{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:56:41Z","timestamp":1771473401348,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T00:00:00Z","timestamp":1764028800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,25]]},"DOI":"10.23919\/pemwn67312.2025.11304109","type":"proceedings-article","created":{"date-parts":[[2025,12,29]],"date-time":"2025-12-29T18:36:33Z","timestamp":1767033393000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Towards Effective QoS in Named Data Networking: A Markov-Based Priority Queueing Approach"],"prefix":"10.23919","author":[{"given":"Salwa","family":"Abdelwahed","sequence":"first","affiliation":[{"name":"University of Gabes,IReSCoMath Research Lab,Tunisia"}]},{"given":"Fatma","family":"Somaa","sequence":"additional","affiliation":[{"name":"University of Gabes,IReSCoMath Research Lab,Tunisia"}]},{"given":"Haifa","family":"Touati","sequence":"additional","affiliation":[{"name":"University of Gabes,IReSCoMath Research Lab,Tunisia"}]},{"given":"Mohamed","family":"Hadded","sequence":"additional","affiliation":[{"name":"Abu Dhabi University,UAE"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Distributing Quality of Service (QoS) Policies in Name-based Networks","volume-title":"45th IEEE International Conference on Distributed Computing Systems","author":"Ryo"},{"key":"ref2","article-title":"Considerations in the Development of a QoS Architecture for CCNx-Like Information-Centric Networking Protocols","author":"David R","year":"2021","journal-title":"IETF ICNRG"},{"key":"ref3","article-title":"NFD Developer\u2019s Guide, Technical Report NDN-0021","author":"Afanasyev","year":"2018","journal-title":"Dept. Comput. Sci"},{"key":"ref4","first-page":"1","article-title":"A Survey of Quality-of-Service and Quality of-Experience Provisioning in Information-Centric Networks","author":"Nazmus","year":"2025","journal-title":"Network"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps45667.2019.9024596"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.vehcom.2021.100351"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070566"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3357150.3357404"},{"key":"ref9","article-title":"An Intelligent Token Bucket-Based Queue Management Strategy for QoS of Named-Data Networking","volume-title":"Thesis","author":"Eric","year":"2022"},{"key":"ref10","first-page":"1968","article-title":"Cooperative detection and protection for interest flooding attacks in named data networking","author":"Kun","year":"2016","journal-title":"International Journal of Communication Systems"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.03.038"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-6374-4_8"},{"key":"ref13","first-page":"132","article-title":"LSTM-based congestion detection in named data networks","volume-title":"International Conference on Intelligent Systems Design and Applications","author":"Salwa"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656887"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2016.070566"}],"event":{"name":"2025 14th IFIP\/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)","location":"Paris, France","start":{"date-parts":[[2025,11,25]]},"end":{"date-parts":[[2025,11,27]]}},"container-title":["2025 14th IFIP\/IEEE International Conference on Performance Evaluation and Modeling in Wired and Wireless Networks (PEMWN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11304000\/11304013\/11304109.pdf?arnumber=11304109","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T06:38:46Z","timestamp":1767076726000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11304109\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,25]]},"references-count":15,"URL":"https:\/\/doi.org\/10.23919\/pemwn67312.2025.11304109","relation":{},"subject":[],"published":{"date-parts":[[2025,11,25]]}}}