{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:22Z","timestamp":1738777222686,"version":"3.37.0"},"reference-count":21,"publisher":"Academy Publisher","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.6.1526-1533","type":"journal-article","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T02:59:48Z","timestamp":1402369188000},"source":"Crossref","is-referenced-by-count":11,"title":["Leveraging SDN and OpenFlow to Mitigate Interference in Enterprise WLAN"],"prefix":"10.4304","volume":"9","author":[{"given":"Dong","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Ming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xu","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,6,9]]},"reference":[{"key":"ref1","article-title":"MACA-a new channel access method for packet radio","volume-title":"ARRL\/CRRL Amateur Radio Computer Networking Conf","author":"Karn","year":"1990","unstructured":"[1] P. Karn, \"MACA-a new channel access method for packet radio,\" in ARRL\/CRRL Amateur Radio Computer Networking Conf., 1990."},{"key":"ref2","first-page":"1516","article-title":"RTS\/CTS-induced congestion in ad hoc wireless LANs","volume-title":"Proc IEEE WCNC","volume":"3","author":"Ray","year":"2003","unstructured":"[2] S. Ray, J. Carruthers, and D. Starobinski, \"RTS\/CTS-induced congestion in ad hoc wireless LANs,\" in Proc. IEEE WCNC, vol. 3, 2003, pp. 1516\u20131521 vol.3."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.144"},{"key":"ref4","first-page":"2799","article-title":"Interference Aware (IA) MAC: an enhancement to IEEE 802.11b DCF","volume-title":"Proc IEEE Vehicular Technology Conf","author":"Cesana","year":"2003","unstructured":"[4] M. Cesana, D. Maniezzo, P. Bergamo, and M. Gerla, \"Interference Aware (IA) MAC: an enhancement to IEEE 802.11b DCF,\" in Proc. IEEE Vehicular Technology Conf., 2003, pp. 2799\u20132803."},{"key":"ref5","first-page":"2525","article-title":"On physical carrier sensing in wireless ad hoc networks","volume-title":"Proc IEEE INFOCOM","volume":"4","author":"Yang","year":"2005","unstructured":"[5] X. Yang and N. Vaidya, \"On physical carrier sensing in wireless ad hoc networks,\" in Proc. IEEE INFOCOM, vol. 4, 2005, pp. 2525\u20132535 vol. 4."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.8.11.2478-2490"},{"key":"ref7","first-page":"37","article-title":"WiFi-Nano: reclaiming wifi efficiency through 800 ns slots","volume-title":"Proc ACM MobiCom","author":"Magistretti","year":"2011","unstructured":"[7] E. Magistretti, K. K. Chintalapudi, B. Radunovic, and R. Ramjee, \"WiFi-Nano: reclaiming wifi efficiency through 800 ns slots,\" in Proc. ACM MobiCom, 2011, pp. 37\u201348."},{"key":"ref8","first-page":"159","article-title":"Zigzag decoding: combating hidden terminals in wireless networks","volume-title":"Proc ACM SIGCOMM","author":"Gollakota","year":"2008","unstructured":"[8] S. Gollakota and D. Katabi, \"Zigzag decoding: combating hidden terminals in wireless networks,\" in Proc. ACM SIGCOMM, 2008, pp. 159\u2013170."},{"key":"ref9","first-page":"25","article-title":"CSMA\/CN: carrier sense multiple access with collision notification","volume-title":"Proc ACM MobiCom","author":"Sen","year":"2010","unstructured":"[9] S. Sen, R. Roy Choudhury, and S. Nelakuditi, \"CSMA\/CN: carrier sense multiple access with collision notification,\" in Proc. ACM MobiCom, 2010, pp. 25\u201336."