{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T12:37:08Z","timestamp":1762000628018,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,21]],"date-time":"2017-11-21T00:00:00Z","timestamp":1511222400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","award":["99999.013334\/2013-01"],"award-info":[{"award-number":["99999.013334\/2013-01"]}],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 131151"],"award-info":[{"award-number":["CNS 131151"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,21]]},"DOI":"10.1145\/3132114.3132123","type":"proceedings-article","created":{"date-parts":[[2017,11,15]],"date-time":"2017-11-15T13:36:37Z","timestamp":1510752997000},"page":"23-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["An Empirical Characterization of Internet Round-Trip Times"],"prefix":"10.1145","author":[{"given":"Daniel S.F.","family":"Alves","sequence":"first","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]},{"given":"Katia","family":"Obraczka","sequence":"additional","affiliation":[{"name":"University of California, Santa Cruz, Santa Cruz, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,11,21]]},"reference":[{"key":"e_1_3_2_1_3_1","first-page":"143","article-title":"Zipf's law and the Internet","volume":"3","author":"Adamic Lada A.","year":"2002","unstructured":"Lada A. Adamic and Bernardo A. Huberman . 2002 . Zipf's law and the Internet . Glottometrics 3 (2002), 143 -- 150 . http:\/\/www.hpl.hp.com\/research\/idl\/papers\/ranking\/adamicglottometrics.pdf Lada A. Adamic and Bernardo A. Huberman. 2002. Zipf's law and the Internet. Glottometrics 3 (2002), 143--150. http:\/\/www.hpl.hp.com\/research\/idl\/papers\/ranking\/adamicglottometrics.pdf","journal-title":"Glottometrics"},{"key":"e_1_3_2_1_4_1","volume-title":"March and","author":"CAIDA.","year":"2008","unstructured":"CAIDA. 2008 , 2010, 2012, 2014. The CAIDA UCSD IPv4 Routed \/24 Topology Dataset - January , March and September. (2008, 2010, 2012, 2014). http:\/\/www.caida.org\/data\/active\/ipv4_routed_24_topology_dataset.xml CAIDA. 2008, 2010, 2012, 2014. The CAIDA UCSD IPv4 Routed \/24 Topology Dataset - January, March and September. (2008, 2010, 2012, 2014). http:\/\/www.caida.org\/data\/active\/ipv4_routed_24_topology_dataset.xml"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/956993.956995"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1137\/070710111"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.650143"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations. Internetworking","volume":"3","author":"Danzig Peter B.","year":"1992","unstructured":"Peter B. Danzig , Sugih Jamin , Ram\u00f3n C\u00e1ceres , Danny J. Mitzel , and Deborah Estrin . 1992 . An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations. Internetworking : Research and Experience 3 (1992), 1 -- 26 . Peter B. Danzig, Sugih Jamin, Ram\u00f3n C\u00e1ceres, Danny J. Mitzel, and Deborah Estrin. 1992. An Empirical Workload Model for Driving Wide-Area TCP\/IP Network Simulations. Internetworking: Research and Experience 3 (1992), 1--26.","journal-title":"Research and Experience"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.944338"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/885651.781034"},{"key":"e_1_3_2_1_11_1","volume-title":"Distance Metrics in the Internet. In in IEEE International Telecommunications Symposium.","author":"Huffaker Bradley","year":"2002","unstructured":"Bradley Huffaker , Marina Fomenkov , Daniel J. Plummer , David Moore , and Kimberly Claffy . 2002 . Distance Metrics in the Internet. In in IEEE International Telecommunications Symposium. Bradley Huffaker, Marina Fomenkov, Daniel J. Plummer, David Moore, and Kimberly Claffy. 2002. Distance Metrics in the Internet. In in IEEE International Telecommunications Symposium."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2042726"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2004.827957"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.872577"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOT.2001.948886"},{"key":"e_1_3_2_1_17_1","unstructured":"Adrian Popescu. 2001. Traffic self-similarity. (2001).  Adrian Popescu. 2001. Traffic self-similarity. (2001)."},{"key":"e_1_3_2_1_18_1","volume-title":"Henderson","author":"Riley George F.","year":"2010","unstructured":"George F. Riley and Thomas R . Henderson . 2010 . The ns-3 Network Simulator. Springer Berlin Heidelberg , Berlin, Heidelberg, 15--34. https:\/\/doi.org\/10.1007\/978-3-642-12331-3_2 10.1007\/978-3-642-12331-3_2 George F. Riley and Thomas R. Henderson. 2010. The ns-3 Network Simulator. Springer Berlin Heidelberg, Berlin, Heidelberg, 15--34. https:\/\/doi.org\/10.1007\/978-3-642-12331-3_2"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2010.02.090702"},{"key":"e_1_3_2_1_20_1","unstructured":"Srinivas Shakkottai R. Srikant Nevil Brownlee Andre Broido and Kimberly Claffy. 2004. The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control. (2004).  Srinivas Shakkottai R. Srikant Nevil Brownlee Andre Broido and Kimberly Claffy. 2004. The RTT distribution of TCP flows in the Internet and its impact on TCP-based flow control. (2004)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1113361.1113368"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159928"}],"event":{"name":"MSWiM '17: 20th ACM Int'l Conference on Modelling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Miami Florida USA","acronym":"MSWiM '17"},"container-title":["Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132123","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132123","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132114.3132123","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:34Z","timestamp":1750217434000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132114.3132123"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,21]]},"references-count":20,"alternative-id":["10.1145\/3132114.3132123","10.1145\/3132114"],"URL":"https:\/\/doi.org\/10.1145\/3132114.3132123","relation":{},"subject":[],"published":{"date-parts":[[2017,11,21]]},"assertion":[{"value":"2017-11-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}