{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:09:25Z","timestamp":1728176965732},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Feng Gao"},{"DOI":"10.13039\/501100005153","name":"China National Funds for Distinguished Young Scientists","doi-asserted-by":"publisher","award":["61825204"],"id":[{"id":"10.13039\/501100005153","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"NSFC Project","doi-asserted-by":"publisher","award":["61932016"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing Outstanding Young Scientist Program","award":["BJJWZYJH01201910003011"]},{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1909212","CNS-1763256"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Sloan Research Fellowship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE\/ACM Trans. Networking"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/tnet.2021.3101011","type":"journal-article","created":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T20:07:01Z","timestamp":1628626021000},"page":"2678-2692","source":"Crossref","is-referenced-by-count":11,"title":["Revisiting Acknowledgment Mechanism for Transport Control: Modeling, Analysis, and Implementation"],"prefix":"10.1109","volume":"29","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-6805-9565","authenticated-orcid":false,"given":"Tong","family":"Li","sequence":"first","affiliation":[]},{"given":"Kai","family":"Zheng","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2587-8517","authenticated-orcid":false,"given":"Ke","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Rahul Arvind","family":"Jadhav","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Xiong","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2305-8048","authenticated-orcid":false,"given":"Keith","family":"Winstein","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","year":"2018","journal-title":"Mate 20 Series Wireless Projection"},{"key":"ref72","year":"2019","journal-title":"Wi-Fi Direct"},{"key":"ref71","year":"2020","journal-title":"Bpf helpers"},{"key":"ref70","year":"2020","journal-title":"A Patch to Allow Changing TCP ACK Frequency"},{"key":"ref76","author":"cardwell","year":"2020","journal-title":"How to Make Inflight to Convergency 1 BDP When Inflight is 2 BDP Currently"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-020-00636-3"},{"key":"ref74","year":"2019","journal-title":"Honor Smart Screen"},{"key":"ref39","author":"iyengar","year":"2020","journal-title":"Sender Control of Acknowledgement Delays in QUIC"},{"key":"ref75","author":"cardwell","year":"2018","journal-title":"BBR IETF 102 Update"},{"key":"ref38","author":"kuhn","year":"2020","journal-title":"SATCOM Quarterly"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236203"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232925"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230564"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098825"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098840"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.06.004"},{"key":"ref37","author":"fairhurst","year":"2020","journal-title":"Changing the Default QUIC ACK Policy"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2525"},{"key":"ref35","author":"iyengar","year":"2020","journal-title":"QUIC Loss Recovery and Congestion Control"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098842"},{"key":"ref60","year":"2018","journal-title":"Pantheon-After"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1400097.1400105"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832483"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/303297.303301"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/190809.190317"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0575-9"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.188"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/0376-5075(82)90127-1"},{"key":"ref66","year":"1981","journal-title":"Transmission control protocol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836086"},{"key":"ref67","author":"cardwell","year":"2018","journal-title":"BBR IETF 101 Update"},{"key":"ref68","year":"2017","journal-title":"Accurate and Repeatable Network Emulation"},{"key":"ref69","author":"rizzo","year":"2019","journal-title":"The fast packet I\/O framework"},{"key":"ref2","year":"2020","journal-title":"Cisco Visual Networking Index Forecast and Trends 2018–2023"},{"key":"ref1","year":"2019","journal-title":"Top 10 Traffic Killers Among Internet Videos"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2002.805544"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.09.010"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.011311.101535"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498465"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2005.863432"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-009-9848-3"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2007.10.004"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.11.009"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2002.1137760"},{"key":"ref59","year":"2018","journal-title":"Test From GCE Tokyo to GCE Sydney Before the Advanced Round-Trip Timing is Applied"},{"key":"ref58","year":"2018","journal-title":"Pantheon of Congestion Control"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/3232755.3232783"},{"key":"ref56","author":"paxson","year":"2011","journal-title":"Computing TCP’s Retransmission Timer"},{"key":"ref55","author":"cheng","year":"2016","journal-title":"RACK A Time-Based Fast Loss Detection Algorithm for TCP"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2018"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5740"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1106"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1273445.1273447"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749276"},{"key":"ref40","author":"li","year":"2020","journal-title":"Optimizing ACK Mechanism for QUIC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39867-7_26"},{"key":"ref13","first-page":"205","article-title":"Measurement-based, practical techniques to improve 802.11 ac performance","author":"bhartia","year":"2017","journal-title":"Proc IMC"},{"key":"ref14","first-page":"195","article-title":"Improving TCP performance with delayed acknowledgments over wireless networks: A receiver side solution","author":"rao","year":"2013","journal-title":"Proc IET Commun Comput"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/52325.52356"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2940184"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405850"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2586074"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3012426.3022184"},{"key":"ref84","author":"blanton","year":"2006","journal-title":"Improving the Robustness of TCP to Non-Congestion Events"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3449"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230556"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2008.071623"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s42045-018-0006-x"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2030613.2030619"},{"key":"ref3","year":"2016","journal-title":"Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.17487\/rfc1122"},{"key":"ref5","first-page":"359","article-title":"Hack: Hierarchical ACKs for efficient wireless medium utilization","author":"salameh","year":"2014","journal-title":"Proc USENIX ATC"},{"key":"ref85","first-page":"399","article-title":"How hard can it be? Designing and implementing a deployable multipath TCP","author":"raiciu","year":"2012","journal-title":"Proc USENIX NSDI"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.19"},{"key":"ref49","year":"2019","journal-title":"WebRTC"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.17487\/rfc5681"},{"key":"ref9","author":"floyd","year":"2006","journal-title":"Profile for Datagram Congestion Control Protocol (DCCP)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018478"},{"key":"ref45","year":"2019","journal-title":"High-Definition Content Sharing on Wi-Fi Devices Everywhere"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2507771.2507781"},{"key":"ref47","year":"2019","journal-title":"Ackemu"},{"key":"ref42","year":"2019","journal-title":"Cisco Predicts More IP Traffic in the Next Five Years Than in the History of the Internet"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2020.3045208"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2016.2565470"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2930992"}],"container-title":["IEEE\/ACM Transactions on Networking"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/90\/9653186\/09509944.pdf?arnumber=9509944","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T20:51:22Z","timestamp":1648500682000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9509944\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":85,"journal-issue":{"issue":"6"},"URL":"http:\/\/dx.doi.org\/10.1109\/tnet.2021.3101011","relation":{},"ISSN":["1063-6692","1558-2566"],"issn-type":[{"value":"1063-6692","type":"print"},{"value":"1558-2566","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}