},{"key":"ref10","first-page":"1229","article-title":"MiFi: A framework for fairness and QoS assurance in current IEEE 802.11 networks with multiple access points","volume-title":"Proc IEEE INFOCOM","volume":"2","author":"Bejerano","year":"2004","unstructured":"[10] Y. Bejerano and R. Bhatia, \"MiFi: A framework for fairness and QoS assurance in current IEEE 802.11 networks with multiple access points,\" in Proc. IEEE INFOCOM, vol. 2, 2004, pp. 1229\u20131240 vol.2."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.01.1-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.6.7.1084-1090"},{"key":"ref14","first-page":"39","article-title":"Jigsaw: Solving the puzzle of enterprise 802.11 analysis","volume-title":"Proc ACM SIGCOMM","author":"Cheng","year":"2006","unstructured":"[16] Y.-C. Cheng, J. Bellardo, P. Benk\u00f6, A. C. Snoeren, G. M. Voelker, and S. Savage, \"Jigsaw: Solving the puzzle of enterprise 802.11 analysis,\" in Proc. ACM SIGCOMM, 2006, pp. 39\u201350."},{"key":"ref15","first-page":"227","article-title":"On the complexity of scheduling in wireless networks","volume-title":"Proc ACM MobiCom","author":"Sharma","year":"2006","unstructured":"[17] G. Sharma, R. R. Mazumdar, and N. B. Shroff, \"On the complexity of scheduling in wireless networks,\" in Proc. ACM MobiCom, 2006, pp. 227\u2013238."},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1460412.1460427","article-title":"A measurement study of interference modeling and scheduling in low-power wireless networks","volume-title":"Proc ACM SenSys","author":"Maheshwari","year":"2008","unstructured":"[19] R. Maheshwari, S. Jain, and S. R. Das, \"A measurement study of interference modeling and scheduling in low-power wireless networks,\" in Proc. ACM SenSys, 2008, pp. 141\u2013154."},{"key":"ref18","first-page":"1","article-title":"Online estimation of rf interference","volume-title":"Proc ACM CoNEXT","author":"Ahmed","year":"2008","unstructured":"[20] N. Ahmed, U. Ismail, S. Keshav, and K. Papagiannaki, \"Online estimation of rf interference,\" in Proc. ACM CoNEXT, 2008, pp. 1\u201312."},{"key":"ref19","first-page":"242","article-title":"A measurement-based approach to modeling link capacity in 802.11-based wireless networks","volume-title":"Proc ACM MobiCom","author":"Kashyap","year":"2007","unstructured":"[21] A. Kashyap, S. Ganguly, and S. R. Das, \"A measurement-based approach to modeling link capacity in 802.11-based wireless networks,\" in Proc. ACM MobiCom, 2007, pp. 242\u2013253."},{"key":"ref20","first-page":"297","article-title":"CENTAUR: Realizing the full potential of centralized wlans through a hybrid data path","volume-title":"Proc ACM MobiCom","author":"Shrivastava","year":"2009","unstructured":"[22] V. Shrivastava, N. Ahmed, S. Rayanchu, S. Banerjee, S. Keshav, K. Papagiannaki, and A. Mishra, \"CENTAUR: Realizing the full potential of centralized wlans through a hybrid data path,\" in Proc. ACM MobiCom, 2009, pp. 297\u2013308."},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.1109\/GLOCOMW.2012.6477567","article-title":"CloudMAC: An OpenFlow-based architecture for 802.11 MAC Layer processing in the cloud","volume-title":"Proc IEEE Broadband Wireless Access Workshop","author":"Dely","year":"2012","unstructured":"[25] P. Dely, A. Kassler, J. Vestin, N. Bayer, H. Einsiedler, and C. Peylo, \"CloudMAC: An OpenFlow-based architecture for 802.11 MAC Layer processing in the cloud,\" in Proc. IEEE Broadband Wireless Access Workshop, 2012."}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:06:36Z","timestamp":1738775196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,9]]},"references-count":21,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2014,6,9]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.6.1526-1533","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,6,9]]}}}