{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:27Z","timestamp":1772163927536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,6,26]],"date-time":"2006-06-26T00:00:00Z","timestamp":1151280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,6,26]]},"DOI":"10.1145\/1140277.1140284","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T12:53:01Z","timestamp":1153745581000},"page":"39-50","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Determining the end-to-end throughput capacity in multi-hop networks"],"prefix":"10.1145","author":[{"given":"Yan","family":"Gao","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"Dah-Ming","family":"Chiu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]},{"given":"John C.S.","family":"Lui","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong"}]}],"member":"320","published-online":{"date-parts":[[2006,6,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"e_1_3_2_1_2_1","volume-title":"On the capacity of hybrid wireless networks,\" in IEEE Infocom","author":"Liu B.","year":"2003","unstructured":"B. Liu , Z. Liu , and D. Towsley , \" On the capacity of hybrid wireless networks,\" in IEEE Infocom , 2003 . B. Liu, Z. Liu, and D. Towsley, \"On the capacity of hybrid wireless networks,\" in IEEE Infocom, 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.939000"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2005.41"},{"key":"e_1_3_2_1_5_1","volume-title":"Taiwan)","author":"Xu K.","year":"2002","unstructured":"K. Xu , M. Gerla , and S. Bae , \" How effective is the ieee 802.11 rts\/cts handshake in ad hoc network,\" in IEEE GlobeCom'02, (Taipei , Taiwan) , November 2002 . K. Xu, M. Gerla, and S. Bae, \"How effective is the ieee 802.11 rts\/cts handshake in ad hoc network,\" in IEEE GlobeCom'02, (Taipei, Taiwan), November 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_3_2_1_7_1","volume-title":"March","author":"Kumar A.","year":"2005","unstructured":"A. Kumar , E. Altman , D. Miorandi , and M. Goyal , \" New insights from a fixed point analysis of single cell ieee802.11 wireless lans,\" in Proceedings of the IEEE Infocom , March 2005 . A. Kumar, E. Altman, D. Miorandi, and M. Goyal, \"New insights from a fixed point analysis of single cell ieee802.11 wireless lans,\" in Proceedings of the IEEE Infocom, March 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"October","author":"Ng C.","year":"2004","unstructured":"C. Ng and S. Liew , \" Offered load control in ieee802.11 multi-hop ad-hoc networks,\" in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor System , October 2004 . C. Ng and S. Liew, \"Offered load control in ieee802.11 multi-hop ad-hoc networks,\" in The 1st IEEE International Conference on Mobile Ad-hoc and Sensor System, October 2004."},{"key":"e_1_3_2_1_9_1","volume-title":"USA)","author":"Couto D. D.","year":"2002","unstructured":"D. D. Couto , D. Aguayo , B. Chambers , and R. Morris , \" Performance of multihop wireless networks : Shortest path is not enough,\" in In Proceedings of the First Workshop on Hot Topics in Networks (HotNets1), (New Jersey , USA) , October 2002 . D. D. Couto, D. Aguayo, B. Chambers, and R.Morris, \"Performance of multihop wireless networks: Shortest path is not enough,\" in In Proceedings of the First Workshop on Hot Topics in Networks (HotNets1), (New Jersey, USA), October 2002."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/381677.381684"},{"key":"e_1_3_2_1_11_1","unstructured":"The Network Simulator-ns2 www.isi.edu\/nsnam\/ns.  The Network Simulator-ns2 www.isi.edu\/nsnam\/ns."},{"key":"e_1_3_2_1_12_1","first-page":"2006","article-title":"Performance analysis of contention based medium access control protocols","author":"Sharma G.","year":"2006","unstructured":"G. Sharma , A. Ganesh , and P. Key , \" Performance analysis of contention based medium access control protocols ,\" in INFOCOM 2006 , 2006 . G. Sharma, A. Ganesh, and P. Key, \"Performance analysis of contention based medium access control protocols,\" in INFOCOM 2006, 2006.","journal-title":"INFOCOM"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345925"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.837347(410) 23"},{"key":"e_1_3_2_1_15_1","volume-title":"Estimation of link interference in static multi-hop wireless networks,\" in IMC","author":"Padhye J.","year":"2005","unstructured":"J. Padhye , S. Agarwal , V. Padmanabhan , L. Qiu , A. Rao , and B. Zill , \" Estimation of link interference in static multi-hop wireless networks,\" in IMC , 2005 . J. Padhye, S. Agarwal, V. Padmanabhan, L. Qiu, A. Rao, and B. Zill, \"Estimation of link interference in static multi-hop wireless networks,\" in IMC, 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/938985.938993"}],"event":{"name":"SIGMETRICS06: 2006 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems","location":"Saint Malo France","acronym":"SIGMETRICS06","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the joint international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140277.1140284","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1140277.1140284","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:24Z","timestamp":1750244784000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1140277.1140284"}},"subtitle":["methodology and applications"],"short-title":[],"issued":{"date-parts":[[2006,6,26]]},"references-count":16,"alternative-id":["10.1145\/1140277.1140284","10.1145\/1140277"],"URL":"https:\/\/doi.org\/10.1145\/1140277.1140284","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1140103.1140284","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2006,6,26]]},"assertion":[{"value":"2006-06-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}