{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:25:59Z","timestamp":1725654359552},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/wowmom.2007.4351717","type":"proceedings-article","created":{"date-parts":[[2007,10,23]],"date-time":"2007-10-23T19:38:41Z","timestamp":1193168321000},"page":"1-12","source":"Crossref","is-referenced-by-count":21,"title":["Scalability Analysis of Rate Adaptation Techniques in Congested IEEE 802.11 Networks: An ORBIT Testbed Comparative Study"],"prefix":"10.1109","author":[{"given":"Kishore","family":"Ramachandran","sequence":"first","affiliation":[]},{"given":"Haris","family":"Kremo","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Gruteser","sequence":"additional","affiliation":[]},{"given":"Predrag","family":"Spasojevic","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Seskar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1145\/1023663.1023687","article-title":"IEEE 802.11 rate adaptation: a practical approach","author":"lacage","year":"2004","journal-title":"Proc ofACM MSWiM"},{"year":"0","key":"ref11","article-title":"Multiband Atheros Driver for WiFi"},{"key":"ref12","first-page":"146","article-title":"Robust rate adaptation for 802.11 wireless networks","author":"wong","year":"2006","journal-title":"Proc of ACM MobiCom"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1023783.1023787"},{"key":"ref14","first-page":"24","article-title":"Opportunistic media sccess for multirate ad hoc networks","author":"sadeghi","year":"2002","journal-title":"Proc of ACM MobiCom"},{"journal-title":"IEEE Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific require ments-Part 11 Wireless LAN Medium Access Control(MAC) and Physical Layer (PHY) Specifications IEEE-SA Standards Board","year":"1999","key":"ref15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.1996.567423"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064225"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208921"},{"year":"0","key":"ref19","article-title":"RSSI in MadWifi"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080107"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2003.1204534"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2007.061289"},{"key":"ref3","first-page":"185","article-title":"Self-management in chaotic wireless deployments","author":"akella","year":"2005","journal-title":"Proc of ACM MobiCom"},{"article-title":"Bit-rate selection in wireless networks","year":"2005","author":"bicket","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258379"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381700"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2005.1424763"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.316"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330140"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2069"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080150"},{"key":"ref20","article-title":"Orbit traffic generator","author":"wu","year":"0","journal-title":"WINLAB"},{"key":"ref22","article-title":"A quantitativemeasure of fairness and discrimination for resource allocation in shared computer systems","author":"jain","year":"1984","journal-title":"Technical Report DEC-TR-301 Tech Rep"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2004.1348115"},{"key":"ref23","article-title":"802.11 denial-of-service attacks: Real vulnerabilities and practical solutions","author":"bellardo","year":"2003","journal-title":"Proc of USENIX Security Symposium"},{"key":"ref26","article-title":"A method for predicitng the performance of rate-adaptice WLANs","author":"gopalakrishnan","year":"2004","journal-title":"Tech Rep TR-259"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497873"}],"event":{"name":"2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks","start":{"date-parts":[[2007,6,18]]},"location":"Espoo, Finland","end":{"date-parts":[[2007,6,21]]}},"container-title":["2007 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4351671\/4351672\/04351717.pdf?arnumber=4351717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T13:41:29Z","timestamp":1684071689000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4351717\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/wowmom.2007.4351717","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}