{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:33:45Z","timestamp":1750307625933,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,27]],"date-time":"2008-10-27T00:00:00Z","timestamp":1225065600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,27]]},"DOI":"10.1145\/1454503.1454559","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T12:18:35Z","timestamp":1225196315000},"page":"333-340","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Improving flow level fairness and interactivity in WLANs using size-based scheduling policies"],"prefix":"10.1145","author":[{"given":"Guillaume","family":"Urvoy-Keller","sequence":"first","affiliation":[{"name":"Eurecom, Sophia-Antipolis, France"}]},{"given":"Andr\u00e9-Luc","family":"Beylot","sequence":"additional","affiliation":[{"name":"ENSEEIHT, Toulouse, France"}]}],"member":"320","published-online":{"date-parts":[[2008,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/49.840210"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1357023"},{"key":"e_1_3_2_1_3_1","first-page":"626","volume-title":"NETWORKING","author":"Bruno R.","year":"2004","unstructured":"Bruno , R. , Conti , M. , and Gregori , E . Analytical modeling of tcp clients in wi-fi hot spot networks . In NETWORKING ( 2004 ), pp. 626 -- 637 . Bruno, R., Conti, M., and Gregori, E. Analytical modeling of tcp clients in wi-fi hot spot networks. In NETWORKING (2004), pp. 626--637."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1164717.1164721"},{"key":"e_1_3_2_1_5_1","volume-title":"A Practical Guide to Heavy Tails","author":"Crovella M. E.","year":"1998","unstructured":"Crovella , M. E. , A Practical Guide to Heavy Tails . Chapman and Hall , New- York , 1998 , ch. 3. Crovella, M. E., et al. A Practical Guide to Heavy Tails. Chapman and Hall, New-York, 1998, ch. 3."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/762483.762486"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234161.1234162"},{"key":"e_1_3_2_1_9_1","volume-title":"GLOBECOM '03","author":"Hu M.","year":"2003","unstructured":"Hu , M. , Zhang , J. , and Sadowsky , J . Size-aided opportunistic scheduling in wireless networks . In GLOBECOM '03 . IEEE ( 2003 ). Hu, M., Zhang, J., and Sadowsky, J. Size-aided opportunistic scheduling in wireless networks. In GLOBECOM '03. IEEE (2003)."},{"key":"e_1_3_2_1_10_1","volume-title":"Queuing Systems, Volume II: Computer Applications","author":"Kleinrock L.","year":"1976","unstructured":"Kleinrock , L. Queuing Systems, Volume II: Computer Applications . Wiley , New York , 1976 . Kleinrock, L. Queuing Systems, Volume II: Computer Applications. Wiley, New York, 1976."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.44"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1023720.1023738"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2007.06.028"},{"key":"e_1_3_2_1_14_1","volume-title":"HSNMC'04 (July","author":"Rai I. A.","year":"2004","unstructured":"Rai , I. A. , Urvoy-Keller , and Biersack, E. W . Las scheduling approach to avoid bandwidth hogging in heterogeneous tcp networks . In HSNMC'04 (July 2004 ). Rai, I. A., Urvoy-Keller, and Biersack, E. W. Las scheduling approach to avoid bandwidth hogging in heterogeneous tcp networks. In HSNMC'04 (July 2004)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781055"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.13.7.466"},{"key":"e_1_3_2_1_17_1","volume-title":"INFOCOM 2003 (Apr.","author":"Sinha P.","year":"2003","unstructured":"Sinha , P. , Pilosof , S. , Ramjee , R. , Raz , D. , and Shavitt , Y . Understanding TCP fairness over wireless LAN . In INFOCOM 2003 (Apr. 2003 ). Sinha, P., Pilosof, S., Ramjee, R., Raz, D., and Shavitt, Y. Understanding TCP fairness over wireless LAN. In INFOCOM 2003 (Apr. 2003)."}],"event":{"name":"MSWiM '08: The 11th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["ACM Association for Computing Machinery","SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Vancouver British Columbia Canada","acronym":"MSWiM '08"},"container-title":["Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454503.1454559","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454503.1454559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:45:54Z","timestamp":1750250754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454503.1454559"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,27]]},"references-count":16,"alternative-id":["10.1145\/1454503.1454559","10.1145\/1454503"],"URL":"https:\/\/doi.org\/10.1145\/1454503.1454559","relation":{},"subject":[],"published":{"date-parts":[[2008,10,27]]},"assertion":[{"value":"2008-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}