{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,31]],"date-time":"2024-10-31T03:03:18Z","timestamp":1730343798375,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.23919\/ifipnetworking.2018.8696897","type":"proceedings-article","created":{"date-parts":[[2019,4,25]],"date-time":"2019-04-25T22:37:40Z","timestamp":1556231860000},"page":"298-306","source":"Crossref","is-referenced-by-count":5,"title":["Association Optimization in Wi-Fi Networks based on the Channel Busy Time Estimation"],"prefix":"10.23919","author":[{"given":"Mohammed","family":"Amer","sequence":"first","affiliation":[]},{"given":"Anthony","family":"Busson","sequence":"additional","affiliation":[]},{"given":"Isabelle Guerin","family":"Lassous","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2014.6849251"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883676"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSN.2011.6014283"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524397"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.2359456"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2013.6666498"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2015.7414115"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2014.7022839"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/17445760801930914"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2014.20"},{"journal-title":"The CAIDA anonymized internet traces 2015 dataset","year":"2015","key":"ref28"},{"journal-title":"IEEE Std 802 11v-2011 Amendment 8 IEEE 802 11 Wireless Network Management","first-page":"1","year":"2011","key":"ref4"},{"journal-title":"Iterative Approximation of Fixed Points","year":"2007","author":"berinde","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ATNAC.2015.7366817"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-015-0650-z"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2988287.2989153"},{"journal-title":"IEEE 802 11k-2008 Amendment 1 IEEE 802 11 Radio Resource Measurement","year":"2008","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848045"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5415"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0116592"},{"key":"ref1","first-page":"1","article-title":"IEEE standard for information technology&#x2013;telecommunications and information exchange between systems local and metropolitan area networks&#x2013;specific requirements part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","year":"2012","journal-title":"IEEE Std 802 11-2012"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.156"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/WIRLES.2005.1549644"},{"key":"ref21","first-page":"1","article-title":"Cellular Network Traces Towards 5G: Usage, Analysis and Generation","volume":"pp","author":"malandrino","year":"2017","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"ref24","first-page":"117","author":"andreescu","year":"2004","journal-title":"Inclusion-Exclusion Principle"},{"key":"ref23","article-title":"A simple method to infer Wi-Fi conflict graph","author":"busson","year":"2017","journal-title":"CORES2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48369-1"},{"journal-title":"Introduction to Graphical Modelling","year":"2012","author":"edwards","key":"ref25"}],"event":{"name":"2018 IFIP Networking Conference (IFIP Networking) and Workshops","start":{"date-parts":[[2018,5,14]]},"location":"Zurich, Switzerland","end":{"date-parts":[[2018,5,16]]}},"container-title":["2018 IFIP Networking Conference (IFIP Networking) and Workshops"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8686043\/8696378\/08696897.pdf?arnumber=8696897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T19:00:15Z","timestamp":1557774015000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8696897\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":28,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.23919\/ifipnetworking.2018.8696897","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}