{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:59:39Z","timestamp":1729663179900,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,6]]},"DOI":"10.1109\/wiopt.2009.5291645","type":"proceedings-article","created":{"date-parts":[[2009,12,18]],"date-time":"2009-12-18T18:16:59Z","timestamp":1261160219000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Techniques for simulation of realistic infrastructure wireless network traffic"],"prefix":"10.1109","author":[{"given":"C.","family":"Phil","sequence":"first","affiliation":[]},{"given":"D.","family":"Sicker","sequence":"additional","affiliation":[]},{"given":"D.","family":"Grunwald","sequence":"additional","affiliation":[]},{"given":"S.","family":"Singh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"0","author":"qualnet","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1140086.1140094"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.272"},{"key":"15","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/1159913.1159928","article-title":"Realistic and responsive network traffic generation","author":"vishwanath","year":"2006","journal-title":"SIGCOMM '06 Proceedings of the 2006 conference on Applications technologies architectures and protocols for computer communications"},{"journal-title":"Private coorespondance with k vishwanath","year":"2009","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832178"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028798"},{"key":"11","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/507553.507554","article-title":"Gismo: A generator of internet streaming media objects and workloads","volume":"29","author":"jin","year":"2001","journal-title":"SIGMETRICS Perform Eval Rev"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190339"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080150"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72606-7_107"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/70.678453"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/T-UFFC.1987.26997"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1030194.1015482"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/513800.513823"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4751-z"},{"year":"2009","key":"27","article-title":"ns-2"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1981.0312"},{"year":"0","key":"2"},{"year":"0","key":"10"},{"key":"1","first-page":"227","article-title":"Evaluating distributed systems: Does background traffic matter?","author":"vishwanath","year":"2008","journal-title":"ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277897"},{"article-title":"The mistaken axioms of wireless-network research","year":"2003","author":"kotz","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/2682899"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/643114.643117"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.644510"}],"event":{"name":"2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks - WiOpt 2009","start":{"date-parts":[[2009,6,23]]},"location":"Seoul","end":{"date-parts":[[2009,6,27]]}},"container-title":["2009 7th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5286911\/5291544\/05291645.pdf?arnumber=5291645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T02:57:19Z","timestamp":1497841039000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5291645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2009.5291645","relation":{},"subject":[],"published":{"date-parts":[[2009,6]]}}}