{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T00:06:23Z","timestamp":1749859583422,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wcnc.2005.1424868","type":"proceedings-article","created":{"date-parts":[[2005,4,25]],"date-time":"2005-04-25T18:49:51Z","timestamp":1114454991000},"page":"2264-2269","source":"Crossref","is-referenced-by-count":17,"title":["Rate-based transport control for mobile ad hoc networks"],"prefix":"10.1109","volume":"4","author":[{"family":"Hongqiang Zhai","sequence":"first","affiliation":[]},{"family":"Xiang Chen","sequence":"additional","affiliation":[]},{"family":"Yuguang Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/381677.381684"},{"year":"0","key":"17"},{"year":"0","journal-title":"The Network Simulator ns-2","key":"18"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1016\/S1389-1286(99)00138-3"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/633025.633035"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/513800.513827"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/938985.938988"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1109\/49.932702"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/501416.501425"},{"doi-asserted-by":"publisher","key":"21","DOI":"10.1109\/98.904895"},{"key":"20","article-title":"Ad hoc On Demand Distance Vector (AODV) routing","volume":"3561","author":"perkins","year":"0","journal-title":"IETF RFC"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1109\/ICDCSW.2004.1284118"},{"key":"23","doi-asserted-by":"crossref","DOI":"10.1145\/347057.347397","article-title":"Equationbased congestion control for unicast applications","author":"floyd","year":"2000","journal-title":"Proc ACM Sigcomm"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1109\/TWC.2005.857994"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1109\/QSHINE.2004.1"},{"key":"3","article-title":"How bad TCP can perform in mobile AdHoc networks","author":"fu","year":"2002","journal-title":"IEEE Symposium on Computers and Communications"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/CJECE.2004.1425806"},{"key":"10","article-title":"Limitations of TCP-ELFN for ad hoc networks","author":"monks","year":"2000","journal-title":"Proc MoMuC"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1109\/ICC.2003.1204525"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/35.925681"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/MCSA.1999.749276"},{"key":"5","article-title":"TCP over wireless multihop protocols: Simulation and experiments","author":"gerla","year":"1999","journal-title":"Proc IEEE ICC"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/INFCOM.2003.1209197"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1145\/313451.313540"},{"doi-asserted-by":"publisher","key":"8","DOI":"10.1109\/98.904897"}],"event":{"name":"IEEE Wireless Communications and Networking Conference, 2005","location":"New Orleans, LA, USA"},"container-title":["IEEE Wireless Communications and Networking Conference, 2005"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9744\/30731\/01424868.pdf?arnumber=1424868","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T18:47:55Z","timestamp":1497638875000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1424868\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2005.1424868","relation":{},"subject":[]}}