{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:27:16Z","timestamp":1754144836771,"version":"3.41.2"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,12]],"date-time":"2025-05-12T00:00:00Z","timestamp":1747008000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,12]]},"DOI":"10.1109\/noms57970.2025.11073697","type":"proceedings-article","created":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T17:40:26Z","timestamp":1752601226000},"page":"01-10","source":"Crossref","is-referenced-by-count":0,"title":["Congestion-Responsive Queuing for Internet Flows"],"prefix":"10.1109","author":[{"given":"Ike","family":"Kunze","sequence":"first","affiliation":[{"name":"RWTH Aachen University,Aachen,Germany"}]},{"given":"Constantin","family":"Sander","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Aachen,Germany"}]},{"given":"Mike","family":"Kosek","sequence":"additional","affiliation":[{"name":"Technical University of Munich,Munich,Germany"}]},{"given":"Lars","family":"Tissen","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Aachen,Germany"}]},{"given":"Jan","family":"Pennekamp","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Aachen,Germany"}]},{"given":"Klaus","family":"Wehrle","sequence":"additional","affiliation":[{"name":"RWTH Aachen University,Aachen,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"ref2","article-title":"BBR Congestion Control","volume-title":"IRTF, Internet-Draft","author":"Cardwell","year":"2022"},{"key":"ref3","article-title":"BBR Congestion Control","volume-title":"IETF, Internet-Draft","author":"Cardwell","year":"2024"},{"key":"ref4","article-title":"Specifying New Congestion Control Algorithms","volume-title":"IETF, Internet-Draft","author":"Duke","year":"2024"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3366693"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672223"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.23919\/tma.2019.8784684"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3651890.3672229"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624811"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015499"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2208917.2209336"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2015.2463121"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/infcom.2000.832269"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1049\/iet-net.2018.5089"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9330"},{"article-title":"A Fresh Look at ECN Traversal in the Wild","year":"2022","author":"Lim","key":"ref18"},{"article-title":"Dual Queue Coupled AQM: Deployable Very Low Queuing Delay for All","year":"2022","author":"De Schepper","key":"ref19"},{"issue":"1","key":"ref20","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10922-022-09706-z","article-title":"A Comprehensive Characterization of Threats Targeting Low-Latency Services: The Case of L4S","volume":"31","author":"Letourneau","year":"2022","journal-title":"Journal of Network and Systems Management"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9332"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/noms59830.2024.10575719"},{"article-title":"Source code for \u2019Congestion-Responsive Queuing for Internet Flows\u2019","year":"2025","author":"Kunze","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3168"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8257"},{"key":"ref26","article-title":"Prague Congestion Control","volume-title":"Internet-Draft","author":"De Schepper","year":"2024"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.17487\/rfc9331"},{"key":"ref28","doi-asserted-by":"crossref","DOI":"10.17487\/RFC7567","article-title":"IETF Recommendations Regarding Active Queue Management","volume-title":"RFC 7567","author":"Baker","year":"2015"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2003.1204258"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2005.05.012"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/wcnc.2007.795"},{"issue":"4","key":"ref32","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1007\/s11235-008-9104-2","article-title":"A dynamic quarantine scheme for controlling unresponsive TCP sessions","volume":"37","author":"Yi","year":"2008","journal-title":"Springer Telecommunication Systems"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/cit.2010.449"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/mascot.2001.948894"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2007.04.002"},{"key":"ref36","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-76481-8_19","article-title":"A First Look at QUIC in the Wild","volume-title":"Proceedings of the 2018 International Conference on Passive and Active Network Measurement (PAM)","author":"Ruth","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487826"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-72582-2_1","article-title":"Video Conferencing and Flow-Rate Fairness: A First Look at Zoom and the Impact of Flow-Queuing AQM","volume-title":"Proceedings of the 2021 International Conference on Passive and Active Network Measurement (PAM)","author":"Sander","year":"2021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/90.793002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3472305.3472321"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3390"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.17487\/rfc8546"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3089262.3089264"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544222"},{"issue":"11","key":"ref45","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2063166.2071893","article-title":"Bufferbloat: Dark Buffers in the Internet","volume":"9","author":"Gettys","year":"2011","journal-title":"ACM Queue"},{"year":"2024","key":"ref46","article-title":"Picoquic"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2019.2962607"}],"event":{"name":"NOMS 2025-2025 IEEE Network Operations and Management Symposium","start":{"date-parts":[[2025,5,12]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2025,5,16]]}},"container-title":["NOMS 2025-2025 IEEE Network Operations and Management Symposium"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11073532\/11073571\/11073697.pdf?arnumber=11073697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T05:35:03Z","timestamp":1752644103000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11073697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,12]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/noms57970.2025.11073697","relation":{},"subject":[],"published":{"date-parts":[[2025,5,12]]}}}