{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:28Z","timestamp":1750307548980,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,26]],"date-time":"2009-10-26T00:00:00Z","timestamp":1256515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,26]]},"DOI":"10.1145\/1641913.1641923","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"70-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Using active queue management to enhance performance in IEEE802.11"],"prefix":"10.1145","author":[{"given":"Gianluigi","family":"Pibiri","sequence":"first","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]},{"given":"Ciar\u00e1n","family":"Mc Goldrick","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]},{"given":"Meriel","family":"Huggard","sequence":"additional","affiliation":[{"name":"Trinity College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2009,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. 5th Int Network Conference (INC 2005","author":"Astuti D.","year":"2005","unstructured":"D. Astuti and M. Kojo . Evaluating the behaviour of Peer-to-Peer IP traffic in wireless access networks . In Proc. 5th Int Network Conference (INC 2005 ), Samos, Greece , July 2005 . D. Astuti and M. Kojo. Evaluating the behaviour of Peer-to-Peer IP traffic in wireless access networks. In Proc. 5th Int Network Conference (INC 2005), Samos, Greece, July 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.923940"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2002.801399"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.720870"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCECE.2003.1226229"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2001.916670"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACRIM.2001.953709"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2007.562"},{"key":"e_1_3_2_1_10_1","first-page":"22","volume-title":"Proc. Internet Measurement Conference 2005","author":"Jardosh A.","year":"2005","unstructured":"A. Jardosh , K. Ramachandran , K. Almeroth , and E. Belding-Royer . Understanding congestion in IEEE 802.11b wireless networks - revised . In Proc. Internet Measurement Conference 2005 , pp 22 -- 25 , 2005 . A. Jardosh, K. Ramachandran, K. Almeroth, and E. Belding-Royer. Understanding congestion in IEEE 802.11b wireless networks - revised. In Proc. Internet Measurement Conference 2005, pp 22--25, 2005."},{"key":"e_1_3_2_1_11_1","first-page":"249","volume-title":"Proc. Network Computing and Applications, 2003","author":"Jun J.","year":"2003","unstructured":"J. Jun , P. Peddabachagari , and M. Sichitiu . Theoretical maximum throughput of IEEE 802.11 and its applications . In Proc. Network Computing and Applications, 2003 . IEEE NCA, pp 249 -- 256 , 2003 . J. Jun, P. Peddabachagari, and M. Sichitiu. Theoretical maximum throughput of IEEE 802.11 and its applications. In Proc. Network Computing and Applications, 2003. IEEE NCA, pp 249--256, 2003."},{"key":"e_1_3_2_1_12_1","volume-title":"Downlink and uplink resource allocation in IEEE 802.11 wireless lans","author":"Kim S. W.","year":"2005","unstructured":"S. W. Kim , B.-S. Kim , and Y. Fang . Downlink and uplink resource allocation in IEEE 802.11 wireless lans . IEEE Transactions on Vehicular Technology , 54(1):320--327, 2005 . S. W. Kim, B.-S. Kim, and Y. Fang. Downlink and uplink resource allocation in IEEE 802.11 wireless lans. IEEE Transactions on Vehicular Technology, 54(1):320--327, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/964723.383069"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2005.136"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.1043"},{"key":"e_1_3_2_1_16_1","volume-title":"Thomson","author":"Mullet G. J.","year":"2006","unstructured":"G. J. Mullet . Wireless Telecommunications Systems and Networks . Thomson , Delmar Learning , 2006 . G. J. Mullet. Wireless Telecommunications Systems and Networks. Thomson, Delmar Learning, 2006."},{"key":"e_1_3_2_1_17_1","unstructured":"T. N. S. ns 2 and Manuals. http:\/\/www.isi.edu\/nsnam\/ns\/.  T. N. S. ns 2 and Manuals. http:\/\/www.isi.edu\/nsnam\/ns\/."},{"key":"e_1_3_2_1_18_1","volume-title":"Capacity estimation of VoIP channels on wireless networks. Available in http:\/\/www. ece. utexas. edu\/wireless\/EE381K11 Spring03\/projects\/11.3. pdf","author":"Patel T.","year":"2003","unstructured":"T. Patel , V. Ogale , S. Baek , N. Cui , and R. Park . Capacity estimation of VoIP channels on wireless networks. Available in http:\/\/www. ece. utexas. edu\/wireless\/EE381K11 Spring03\/projects\/11.3. pdf , 2003 . T. Patel, V. Ogale, S. Baek, N. Cui, and R. Park. Capacity estimation of VoIP channels on wireless networks. Available in http:\/\/www. ece. utexas. edu\/wireless\/EE381K11 Spring03\/projects\/11.3. pdf, 2003."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. 13th IEEE International Conference on Networks, 1:307--312","author":"Tiwari A.","year":"2005","unstructured":"A. Tiwari and A. Sahoo . Providing QoS support in OSPF based best effort network . In Proc. 13th IEEE International Conference on Networks, 1:307--312 , 2005 . A. Tiwari and A. Sahoo. Providing QoS support in OSPF based best effort network. In Proc. 13th IEEE International Conference on Networks, 1:307--312, 2005."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.061089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2007.788"},{"key":"e_1_3_2_1_22_1","first-page":"460","volume-title":"Proc. IEEE 13th International Conference on Computer Communications and Networks, ICCCN","author":"Yi S.","year":"2004","unstructured":"S. Yi , M. Kappes , S. Garg , X. Deng , G. Kesidis , and C. R. Das . Proxy-RED: an AQM scheme for wireless local area networks . In Proc. IEEE 13th International Conference on Computer Communications and Networks, ICCCN , pages 460 -- 465 , 2004 . S. Yi, M. Kappes, S. Garg, X. Deng, G. Kesidis, and C. R. Das. Proxy-RED: an AQM scheme for wireless local area networks. In Proc. IEEE 13th International Conference on Computer Communications and Networks, ICCCN, pages 460--465, 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1002\/dac.v17:4"}],"event":{"name":"MSWiM '09: The 12th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Tenerife, Canary Islands Spain","acronym":"MSWiM '09"},"container-title":["Proceedings of the 4th ACM workshop on Performance monitoring and measurement of heterogeneous wireless and wired networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641913.1641923","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1641913.1641923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:35Z","timestamp":1750249415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1641913.1641923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,26]]},"references-count":23,"alternative-id":["10.1145\/1641913.1641923","10.1145\/1641913"],"URL":"https:\/\/doi.org\/10.1145\/1641913.1641923","relation":{},"subject":[],"published":{"date-parts":[[2009,10,26]]},"assertion":[{"value":"2009-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}