{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:43:46Z","timestamp":1725529426352},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2006.1633780","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"52-56","source":"Crossref","is-referenced-by-count":5,"title":["Layering As Optimization Decomposition: Framework and Examples"],"prefix":"10.1109","author":[{"family":"Mung Chiang","sequence":"first","affiliation":[]},{"given":"S.H.","family":"Low","sequence":"additional","affiliation":[]},{"given":"A.R.","family":"Calderbank","sequence":"additional","affiliation":[]},{"given":"J.C.","family":"Doyle","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Impact of imperfect scheduling in cross layer design","author":"lin","year":"2005","journal-title":"Proc IEEE InfoCom"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.252"},{"key":"18","article-title":"Jointly optimal congestion and contention control in wireless ad hoc networks","author":"lee","year":"2006","journal-title":"IEEE Communication Letters"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/90.993307"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1109\/JSAC.2006.872877","article-title":"Price-based distributed algorithm for optimal rate-reliability tradeoff in network utility maximization","author":"lee","year":"2006","journal-title":"IEEE Journal of Selected Areas in Communications"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818183"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254883"},{"key":"12","article-title":"TCP FAST: Motivation, architecture, algorithms, performance","author":"jin","year":"2004","journal-title":"Proc of IEEE INFOCOM"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815297"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"23","article-title":"Utility lifetime tradeoff in self regulating wireless sensor networks: A cross-layer design approach","author":"nama","year":"2006","journal-title":"Proc IEEE ICC"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345925"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.837349"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.257"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-8216-3","author":"srikant","year":"2004","journal-title":"The Mathematics of Internet Congestion Control"},{"key":"28","article-title":"Reverse engineering MAC","author":"tang","year":"2006","journal-title":"Proc IEEE WiOpt"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1062689.1062710"},{"key":"3","article-title":"Joint congestion control and medium access control for wireless ad hoc networks","author":"chen","year":"2005","journal-title":"Proc IEEE InfoCom"},{"key":"2","article-title":"Optimal joint congestion control, routing, and scheduling design for wireless ad hoc networks","author":"chen","year":"2006","journal-title":"Proc IEEE InfoCom"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.836118"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.850219"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498459"},{"key":"6","article-title":"Optimal routing, link Scheduling, and power control in multihop wireless networks","author":"cruz","year":"2003","journal-title":"Proc IEEE InfoCom"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2005.1494450"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2006.302293"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2004.831346"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.837347(410) 23"},{"year":"0","key":"9"},{"year":"0","key":"8"}],"event":{"name":"2006 IEEE Information Theory Workshop","location":"Punta del Este, Uruguay"},"container-title":["2006 IEEE Information Theory Workshop"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10885\/34255\/01633780.pdf?arnumber=1633780","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T06:02:17Z","timestamp":1497679337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1633780\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/itw.2006.1633780","relation":{},"subject":[]}}