{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:47:17Z","timestamp":1750308437316,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T00:00:00Z","timestamp":1571788800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,23]]},"DOI":"10.1145\/3372938.3372952","type":"proceedings-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T03:54:01Z","timestamp":1578455641000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Analysis of TCP congestion management algorithms for Wireless Mesh Network"],"prefix":"10.1145","author":[{"given":"Kaoutar","family":"Bazi","sequence":"first","affiliation":[{"name":"Applied Mathematics and Computer Science laboratory, FST, Hassan 1 st University Settat, Morocco"}]},{"given":"Bouchaib","family":"Nassereddine","sequence":"additional","affiliation":[{"name":"Applied Mathematics and Computer Science laboratory, FST, Hassan 1 st University Settat, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1648530.1648733"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4597114"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Guido R. Hiertz; Sebastian Max; Rui Zhao; Dee Denteneer; Lars Berlemann Aug. 2007 \"Principles of IEEE 802.11s \" in proceedings of 16th International Conference on Computer Communications and Networks (ICCCN) Honolulu Hawaii USA. https:\/\/ieeexplore.ieee.org\/abstract\/document\/4317949  Guido R. Hiertz; Sebastian Max; Rui Zhao; Dee Denteneer; Lars Berlemann Aug. 2007 \"Principles of IEEE 802.11s \" in proceedings of 16th International Conference on Computer Communications and Networks (ICCCN) Honolulu Hawaii USA. https:\/\/ieeexplore.ieee.org\/abstract\/document\/4317949","DOI":"10.1109\/ICCCN.2007.4317949"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.09.003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"B. Nassereddine A. Maach S. Bennani \"The Scalability of The Hybrid Protocol in Wireless Mesh Network 802.11s\" 2009  B. Nassereddine A. Maach S. Bennani \"The Scalability of The Hybrid Protocol in Wireless Mesh Network 802.11s\" 2009","DOI":"10.1109\/MMS.2009.5409759"},{"key":"e_1_3_2_1_6_1","volume-title":"USA","author":"Jacobson V.","year":"1988","unstructured":"V. Jacobson and M. J. Karels , \" Congestion avoidance and control\", In ACM Computer Communication Review; Proceedings of the Sigcomm'88 Symposium, volume 18, pages 314--329, Stanford, CA , USA , August 1988 . V. Jacobson and M. J. Karels, \"Congestion avoidance and control\", In ACM Computer Communication Review; Proceedings of the Sigcomm'88 Symposium, volume 18, pages 314--329, Stanford, CA, USA, August 1988."},{"volume-title":"Menoufia journal of Electronic Engineering Research (MJEER)","author":"Torkey Hanaa A.","key":"e_1_3_2_1_7_1","unstructured":"Hanaa A. Torkey , Gamal M. Attiya and I. Z. Morsi , \" Performance Evaluation of End-to-End Congestion Control Protocols \", Menoufia journal of Electronic Engineering Research (MJEER) , Vol. 18 , no. 2, pp. 99--118, July 2008. Hanaa A. Torkey, Gamal M. Attiya and I. Z. Morsi, \"Performance Evaluation of End-to-End Congestion Control Protocols\", Menoufia journal of Electronic Engineering Research (MJEER), Vol. 18, no. 2, pp. 99--118, July 2008."},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/tools.ietf.org\/html\/rfc5681  https:\/\/tools.ietf.org\/html\/rfc5681"},{"key":"e_1_3_2_1_9_1","unstructured":"https:\/\/tools.ietf.org\/html\/rfc2581  https:\/\/tools.ietf.org\/html\/rfc2581"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.820427"},{"volume-title":"2003 Symposium on Applications and the Internet, 2003. Proceedings","year":"2003","key":"e_1_3_2_1_11_1","unstructured":"Feng, W., & Vanichpun, 28 February 2003 , \" Enabling compatibility between TCP Reno and TCP Vegas \", 2003 Symposium on Applications and the Internet, 2003. Proceedings , Orlando, FL, USA, USA Feng, W., & Vanichpun, 28 February 2003, \"Enabling compatibility between TCP Reno and TCP Vegas\", 2003 Symposium on Applications and the Internet, 2003. Proceedings, Orlando, FL, USA, USA"},{"key":"e_1_3_2_1_12_1","volume-title":"April","author":"Luigi","year":"2004","unstructured":"Luigi A. Grieco and Saverio Mascolo , April 2004 , \"Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control\", 34, Department of Electrical Engineering and Electronics, Polytechnic University of Bari , Italy Luigi A. Grieco and Saverio Mascolo, April 2004, \"Performance Evaluation and Comparison of Westwood+, New Reno, and Vegas TCP Congestion Control\", 34, Department of Electrical Engineering and Electronics, Polytechnic University of Bari, Italy"},{"key":"e_1_3_2_1_13_1","volume-title":"March","author":"STEVEN H. LOW, LARRY","year":"2002","unstructured":"STEVEN H. LOW, LARRY L. PETERSON AND LIMIN WANG , March 2002 , \"Understanding TCP Vegas: A Duality Model\", Journal of the ACM, 49, Computer Science, Princeton University , USA STEVEN H. LOW, LARRY L. PETERSON AND LIMIN WANG, March 2002, \"Understanding TCP Vegas: A Duality Model\", Journal of the ACM, 49, Computer Science, Princeton University, USA"},{"key":"e_1_3_2_1_14_1","unstructured":"Fahad Khan \"A Comparative Analysis of TCP Tahoe Reno New Reno SACK and Vegas\" www.academia.edu\/5989428  Fahad Khan \"A Comparative Analysis of TCP Tahoe Reno New Reno SACK and Vegas\" www.academia.edu\/5989428"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INTERNET.2009.10"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICII.2001.983548"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2006.254792"}],"event":{"name":"BDIoT'19: The 4th International Conference On Big Data and Internet of Things","acronym":"BDIoT'19","location":"Rabat Morocco"},"container-title":["Proceedings of the 4th International Conference on Big Data and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372938.3372952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:58Z","timestamp":1750268998000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372938.3372952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,23]]},"references-count":17,"alternative-id":["10.1145\/3372938.3372952","10.1145\/3372938"],"URL":"https:\/\/doi.org\/10.1145\/3372938.3372952","relation":{},"subject":[],"published":{"date-parts":[[2019,10,23]]},"assertion":[{"value":"2020-01-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}