{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T19:00:43Z","timestamp":1767985243263,"version":"3.49.0"},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2020,2,14]],"date-time":"2020-02-14T00:00:00Z","timestamp":1581638400000},"content-version":"am","delay-in-days":319,"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Performance Evaluation"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1016\/j.peva.2018.11.002","type":"journal-article","created":{"date-parts":[[2018,12,23]],"date-time":"2018-12-23T11:38:59Z","timestamp":1545565139000},"page":"64-85","update-policy":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Conflict graph-based model for IEEE 802.11 networks: A Divide-and-Conquer approach"],"prefix":"10.1016","volume":"130","author":[{"given":"M.","family":"Stojanova","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7272-1195","authenticated-orcid":false,"given":"T.","family":"Begin","sequence":"additional","affiliation":[]},{"given":"A.","family":"Busson","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.peva.2018.11.002_b1","series-title":"IEEE Standard 802.11-2016","article-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","author":"IEEE Computer Society LAN MAN Standards\u00a0Committee","year":"2016"},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b2","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1109\/49.840210","article-title":"Performance analysis of the IEEE 802.11 distributed coordination function","volume":"18","author":"Bianchi","year":"2000","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.peva.2018.11.002_b3","series-title":"INFOCOM\u201998. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, Vol. 1","first-page":"142","article-title":"IEEE 802.11 wireless LAN: Capacity analysis and protocol enhancement","author":"Cali","year":"1998"},{"key":"10.1016\/j.peva.2018.11.002_b4","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.adhoc.2013.12.008","article-title":"A comprehensive analysis of IEEE 802.11 DCF heterogeneous traffic sources","volume":"16","author":"Kosek-Szott","year":"2014","journal-title":"Ad Hoc Netw."},{"key":"10.1016\/j.peva.2018.11.002_b5","series-title":"International Conference on Advances in Communication, Network and Computing","first-page":"66","article-title":"New analytical model for non-saturation throughput analysis of IEEE 802.11 DCF","author":"Gupta","year":"2014"},{"issue":"10","key":"10.1016\/j.peva.2018.11.002_b6","doi-asserted-by":"crossref","first-page":"3256","DOI":"10.1109\/TWC.2011.072511.101227","article-title":"Single hop IEEE 802.11 DCF analysis revisited: Accurate modeling of channel access delay and throughput for saturated and unsaturated traffic cases","volume":"10","author":"Felemban","year":"2011","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b7","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1109\/TNET.2015.2432053","article-title":"Making 802.11 DCF near-optimal: Design, implementation, and evaluation","volume":"24","author":"Lee","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"10.1016\/j.peva.2018.11.002_b8","first-page":"1","article-title":"An analytic model for throughput optimal distributed coordination function (TO-DCF)","author":"Fitzgerald","year":"2017","journal-title":"Telecommun. Syst."},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b9","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1007\/s11276-012-0474-8","article-title":"Analytical models for understanding space, backoff, and flow correlation in CSMA wireless networks","volume":"19","author":"Shi","year":"2013","journal-title":"Wirel. Netw."},{"key":"10.1016\/j.peva.2018.11.002_b10","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.peva.2015.12.003","article-title":"Performance analysis of multi-hop flows in IEEE 802.11 networks: A flexible and accurate modeling framework","volume":"96","author":"Begin","year":"2016","journal-title":"Perform. Eval."},{"key":"10.1016\/j.peva.2018.11.002_b11","series-title":"INFOCOM, 2012 Proceedings IEEE","first-page":"2309","article-title":"Closed-form throughput expressions for CSMA networks with collisions and hidden terminals","author":"Nardelli","year":"2012"},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b12","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1109\/TIT.2008.2011427","article-title":"Self-organization properties of CSMA\/CA systems and their consequences on fairness","volume":"55","author":"Durvy","year":"2009","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b13","doi-asserted-by":"crossref","first-page":"960","DOI":"10.1109\/TNET.2009.2035046","article-title":"A distributed CSMA algorithm for throughput and utility maximization in wireless networks","volume":"18","author":"Jiang","year":"2010","journal-title":"IEEE\/ACM Trans. Netw. (ToN)"},{"issue":"3","key":"10.1016\/j.peva.2018.11.002_b14","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1109\/TCOM.1987.1096769","article-title":"Throughput analysis in multihop CSMA packet radio networks","volume":"35","author":"Boorstyn","year":"1987","journal-title":"IEEE Trans. Commun."