{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:53Z","timestamp":1750307513535,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,9,20]],"date-time":"2009-09-20T00:00:00Z","timestamp":1253404800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,9,20]]},"DOI":"10.1145\/1614320.1614328","type":"proceedings-article","created":{"date-parts":[[2009,9,22]],"date-time":"2009-09-22T14:18:08Z","timestamp":1253629088000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Order matters"],"prefix":"10.1145","author":[{"given":"Justin","family":"Manweiler","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Naveen","family":"Santhapuri","sequence":"additional","affiliation":[{"name":"Univ. of South Carolina, Columbia, SC, USA"}]},{"given":"Souvik","family":"Sen","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Romit","family":"Roy Choudhury","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Srihari","family":"Nelakuditi","sequence":"additional","affiliation":[{"name":"Univ. of South Carolina, Columbia, SC, USA"}]},{"given":"Kamesh","family":"Munagala","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,9,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Sniffing out the correct physical layer capture model in 802.11b,\" in ICNP","author":"Kochut A.","year":"2004","unstructured":"A. Kochut , \" Sniffing out the correct physical layer capture model in 802.11b,\" in ICNP , 2004 . A. Kochut et al., \"Sniffing out the correct physical layer capture model in 802.11b,\" in ICNP, 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.1029"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287767.1287772"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.222924"},{"key":"e_1_3_2_1_5_1","volume-title":"DAIR: A framework for managing enterprise wireless networks using desktop infrastructure,\" in HotNets IV","author":"Bahl P.","year":"2005","unstructured":"P. Bahl , \" DAIR: A framework for managing enterprise wireless networks using desktop infrastructure,\" in HotNets IV , 2005 . P. Bahl et al., \"DAIR: A framework for managing enterprise wireless networks using desktop infrastructure,\" in HotNets IV, 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287900"},{"key":"e_1_3_2_1_7_1","unstructured":"Meru Networks \"Revolutionizing wireless lan deployment economics with the meru networks radio switch \" in White Paper 2005.  Meru Networks \"Revolutionizing wireless lan deployment economics with the meru networks radio switch \" in White Paper 2005."},{"key":"e_1_3_2_1_8_1","volume-title":"Designing High Performance Enterprise Wi-Fi Networks,\" NSDI","author":"Murty R.","year":"2008","unstructured":"R. Murty , \" Designing High Performance Enterprise Wi-Fi Networks,\" NSDI , 2008 . R. Murty et al., \"Designing High Performance Enterprise Wi-Fi Networks,\" NSDI, 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368436.1368449"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159920"},{"key":"e_1_3_2_1_11_1","volume-title":"thesis","author":"Bicket J.C.","year":"2005","unstructured":"J.C. Bicket , \"Bit-rate selection in wireless networks,\" M. S. thesis , Massachusetts Institute of Technology , 2005 . J.C. Bicket, \"Bit-rate selection in wireless networks,\" M.S. thesis, Massachusetts Institute of Technology, 2005."},{"key":"e_1_3_2_1_12_1","unstructured":"Mythili Vutukuru Kyle Jamieson and Hari Balakrishnan \"Harnessing exposed terminals in wireless networks \" in NSDI 2008.   Mythili Vutukuru Kyle Jamieson and Hari Balakrishnan \"Harnessing exposed terminals in wireless networks \" in NSDI 2008."},{"key":"e_1_3_2_1_13_1","volume-title":"Modeling the 802.11 protocol under different capture and sensing capabilities,\" in Proc","author":"Durvy M.","year":"2007","unstructured":"M. Durvy , O. Dousse , and P. Thiran , \" Modeling the 802.11 protocol under different capture and sensing capabilities,\" in Proc . IEEE Infocom , 2007 . M. Durvy, O. Dousse, and P. Thiran, \"Modeling the 802.11 protocol under different capture and sensing capabilities,\" in Proc. IEEE Infocom, 2007."},{"key":"e_1_3_2_1_14_1","volume-title":"May","author":"Whitehouse K.","year":"2005","unstructured":"K. Whitehouse , \" Exploiting the capture effect for collision detection and recovery,\" in Emnets , May 2005 . K. Whitehouse et al, \"Exploiting the capture effect for collision detection and recovery,\" in Emnets, May 2005."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.218"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161131"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080148.1080160"},{"key":"e_1_3_2_1_18_1","volume-title":"RTSS\/CTSS: Mitigation of exposed terminals in static 802.11-based mesh networks,\" in WiMesh","author":"Mittal K.","year":"2006","unstructured":"K. Mittal and E. M. Belding , \" RTSS\/CTSS: Mitigation of exposed terminals in static 802.11-based mesh networks,\" in WiMesh , 2006 . K. Mittal and E. M. Belding, \"RTSS\/CTSS: Mitigation of exposed terminals in static 802.11-based mesh networks,\" in WiMesh, 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"A case for reordering transmissions in wireless networks,\" in HotNets VII","author":"N.","year":"2008","unstructured":"N. Santhapuri et. al, \"Message in message (mim) : A case for reordering transmissions in wireless networks,\" in HotNets VII , 2008 . N. Santhapuri et. al, \"Message in message (mim): A case for reordering transmissions in wireless networks,\" in HotNets VII, 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"An architecture for extensible wireless lans,\" in HotNets VII","author":"Murty R.","year":"2008","unstructured":"R. Murty , A. Wolman , J. Padhye , and M. Welsh , \" An architecture for extensible wireless lans,\" in HotNets VII , 2008 . R. Murty, A. Wolman, J. Padhye, and M. Welsh, \"An architecture for extensible wireless lans,\" in HotNets VII, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.749008"},{"key":"e_1_3_2_1_22_1","volume-title":"Estimation of link interference in static multi-hop wireless networks,\" in IMC","author":"Padhye J.","year":"2005","unstructured":"J. Padhye , \" Estimation of link interference in static multi-hop wireless networks,\" in IMC , 2005 . J. Padhye et al., \"Estimation of link interference in static multi-hop wireless networks,\" in IMC, 2005."},{"key":"e_1_3_2_1_23_1","volume-title":"RSS-based carrier sensing and interference estimation in 802.11 wireless networks,\" in SECON","author":"Lee J.","year":"2007","unstructured":"J. Lee , \" RSS-based carrier sensing and interference estimation in 802.11 wireless networks,\" in SECON , 2007 . J. Lee et al., \"RSS-based carrier sensing and interference estimation in 802.11 wireless networks,\" in SECON, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159921"}],"event":{"name":"MobiCom'09: Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Beijing China","acronym":"MobiCom'09"},"container-title":["Proceedings of the 15th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1614320.1614328","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1614320.1614328","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:18:05Z","timestamp":1750249085000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1614320.1614328"}},"subtitle":["transmission reordering in wireless networks"],"short-title":[],"issued":{"date-parts":[[2009,9,20]]},"references-count":24,"alternative-id":["10.1145\/1614320.1614328","10.1145\/1614320"],"URL":"https:\/\/doi.org\/10.1145\/1614320.1614328","relation":{},"subject":[],"published":{"date-parts":[[2009,9,20]]},"assertion":[{"value":"2009-09-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}