{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:16:53Z","timestamp":1773656213429,"version":"3.50.1"},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2002,4,1]],"date-time":"2002-04-01T00:00:00Z","timestamp":1017619200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cluster Computing"],"published-print":{"date-parts":[[2002,4]]},"DOI":"10.1023\/a:1013977425774","type":"journal-article","created":{"date-parts":[[2002,12,28]],"date-time":"2002-12-28T13:55:48Z","timestamp":1041083748000},"page":"133-144","source":"Crossref","is-referenced-by-count":46,"title":["IEEE 802.11 Wireless LAN: Saturation Throughput Analysis with Seizing Effect Consideration"],"prefix":"10.1007","volume":"5","author":[{"given":"V.M.","family":"Vishnevsky","sequence":"first","affiliation":[]},{"given":"A.I.","family":"Lyakhov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"394378_CR1","first-page":"629","volume":"61","author":"A.S. Bakanov","year":"2000","unstructured":"A.S. Bakanov, A.I. Lyakhov and V.M. Vishnevsky, A method for evaluating performance of wireless communication networks with centralized control, Automation and Remote Control 61(4) (2000) 629\u2013636.","journal-title":"Automation and Remote Control"},{"key":"394378_CR2","doi-asserted-by":"crossref","unstructured":"G. Bianchi, Performance analysis of the IEEE 802.11 distributed coordination function, IEEE Journal on Selected Areas in Communications 18 (March 2000) 535-547.","DOI":"10.1109\/49.840210"},{"key":"394378_CR3","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1006\/jpdc.1999.1612","volume":"60","author":"L. Bononi","year":"2000","unstructured":"L. Bononi, M. Conti and L. Donatiello, Design and performance evaluation of distributed contention control (DCC) mechanism for IEEE 802.11 wireless local area network, Journal of Parallel and Distributed Computing 60 (April 2000) 407-430.","journal-title":"Journal of Parallel and Distributed Computing"},{"key":"394378_CR4","doi-asserted-by":"crossref","unstructured":"F. Cal\u00ec, M. Conti and E. Gregory, IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement, in: Proceedings of INFOCOM'98 (1998) pp. 142-149.","DOI":"10.1109\/INFCOM.1998.659648"},{"key":"394378_CR5","doi-asserted-by":"crossref","unstructured":"H.S. Chhaya and S. Gupta, Performance modeling of asynchronous data transfer methods of IEEE 802.11 MAC protocol, Wireless Networks 3 (March 1997) 217-234.","DOI":"10.1109\/98.542233"},{"key":"394378_CR6","unstructured":"T.S. Ho and K.C. Chen, Performance analysis of IEEE 802.11 CSMA\/ CA medium access control protocol, in: Proceedings of PIMRC'96, October 1996, pp. 407-411."},{"key":"394378_CR7","unstructured":"IEEE Standard 802.11, Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications, IEEE Press (November 1997)."},{"key":"394378_CR8","unstructured":"S. Saunders, P. Heywood, A. Dornan, L. Bruno and L. Allen, Wireless IP: Ready or not, here it comes, Data Communications (September 1999) 42-68."},{"key":"394378_CR9","unstructured":"T.J. Schriber, Simulation Using GPSS (Wiley, 1974)."},{"issue":"1","key":"394378_CR10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1023\/A:1013255927445","volume":"2","author":"J. Weinmiller","year":"1997","unstructured":"J. Weinmiller, M. Schlager, A. Festag and A. Wolisz, Performance study of access control in wireless LANs - IEEE 802.11 DFWMAC and ETSI RES 10 HIPERLAN, Mobile Networks and Applications 2(1) (1997) 55\u201376.","journal-title":"Mobile Networks and Applications"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1013977425774.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1013977425774\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1013977425774.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T21:56:00Z","timestamp":1752357360000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1013977425774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,4]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,4]]}},"alternative-id":["394378"],"URL":"https:\/\/doi.org\/10.1023\/a:1013977425774","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,4]]}}}