{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:04Z","timestamp":1750307824948,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,10]],"date-time":"2007-09-10T00:00:00Z","timestamp":1189382400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,10]]},"DOI":"10.1145\/1378063.1378112","type":"proceedings-article","created":{"date-parts":[[2008,6,17]],"date-time":"2008-06-17T13:49:02Z","timestamp":1213710542000},"page":"288-295","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["An analytical flow control scheme for real-time traffic in wireless mesh network"],"prefix":"10.1145","author":[{"given":"Yongqiang","family":"Liu","sequence":"first","affiliation":[{"name":"Peking University"}]},{"given":"Tong","family":"Zhao","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Zhongyi","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Wei","family":"Yan","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Xiaoming","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University"}]}],"member":"320","published-online":{"date-parts":[[2007,9,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.12.001"},{"key":"e_1_3_2_1_2_1","volume-title":"TCP-friendly Unicast Rate-based Flow Control. Note sent to end-to-end-interest mailing list","author":"Mahdavi J.","year":"1997","unstructured":"J. Mahdavi and S. Floyd . TCP-friendly Unicast Rate-based Flow Control. Note sent to end-to-end-interest mailing list , 1997 . J. Mahdavi and S. Floyd. TCP-friendly Unicast Rate-based Flow Control. Note sent to end-to-end-interest mailing list, 1997."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080106"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2600523"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347397"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.842137"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818187"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-9859-3","volume-title":"Convex Analysis and Nonlinear Optimization: Theory and Examples","author":"Borwein J. M.","year":"2000","unstructured":"J. M. Borwein and A. S. Lewis . Convex Analysis and Nonlinear Optimization: Theory and Examples . New York : Springer , 2000 . J. M. Borwein and A. S. Lewis. Convex Analysis and Nonlinear Optimization: Theory and Examples. New York: Springer, 2000."},{"key":"e_1_3_2_1_12_1","volume-title":"Bandwidth Allocation in Ad-Hoc Networks: A Price-Based Approach. in Proc. of INFOCOM","author":"Qiu Y.","year":"2003","unstructured":"Y. Qiu and P. Marbach . Bandwidth Allocation in Ad-Hoc Networks: A Price-Based Approach. in Proc. of INFOCOM , 2003 . Y. Qiu and P. Marbach. Bandwidth Allocation in Ad-Hoc Networks: A Price-Based Approach. in Proc. of INFOCOM, 2003."},{"key":"e_1_3_2_1_13_1","first-page":"96","author":"Tan Kun","year":"2005","unstructured":"Kun Tan , Qian Zhang , Feng Jiang , China Xuemin Shen . Sensor and Ad Hoc Communications and Networks 26-- 29 Sept. , 2005 Page(s): 96 - 106 Kun Tan, Qian Zhang, Feng Jiang, China Xuemin Shen. Sensor and Ad Hoc Communications and Networks 26--29 Sept., 2005 Page(s):96 - 106","journal-title":"Sensor and Ad Hoc Communications and Networks 26--"},{"key":"e_1_3_2_1_14_1","unstructured":"K. Fall. The ns Manual. http:\/\/www.isi.edu\/nsnam\/ns\/nsdocumentation.htm  K. Fall. The ns Manual. http:\/\/www.isi.edu\/nsnam\/ns\/nsdocumentation.htm"},{"key":"e_1_3_2_1_15_1","volume-title":"IETF RFC","author":"Perkins C.","year":"2003","unstructured":"C. Perkins , E. Belding-Royer , S. Das , Ad hoc On-demand Distance Vector (AODV) Routing , IETF RFC 3561, July 2003 . C. Perkins, E. Belding-Royer, S. Das, Ad hoc On-demand Distance Vector (AODV) Routing, IETF RFC 3561, July 2003."}],"event":{"name":"MC07: 4th Mobility Conference: International Conference on Mobile Technology, Application & Systems","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","Singapore Polytechnic"],"location":"Singapore","acronym":"MC07"},"container-title":["Proceedings of the 4th international conference on mobile technology, applications, and systems and the 1st international symposium on Computer human interaction in mobile technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1378063.1378112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:50Z","timestamp":1750255070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1378063.1378112"}},"subtitle":["from theoretic model to practical mechanism"],"short-title":[],"issued":{"date-parts":[[2007,9,10]]},"references-count":14,"alternative-id":["10.1145\/1378063.1378112","10.1145\/1378063"],"URL":"https:\/\/doi.org\/10.1145\/1378063.1378112","relation":{},"subject":[],"published":{"date-parts":[[2007,9,10]]},"assertion":[{"value":"2007-09-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}