{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:56:46Z","timestamp":1725494206373},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/wiopt.2006.1666466","type":"proceedings-article","created":{"date-parts":[[2006,8,8]],"date-time":"2006-08-08T22:44:03Z","timestamp":1155077043000},"page":"1-11","source":"Crossref","is-referenced-by-count":12,"title":["Reverse Engineering MAC"],"prefix":"10.1109","author":[{"family":"Ao Tang","sequence":"first","affiliation":[]},{"family":"Jang-Won Lee","sequence":"additional","affiliation":[]},{"family":"Jianwei Huang","sequence":"additional","affiliation":[]},{"family":"Mung Chiang","sequence":"additional","affiliation":[]},{"given":"A.R.","family":"Calderbank","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.858448"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/0317054"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01149170"},{"journal-title":"A Course in Game Theory","year":"1994","author":"osborne","key":"15"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-8216-3","author":"srikant","year":"2004","journal-title":"The Mathematics of Internet Congestion Control"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1356985"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1209181"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"journal-title":"Nonlinear programming Athena Scientific","year":"1995","author":"bertsekas","key":"2"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-1029-0","author":"abraham","year":"1988","journal-title":"Manifolds Tensor Analysis and Applications"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.815297"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"journal-title":"Stochastic Programming","year":"1994","author":"kall","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/90.993304"},{"journal-title":"Numerical techniques for stochastic optimization","year":"1980","author":"ermoliev","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.252"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/90.993307"}],"event":{"name":"2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks","location":"Boston, MA, USA"},"container-title":["2006 4th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/11052\/34865\/01666466.pdf?arnumber=1666466","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T08:22:19Z","timestamp":1497687739000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1666466\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2006.1666466","relation":{},"subject":[]}}