{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:23:45Z","timestamp":1725449025488},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/wd.2012.6402874","type":"proceedings-article","created":{"date-parts":[[2013,1,9]],"date-time":"2013-01-09T19:28:28Z","timestamp":1357759708000},"page":"1-3","source":"Crossref","is-referenced-by-count":2,"title":["Enhancing AQM performance on wireless networks"],"prefix":"10.1109","author":[{"given":"Gianluigi","family":"Pibiri","sequence":"first","affiliation":[]},{"given":"Ciaran","family":"Mc Goldrick","sequence":"additional","affiliation":[]},{"given":"Meriel","family":"Huggard","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"638","article-title":"Vq-red: An efficient virtual queue management approach to improve fairness in infrastructure wlan","author":"lin","year":"2005","journal-title":"Local Computer Networks 2005 30th Anniversary The IEEE Conference on"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061089"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.857110"},{"key":"16","first-page":"460","article-title":"Proxy-RED: An AQM scheme for wireless local area networks","author":"yi","year":"2004","journal-title":"Computer Communications and Networks 2004 ICCCN 2004 Proceedings 13th International Conference on"},{"journal-title":"Wireless Telecommunications Systems and Networks","year":"2006","author":"mullet","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.562"},{"journal-title":"Forecasting Methods and Applications","year":"1998","author":"makridakis","key":"11"},{"key":"12","first-page":"249","article-title":"Theoretical maximum throughput of IEEE 802. 11 and its applications","author":"jun","year":"2003","journal-title":"Proc Network Computing and Applications 2003 IEEE NCA"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/65.923940"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2309"},{"journal-title":"Notes on the Holt-Winters Procedure","year":"1993","author":"floyd","key":"10"},{"year":"0","key":"7"},{"key":"6","first-page":"249","article-title":"Theoretical maximum throughput of ieee 802. 11 and its applications","author":"jun","year":"2003","journal-title":"Network Computing and Applications 2003 NCA 2003"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1641913.1641923"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801399"},{"year":"0","key":"9"},{"journal-title":"WG Part II Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Medium Access Control (MAC) Quality of Service (QoS) Enhancements","year":"2004","key":"8"}],"event":{"name":"2012 IFIP Wireless Days (WD)","start":{"date-parts":[[2012,11,21]]},"location":"Dublin, Ireland","end":{"date-parts":[[2012,11,23]]}},"container-title":["2012 IFIP Wireless Days"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6387977\/6402798\/06402874.pdf?arnumber=6402874","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T14:31:12Z","timestamp":1490193072000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6402874\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/wd.2012.6402874","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}