},{"key":"10.1016\/j.peva.2018.11.002_b15","series-title":"INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings IEEE, Vol. 1","first-page":"23","article-title":"Throughput modelling and fairness issues in CSMA\/CA based ad-hoc networks","author":"Wang","year":"2005"},{"key":"10.1016\/j.peva.2018.11.002_b16","series-title":"Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks","first-page":"1","article-title":"Study of the impact of asymmetry and carrier sense mechanism in IEEE 802.11 multi-hops networks through a basic case","author":"Chaudet","year":"2004"},{"key":"10.1016\/j.peva.2018.11.002_b17","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.jnca.2017.03.001","article-title":"Improving fairness between close Wi-Fi access points","volume":"87","author":"Ducourthial","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.peva.2018.11.002_b18","series-title":"IEEE International Conference on Communications (ICC)","first-page":"6101","article-title":"Throughput analysis of CSMA wireless networks with finite offered-load","author":"Kai","year":"2013"},{"key":"10.1016\/j.peva.2018.11.002_b19","article-title":"The capacity of wireless CSMA\/CA networks","author":"Laufer","year":"2015","journal-title":"IEEE Trans. Netw."},{"issue":"1\u20132","key":"10.1016\/j.peva.2018.11.002_b20","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s11134-012-9300-3","article-title":"Performance of CSMA in multi-channel wireless networks","volume":"72","author":"Bonald","year":"2012","journal-title":"Queueing Syst."},{"key":"10.1016\/j.peva.2018.11.002_b21","series-title":"Computers and Communications, 2008. ISCC 2008. IEEE Symposium on","first-page":"130","article-title":"Rate adaptation algorithms for IEEE 802.11 networks: A survey and comparison","author":"Biaz","year":"2008"},{"issue":"6","key":"10.1016\/j.peva.2018.11.002_b22","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MWC.2013.6704471","article-title":"WiFi on steroids: 802.11 ac and 802.11 ad","volume":"20","author":"Verma","year":"2013","journal-title":"IEEE Wirel. Commun."},{"key":"10.1016\/j.peva.2018.11.002_b23","series-title":"Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement","article-title":"Estimation of link interference in static multi-hop wireless networks","author":"Padhye","year":"2005"},{"key":"10.1016\/j.peva.2018.11.002_b24","series-title":"INFOCOM","article-title":"Modeling per-flow throughput and capturing starvation in CSMA multi-hop wireless networks","author":"Garetto","year":"2006"},{"key":"10.1016\/j.peva.2018.11.002_b25","unstructured":"Cisco Visual Netwotking Index, https:\/\/linproxy.fan.workers.dev:443\/https\/www.cisco.com\/c\/en\/us\/solutions\/service-provider\/visual-networking-index-vni\/index.html."},{"key":"10.1016\/j.peva.2018.11.002_b26","unstructured":"The Network Simulator ns-3, https:\/\/linproxy.fan.workers.dev:443\/https\/www.nsnam.org\/."},{"key":"10.1016\/j.peva.2018.11.002_b27","series-title":"IEEE International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 17","article-title":"Conflict graph-based Markovian model to estimate throughput in unsaturated IEEE 802.11 networks","author":"Stojanova","year":"2017"},{"key":"10.1016\/j.peva.2018.11.002_b28","series-title":"Performance Modeling and Design of Computer Systems: Queueing Theory in Action","author":"Harchol-Balter","year":"2013"},{"key":"10.1016\/j.peva.2018.11.002_b29","series-title":"A Quantitative Measure of Fairness and Discrimination for Resource Allocation in Shared Computer System","author":"Jain","year":"1984"},{"issue":"1","key":"10.1016\/j.peva.2018.11.002_b30","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SURV.2010.020110.00047","article-title":"Channel assignment schemes for infrastructure-based 802.11 WLANs: A survey.","volume":"12","author":"Chieochan","year":"2010","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"4","key":"10.1016\/j.peva.2018.11.002_b31","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s11036-006-7322-y","article-title":"Utilization and fairness in spectrum assignment for opportunistic spectrum access","volume":"11","author":"Peng","year":"2006","journal-title":"Mob. Netw. Appl."},{"key":"10.1016\/j.peva.2018.11.002_b32","series-title":"IEEE Standard 802.11-1997","article-title":"Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","author":"IEEE Computer Society LAN MAN Standards\u00a0Committee","year":"1997"}],"container-title":["Performance Evaluation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0166531618300749?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/api.elsevier.com\/content\/article\/PII:S0166531618300749?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T14:57:24Z","timestamp":1759071444000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/linkinghub.elsevier.com\/retrieve\/pii\/S0166531618300749"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":32,"alternative-id":["S0166531618300749"],"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.peva.2018.11.002","relation":{},"ISSN":["0166-5316"],"issn-type":[{"value":"0166-5316","type":"print"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Conflict graph-based model for IEEE 802.11 networks: A Divide-and-Conquer approach","name":"articletitle","label":"Article Title"},{"value":"Performance Evaluation","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1016\/j.peva.2018.11.002","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}