{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T08:27:48Z","timestamp":1765700868979,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T00:00:00Z","timestamp":1257292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,11,4]]},"DOI":"10.1145\/1644893.1644903","type":"proceedings-article","created":{"date-parts":[[2009,11,4]],"date-time":"2009-11-04T18:29:35Z","timestamp":1257359375000},"page":"76-89","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":54,"title":["TCP revisited"],"prefix":"10.1145","author":[{"given":"Feng","family":"Qian","sequence":"first","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Alexandre","family":"Gerber","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]},{"given":"Zhuoqing Morley","family":"Mao","sequence":"additional","affiliation":[{"name":"University of Michigan, Ann Arbor, MI, USA"}]},{"given":"Subhabrata","family":"Sen","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]},{"given":"Oliver","family":"Spatscheck","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]},{"given":"Walter","family":"Willinger","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research, Florham Park, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,11,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Detours Binary Interception of Win32 Functions. http:\/\/research.microsoft.com\/en-us\/projects\/detours\/.  Detours Binary Interception of Win32 Functions. http:\/\/research.microsoft.com\/en-us\/projects\/detours\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Nmap Free Security Scanner for Network Exploration and Security Audits. http:\/\/nmap.org\/.  Nmap Free Security Scanner for Network Exploration and Security Audits. http:\/\/nmap.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"p0f a Versatile OS Fingerprinting Tool. http:\/\/lcamtuf.coredump.cx\/p0f.shtml.  p0f a Versatile OS Fingerprinting Tool. http:\/\/lcamtuf.coredump.cx\/p0f.shtml."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267903.1267906"},{"key":"e_1_3_2_1_5_1","first-page":"3390","author":"Allman M.","year":"2002","unstructured":"M. Allman , S. Floyd , and C. Partridge . Increasing TCP's Initial Window. RFC 3390 , 2002 . M. Allman, S. Floyd, and C. Partridge. Increasing TCP's Initial Window. RFC 3390, 2002.","journal-title":"Increasing TCP's Initial Window. RFC"},{"key":"e_1_3_2_1_6_1","first-page":"2581","author":"Allman M.","year":"1999","unstructured":"M. Allman , V. Paxson , and W. R. Stevens . TCP Congestion Control. RFC 2581 , 1999 . M. Allman, V. Paxson, and W. R. Stevens. TCP Congestion Control. RFC 2581, 1999.","journal-title":"TCP Congestion Control. RFC"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505209"},{"key":"e_1_3_2_1_8_1","first-page":"675","author":"Cerf V.","year":"1974","unstructured":"V. Cerf , Y. Dalal , and C. Sunshine . Specification of Internet Transmission Control Program. RFC 675 , 1974 . V. Cerf, Y. Dalal, and C. Sunshine. Specification of Internet Transmission Control Program. RFC 675, 1974.","journal-title":"Specification of Internet Transmission Control Program. RFC"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251086.1251087"},{"key":"e_1_3_2_1_10_1","first-page":"50","author":"K.","year":"2006","unstructured":"K. chan Lan and J. Heidemann. Measurement Study of Correlations of Internet Flow Characteristics. Computer Networks , 50 , 2006 . K. chan Lan and J. Heidemann. Measurement Study of Correlations of Internet Flow Characteristics. Computer Networks, 50, 2006.","journal-title":"Lan and J. Heidemann. Measurement Study of Correlations of Internet Flow Characteristics. Computer Networks"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298313"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863972"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/235160.235162"},{"key":"e_1_3_2_1_15_1","first-page":"3649","year":"2003","unstructured":"S. Floyd. HighSpeed TCP for Large Congestion Windows. RFC 3649 , 2003 . S. Floyd. HighSpeed TCP for Large Congestion Windows. RFC 3649, 2003.","journal-title":"S. Floyd. HighSpeed TCP for Large Congestion Windows. RFC"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354571"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571725"},{"key":"e_1_3_2_1_20_1","volume-title":"Measurement and Analysis of Large-Scale Network File System Workloads. In USENIX Annual Technical Conference","author":"Leung A. W.","year":"2008","unstructured":"A. W. Leung , S. Pasupathy , G. Goodson , and E. L. Miller . Measurement and Analysis of Large-Scale Network File System Workloads. In USENIX Annual Technical Conference , 2008 . A. W. Leung, S. Pasupathy, G. Goodson, and E. L. Miller. Measurement and Analysis of Large-Scale Network File System Workloads. In USENIX Annual Technical Conference, 2008."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948239"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/571697.571724"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019256"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028835"},{"key":"e_1_3_2_1_25_1","volume-title":"Discrete-Time Signal Processing","author":"Oppenheim A. V.","year":"1999","unstructured":"A. V. Oppenheim , R. W. Schafer , and J. R. Buck . Discrete-Time Signal Processing ( 2 nd Edition). Prentice Hall , 1999 . A. V. Oppenheim, R. W. Schafer, and J. R. Buck. Discrete-Time Signal Processing (2nd Edition). Prentice Hall, 1999.","edition":"2"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of ACM SIGCOMM","author":"Padhye J.","year":"2001","unstructured":"J. Padhye and S. Floyd . Identifying the TCP Behavior of Web Servers . In Proc. of ACM SIGCOMM , 2001 . J. Padhye and S. Floyd. Identifying the TCP Behavior of Web Servers. In Proc. of ACM SIGCOMM, 2001."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263160"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/263105.263160"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263155"},{"key":"e_1_3_2_1_30_1","first-page":"2988","year":"2000","unstructured":"V. Paxson and Mark Allman. Computing TCP's Retransmission Timer. RFC 2988 , 2000 . V. Paxson and Mark Allman. Computing TCP's Retransmission Timer. RFC 2988, 2000.","journal-title":"V. Paxson and Mark Allman. Computing TCP's Retransmission Timer. RFC"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316225"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.642356"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31966-5_10"},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. of IEEE INFOCOM","author":"Wei D. X.","year":"2004","unstructured":"D. X. Wei , C. Jin , S. H. Low , and S. Hegde . FAST TCP: motivation, architecture, algorithms, performance . In Proc. of IEEE INFOCOM , 2004 . D. X. Wei, C. Jin, S. H. Low, and S. Hegde. FAST TCP: motivation, architecture, algorithms, performance. In Proc. of IEEE INFOCOM, 2004."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633055"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICOSP.2004.1442141"}],"event":{"name":"IMC '09: Internet Measurement Conference","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"],"location":"Chicago Illinois USA","acronym":"IMC '09"},"container-title":["Proceedings of the 9th ACM SIGCOMM conference on Internet measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644903","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1644893.1644903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:18Z","timestamp":1750250478000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1644893.1644903"}},"subtitle":["a fresh look at TCP in the wild"],"short-title":[],"issued":{"date-parts":[[2009,11,4]]},"references-count":35,"alternative-id":["10.1145\/1644893.1644903","10.1145\/1644893"],"URL":"https:\/\/doi.org\/10.1145\/1644893.1644903","relation":{},"subject":[],"published":{"date-parts":[[2009,11,4]]},"assertion":[{"value":"2009-11-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}