 1999","DOI":"10.1109\/INFCOM.1999.752152"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB9","unstructured":"J. Padhye, J. Kurose, D. Towsley, R. Koodli, A model based TCP-friendly rate control protocol, in: Proceedings of NOSSDAV\u201999, 1999"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB10","unstructured":"L. Vicisano, L. Rizzo, J. Crowcroft, TCP-like congestion control for layered multicast data transfer, in: Proceedings of IEEE INFOCOM\u201999, vol. 3, 1999"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB11","doi-asserted-by":"crossref","unstructured":"S. Floyd, M. Handley, J. Padhye, J. Widmer, Equation-based congestion control for unicast applications, in: Proceedings of ACM SIGCOMM 2000, 2000","DOI":"10.1145\/347059.347397"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB12","doi-asserted-by":"crossref","unstructured":"Y.R. Yang, S.S. Lam, General AIMD congestion control, in: Proceedings of the 8th IEEE International Conference on Network Protocols, Osaka, Japan, 2000","DOI":"10.1109\/ICNP.2000.896303"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB13","unstructured":"I. Rhee, V. Ozdemir, Y. Yi, TEAR: TCP emulation at receivers\u2013\u2013flow control for multimedia streaming, Tech. Rep., Department of Computer Science, North Carolina State University, Raleigh, NC, April 2000"},{"issue":"6","key":"10.1016\/S1389-1286(02)00374-2_BIB14","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/65.642356","article-title":"Wide-area Internet traffic patterns and characteristics","volume":"11","author":"Thompson","year":"1997","journal-title":"IEEE Network"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB15","doi-asserted-by":"crossref","unstructured":"B. Braden, D. Clark, J. Crowcroft, B. Davie, S. Deering, D. Estrin, S. Floyd, V. Jacobson, G. Minshall, C. Partridge, L. Peterson, K. Ramakrishnan, S. Shenker, J. Wroclawski, L. Zhang, Recommendations on Queue Management and Congestion Avoidance in the Internet, RFC 2309, April 1998","DOI":"10.17487\/rfc2309"},{"issue":"1","key":"10.1016\/S1389-1286(02)00374-2_BIB16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/0169-7552(89)90019-6","article-title":"Analysis of the increase and decrease algorithms for congestion avoidance in computer networks","volume":"17","author":"Chiu","year":"1989","journal-title":"Computer Networks and ISDN Systems"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB17","doi-asserted-by":"crossref","unstructured":"S. Floyd, M. Handley, J. Padhye, A comparison of equation-based congestion control and AIMD-based congestion control, work-in-progress. Available from <http:\/\/www.aciri.org\/tfrc>, 2000","DOI":"10.17487\/rfc2861"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB18","doi-asserted-by":"crossref","unstructured":"J.-C. Bolot, End-to-end packet delay and loss behavior in the Internet, in: Proceedings of ACM SIGCOMM\u201993, 1993","DOI":"10.1145\/166237.166265"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB19","doi-asserted-by":"crossref","unstructured":"M. Yajnik, S. Moon, J. Kurose, D. Towsley, Measurement and modelling of the temporal dependence in packet loss, in: Proceedings of IEEE INFOCOM\u201999, 1999","DOI":"10.1109\/INFCOM.1999.749301"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB20","unstructured":"Y. Zhang, V. Paxson, S. Shenker, The stationarity of Internet path properties: Routing, loss, and throughput, Tech. Rep., ACIRI, May 2000"},{"issue":"3","key":"10.1016\/S1389-1286(02)00374-2_BIB21","first-page":"115","article-title":"On traffic phase effects in packet-switched gateways","volume":"3","author":"Floyd","year":"1992","journal-title":"Internetworking: Research and Experience"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB22","doi-asserted-by":"crossref","unstructured":"R. Jain, K.K. Ramakrishnan, D.-M. Chiu, Congestion avoidance in computer networks with a connectionless network layer, Tech. Rep. DEC\u2013TR\u2013506, DEC, August 1987","DOI":"10.1145\/52324.52355"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB23","doi-asserted-by":"crossref","first-page":"211","DOI":"10.2307\/1427243","article-title":"The stochastic equation Yn+1=AnYn+Bn with stationary coefficients","volume":"18","author":"Brandt","year":"1986","journal-title":"Advances in Applied Probability"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB24","doi-asserted-by":"crossref","first-page":"851","DOI":"10.2307\/3215199","article-title":"Stochastic vector difference equations with stationary coefficients","volume":"32","author":"Glasserman","year":"1995","journal-title":"Journal of Applied Probability"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB25","doi-asserted-by":"crossref","unstructured":"E. Altman, K. Avrachenkov, C. Barakat, A stochastic model of TCP\/IP with stationary random losses, in: Proceedings of ACM SIGCOMM 2000, 2000","DOI":"10.1145\/347059.347549"},{"key":"10.1016\/S1389-1286(02)00374-2_BIB26","series-title":"Elements of Queueing Theory: Palm-Martingale Calculus and Stochastic recurrences","author":"Baccelli","year":"1994"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128602003742?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128602003742?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2023,4,24]],"date-time":"2023-04-24T22:18:18Z","timestamp":1682374698000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128602003742"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,2]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2003,2]]}},"alternative-id":["S1389128602003742"],"URL":"https:\/\/doi.org\/10.1016\/s1389-1286(02)00374-2","relation":{},"ISSN":["1389-1286"],"issn-type":[{"value":"1389-1286","type":"print"}],"subject":[],"published":{"date-parts":[[2003,2]]}}}