{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:36:49Z","timestamp":1761061009556,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/icnc47757.2020.9049757","type":"proceedings-article","created":{"date-parts":[[2020,3,31]],"date-time":"2020-03-31T05:22:45Z","timestamp":1585632165000},"page":"10-16","source":"Crossref","is-referenced-by-count":2,"title":["Performance Evaluation of In-network Packet Retransmissions using Markov Chains"],"prefix":"10.1109","author":[{"given":"Runa","family":"Barik","sequence":"first","affiliation":[]},{"given":"Michael","family":"Welzl","sequence":"additional","affiliation":[]},{"given":"Peyman","family":"Teymoori","sequence":"additional","affiliation":[]},{"given":"Safiqul","family":"Islam","sequence":"additional","affiliation":[]},{"given":"Stein","family":"Gjessing","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Patterns in Network Architecture A Return to Fundamentals","year":"2007","author":"day","key":"ref10"},{"journal-title":"A Recursive Network Architecture","year":"2006","author":"touch","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3226588"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2810156.2810169"},{"journal-title":"Hop-by-hop best effort link layer reliability in Named Data Networking","year":"2016","author":"vusirikala","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2808296"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062047"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2017.8116493"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2001.923629"},{"key":"ref19","first-page":"175","article-title":"Modeling the burstiness of TCP","author":"dirnopoulos","year":"2004","journal-title":"MASCOTS 2004"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc4015"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3522"},{"key":"ref6","article-title":"RACK: a time-based fast loss detection algorithm for TCP","author":"cheng","year":"2019","journal-title":"IETF Internet-Draft draft-ietf-tcpm-rack-05"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5682"},{"key":"ref8","article-title":"LOOPS Generic Information Set","author":"welzl","year":"2019","journal-title":"Internet Engineering Task Force Internet-Draft draft-welzl-loops-gen-info-01"},{"key":"ref7","article-title":"LOOPS (Localized Optimizations on Path Segments) Problem Statement and Opportunities for Network-Assisted Performance Enhancement","author":"yizhou","year":"2019","journal-title":"Internet Engineering Task Force Internet-Draft draft-li-tsvwg-loops-problem-opportunities-03"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-013-0552-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/357401.357402"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278535"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2016.12"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72685-2_23"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1145\/1071690.1064240","article-title":"Why is the internet traffic bursty in short time scales?","volume":"33","author":"jiang","year":"2005","journal-title":"ACM Sigmetrics Performance Evaluation Review"}],"event":{"name":"2020 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2020,2,17]]},"location":"Big Island, HI, USA","end":{"date-parts":[[2020,2,20]]}},"container-title":["2020 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9042208\/9049476\/09049757.pdf?arnumber=9049757","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T00:17:06Z","timestamp":1656375426000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9049757\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/icnc47757.2020.9049757","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}