{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:41Z","timestamp":1763468201754,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,7]],"date-time":"2014-09-07T00:00:00Z","timestamp":1410048000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1161490","CNS-1302620"],"award-info":[{"award-number":["CNS-1161490","CNS-1302620"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,7]]},"DOI":"10.1145\/2639108.2639113","type":"proceedings-article","created":{"date-parts":[[2014,9,5]],"date-time":"2014-09-05T19:09:15Z","timestamp":1409944155000},"page":"165-176","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["BBN"],"prefix":"10.1145","author":[{"given":"Wenjie","family":"Zhou","sequence":"first","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Tarun","family":"Bansal","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Prasun","family":"Sinha","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]},{"given":"Kannan","family":"Srinivasan","sequence":"additional","affiliation":[{"name":"The Ohio State University, Columbus, OH, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"BBN. Tech. rep. http:\/\/sites.google.com\/site\/anontechrep765\/.  BBN. Tech. rep. http:\/\/sites.google.com\/site\/anontechrep765\/."},{"key":"e_1_3_2_1_2_1","volume-title":"accessed","author":"OctoClock G","year":"2014","unstructured":"OctoClock - G , accessed Jan. 2014 . https:\/\/www.ettus.com\/product\/details\/OctoClock-G. OctoClock-G, accessed Jan. 2014. https:\/\/www.ettus.com\/product\/details\/OctoClock-G."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500449"},{"key":"e_1_3_2_1_4_1","first-page":"9","volume":"58","author":"Annapureddy V. S.","year":"2012","unstructured":"Annapureddy , V. S. , El Gamal , A. , and Veeravalli , V. V. Degrees of Freedom of Interference Channels with CoMP Transmission and Reception. IEEE Transactions on Information Theory 58 , 9 ( 2012 ), 5740--5760. Annapureddy, V. S., El Gamal, A., and Veeravalli, V. V. Degrees of Freedom of Interference Channels with CoMP Transmission and Reception. IEEE Transactions on Information Theory 58, 9 (2012), 5740--5760.","journal-title":"Degrees of Freedom of Interference Channels with CoMP Transmission and Reception. IEEE Transactions on Information Theory"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2565585.2565604"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500450"},{"key":"e_1_3_2_1_7_1","volume-title":"Interference Alignment and the Degrees of Freedom for the K User Interference Channel","author":"Cadambe V. R.","year":"2007","unstructured":"Cadambe , V. R. , and Jafar , S. A . Interference Alignment and the Degrees of Freedom for the K User Interference Channel . IEEE Transactions on Information Theory ( 2007 ). Cadambe, V. R., and Jafar, S. A. Interference Alignment and the Degrees of Freedom for the K User Interference Channel. IEEE Transactions on Information Theory (2007)."},{"key":"e_1_3_2_1_8_1","volume-title":"Interactive Interference Alignment. CoRR","author":"Geng Q.","year":"2013","unstructured":"Geng , Q. , Kannan , S. , and Viswanath , P . Interactive Interference Alignment. CoRR ( 2013 ). Geng, Q., Kannan, S., and Viswanath, P. Interactive Interference Alignment. CoRR (2013)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.904815"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402977"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592588"},{"key":"e_1_3_2_1_12_1","volume-title":"L. Cooperative Packet Recovery in Enterprise WLANs. In IEEE INFOCOM","author":"Gowda M.","year":"2013","unstructured":"Gowda , M. , Sen , S. , Roy Choudhury , R. , and S. , L. Cooperative Packet Recovery in Enterprise WLANs. In IEEE INFOCOM 2013 . Gowda, M., Sen, S., Roy Choudhury, R., and S., L. Cooperative Packet Recovery in Enterprise WLANs. In IEEE INFOCOM 2013."},{"key":"e_1_3_2_1_13_1","volume-title":"Interference Alignment: A New Look at Signal Dimensions in a Communication Network","author":"Jafar S. A.","year":"2011","unstructured":"Jafar , S. A. Interference Alignment: A New Look at Signal Dimensions in a Communication Network . Now Publishers , 2011 . Jafar, S. A. Interference Alignment: A New Look at Signal Dimensions in a Communication Network. Now Publishers, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.874407"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486034"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030621"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348555"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of USENIX NSDI","author":"Murty R.","year":"2008","unstructured":"Murty , R. , Padhye , J. , Chandra , R. , Wolman , A. , and Zill , B . Designing High Performance Enterprise Wi-Fi Networks . In Proc. of USENIX NSDI 2008 . Murty, R., Padhye, J., Chandra, R., Wolman, A., and Zill, B. Designing High Performance Enterprise Wi-Fi Networks. In Proc. of USENIX NSDI 2008."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of IEEE ISIT","author":"Nazer B.","year":"2009","unstructured":"Nazer , B. , and et al. Ergodic Interference Alignment . In Proc. of IEEE ISIT 2009 . Nazer, B., and et al. Ergodic Interference Alignment. In Proc. of IEEE ISIT 2009."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851204"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of ACM SIGCOMM","author":"Rahul H.","year":"2012","unstructured":"Rahul , H. , Kumar , S. , and Katabi , D . MegaMIMO: Scaling Wireless Capacity with User Demand . In Proc. of ACM SIGCOMM 2012 . Rahul, H., Kumar, S., and Katabi, D. MegaMIMO: Scaling Wireless Capacity with User Demand. In Proc. of ACM SIGCOMM 2012."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070213"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348551"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614353"},{"key":"e_1_3_2_1_25_1","unstructured":"Stanford Information Networking Group (SING). SING Datasets. http:\/\/sing.stanford.edu\/srikank\/datasets.html.  Stanford Information Networking Group (SING). SING Datasets. http:\/\/sing.stanford.edu\/srikank\/datasets.html."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.070511.100313"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592571"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287853.1287871"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500423.2500446"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535401"}],"event":{"name":"MobiCom'14: The 20th Annual International Conference on Mobile Computing and Networking","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Maui Hawaii USA","acronym":"MobiCom'14"},"container-title":["Proceedings of the 20th annual international conference on Mobile computing and networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639108.2639113","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2639108.2639113","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:12Z","timestamp":1750231152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2639108.2639113"}},"subtitle":["throughput scaling in dense enterprise WLANs with Bind Beamforming and Nulling"],"short-title":[],"issued":{"date-parts":[[2014,9,7]]},"references-count":30,"alternative-id":["10.1145\/2639108.2639113","10.1145\/2639108"],"URL":"https:\/\/doi.org\/10.1145\/2639108.2639113","relation":{},"subject":[],"published":{"date-parts":[[2014,9,7]]},"assertion":[{"value":"2014-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}