{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:26:37Z","timestamp":1725557197459},"reference-count":26,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/netsoft.2016.7502430","type":"proceedings-article","created":{"date-parts":[[2016,7,4]],"date-time":"2016-07-04T21:03:38Z","timestamp":1467666218000},"page":"336-344","source":"Crossref","is-referenced-by-count":0,"title":["Application specific optimization: Rethinking protocol layering and standards"],"prefix":"10.1109","author":[{"given":"John","family":"Peng","sequence":"first","affiliation":[]},{"given":"Stephen G.","family":"Wilson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.6"},{"journal-title":"Wit An Infrastructure for Wireless Palmtop Computing","year":"1994","author":"watson","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/HOTOS.1995.513449"},{"journal-title":"Telecommunication Networks","year":"2011","author":"iannone","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2559899.2560327"},{"key":"ref15","article-title":"Enabling MAC Protocol Implementations on Software-Defined Radios","author":"nychis","year":"2009","journal-title":"NSDI"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1201\/9780203317495"},{"journal-title":"TR-043 Protocols at the U Interface for Accessing Data Networks using ATM\/DSL Tech rep The Broadband Forum","year":"2001","key":"ref18"},{"journal-title":"T1E1 4 Spectral Com-patability Cable Crosstalk Parameters and Models","year":"1997","author":"valenti","key":"ref19"},{"journal-title":"Joint Source-channel Decoding A Cross-layer Perspective with Applications in Video Broadcasting","year":"2009","author":"duhamel","key":"ref4"},{"key":"ref3","article-title":"A mobile video traffic analysis: Badly designed video clients can waste network bandwidth","author":"nam","year":"2013","journal-title":"Workshops (GC Wkshps)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.062613.00160"},{"journal-title":"Performance Enhancing Proxies Intended to Mitigate Link-Related Degradations","year":"2001","author":"border","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7018201"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"ref2","article-title":"Mobile video is inefficient: A traffic analysis","author":"nam","year":"2013","journal-title":"Columbia University AcademicCommons"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1555392.1555394"},{"key":"ref1","article-title":"Cross-layer design tutorial","author":"aune","year":"2004","journal-title":"Norwegian University of Science and Technology Dept of Electronics and Telecommunications"},{"journal-title":"Performance Comparison of FEC\/Interleave Choices with DMT for ADSL Tech rep Chicago ANSI Contribution T1E1 4\/93-091","year":"1993","author":"zogakis","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.374437"},{"journal-title":"Shedding Some Light on Coding Gain","year":"2004","author":"powell","key":"ref21"},{"article-title":"Understanding digital subscriber line technology","year":"1999","author":"starr","key":"ref24"},{"year":"2015","key":"ref23","article-title":"Cisco Visual Networking Index: Forecast and Methodology, 2014 2019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1980.tb03041.x"},{"journal-title":"ITU-T 992 3 Asymmetric digitalsubscriber line transceivers 2 (ADSL2)","year":"2009","key":"ref25"}],"event":{"name":"2016 IEEE NetSoft Conference and Workshops (NetSoft)","start":{"date-parts":[[2016,6,6]]},"location":"Seoul, South Korea","end":{"date-parts":[[2016,6,10]]}},"container-title":["2016 IEEE NetSoft Conference and Workshops (NetSoft)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7497397\/7502392\/07502430.pdf?arnumber=7502430","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,30]],"date-time":"2016-09-30T02:36:54Z","timestamp":1475203014000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7502430\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/netsoft.2016.7502430","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}