{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:20:59Z","timestamp":1729642859350,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/iscc.2002.1021691","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T22:04:13Z","timestamp":1056578653000},"page":"283-290","source":"Crossref","is-referenced-by-count":2,"title":["TCP with sender-based delay control"],"prefix":"10.1109","author":[{"given":"H.T.","family":"Kung","sequence":"first","affiliation":[]},{"family":"Koan-Sin Tan","sequence":"additional","affiliation":[]},{"family":"Pai-Hsiang Hsiao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383069"},{"key":"35","first-page":"2000","article-title":"Understanding the end-to-end performance impact of red in a heterogeneous environment","author":"zhang","year":"2000","journal-title":"Cornell CS Technical Report"},{"key":"17","article-title":"Active delay control for tcp","author":"hsiao","year":"2001","journal-title":"Proceedings of Global Internet 2001"},{"key":"18","first-page":"379","article-title":"Stochastic models of computer communication systems","volume":"47","author":"kelly","year":"1985","journal-title":"Journal of the Royal Statistical Society Series B"},{"journal-title":"VINT Network Simulator-ns","year":"1997","key":"33"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/52324.52356"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/205511.205520"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/378344.378372"},{"key":"13","first-page":"43","article-title":"Equation-based congestion control for unicast applications","author":"floyd","year":"2000","journal-title":"Proceedings of SIGCOMM 2000"},{"key":"14","article-title":"The newrenomodification to tcp's fast recovery algorithm","volume":"2582","author":"floyd","year":"1999","journal-title":"RFC"},{"key":"11","first-page":"115","article-title":"On traffic phase effects in packet-switched gateways","volume":"3","author":"floyd","year":"1992","journal-title":"Internetworking Research and Experience"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/90.251892"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/263109.263154"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.659662"},{"key":"22","article-title":"Tcp selective acknowledgement options","author":"mathis","year":"1996","journal-title":"RFC 2018"},{"journal-title":"Trends in wide area IP traffic patterns","year":"2000","author":"mccreay","key":"23"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.1997.643715"},{"journal-title":"Scalable TCP congestion control","year":"1999","author":"morris","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.752153"},{"key":"27","first-page":"303","article-title":"Modeling TCP throughput: A simple model and its empirical validation","author":"padhye","year":"1998","journal-title":"Proceedings of ACM SIGCOMM' 98"},{"key":"28","article-title":"On inferring TCP behavior","author":"padhye","year":"2001","journal-title":"Proceedings of SIGCOMM 2001"},{"key":"29","article-title":"Transmission control protocol","volume":"793","author":"postel","year":"1981","journal-title":"RFC"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1998.659661"},{"key":"2","doi-asserted-by":"crossref","DOI":"10.1109\/65.923940","article-title":"REM: Active queue management","author":"athuraliya","year":"2001","journal-title":"IEEE Network"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/90.793002"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3042"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.1999.801938"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.752150"},{"key":"6","article-title":"Techniques for eliminating packet loss in congested TCP\/IP networks","volume":"4","author":"feng","year":"1997","journal-title":"Tech Rep CSE-TR-349-97"},{"journal-title":"TCP\/IP Illustrated Volume 1 The Protocols","year":"1993","author":"richard stevens","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/0169-7552(89)90019-6"},{"key":"31","article-title":"A proposal to add explicit congestion notification (ecn) to ip","volume":"2481","author":"ramakrishnan","year":"1999","journal-title":"RFC"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2309"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/205511.205512"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/122431.122434"}],"event":{"name":"ISCC 2002 Seventh International Symposium on Computers and Communications","acronym":"ISCC-02","location":"Taormina-Giardini Naxos, Italy"},"container-title":["Proceedings ISCC 2002 Seventh International Symposium on Computers and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7956\/21983\/01021691.pdf?arnumber=1021691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T22:42:43Z","timestamp":1497566563000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1021691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/iscc.2002.1021691","relation":{},"subject":[]}}