{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T15:37:08Z","timestamp":1759073828367},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,3]]},"DOI":"10.1109\/ciss.2008.4558579","type":"proceedings-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T04:14:03Z","timestamp":1215576843000},"page":"509-514","source":"Crossref","is-referenced-by-count":39,"title":["Throughput of random access without message passing"],"prefix":"10.1109","author":[{"given":"Alexandre","family":"Proutiere","sequence":"first","affiliation":[]},{"given":"Yung","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Mung","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/BF02523693"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.817330"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"crossref","DOI":"10.1145\/1375457.1375459","article-title":"performance of random multi-access algorithms, an asymptotic approach","author":"bordenave","year":"2008","journal-title":"Proceedings of ACM SIGMETRICS"},{"key":"3","article-title":"wireless scheduling with o(1) complexity for mhop interference model","author":"yi","year":"2008","journal-title":"Proceedings of IEEE ICC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254920"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140283"},{"key":"10","article-title":"throughput guarantees in maximal matching in wireless networks","author":"chaporkar","year":"2005","journal-title":"Proceedings of the 43rd Annual Allerton Conference on Communication Control and Computing"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.11"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.376968"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374624"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176992089"},{"key":"8","article-title":"packing approach to compare slotted and non-slotted medium access control","author":"durvy","year":"2006","journal-title":"Proceedings of IEEE Infocom"}],"event":{"name":"2008 42nd Annual Conference on Information Sciences and Systems (CISS)","start":{"date-parts":[[2008,3,19]]},"location":"Princeton, NJ, USA","end":{"date-parts":[[2008,3,21]]}},"container-title":["2008 42nd Annual Conference on Information Sciences and Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4555640\/4558476\/04558579.pdf?arnumber=4558579","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T09:45:31Z","timestamp":1497779131000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4558579\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,3]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/ciss.2008.4558579","relation":{},"subject":[],"published":{"date-parts":[[2008,3]]}}}