{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:48:12Z","timestamp":1725666492898},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/cyberc.2012.78","type":"proceedings-article","created":{"date-parts":[[2013,1,3]],"date-time":"2013-01-03T04:15:43Z","timestamp":1357186543000},"page":"427-434","source":"Crossref","is-referenced-by-count":4,"title":["Improved Solution to TCP Incast Problem in Data Center Networks"],"prefix":"10.1109","author":[{"given":"Kai","family":"Chen","sequence":"first","affiliation":[]},{"given":"Hongyun","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yongxiang","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Yuchun","family":"Guo","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The network simulator 2","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015499"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/381906.381931"},{"key":"15","article-title":"A scheme to solve TCP transmission problem in data center","author":"zhao","year":"0","journal-title":"Proc 2010 Cross-Strait Conference on Information Science and Technology (CSCIST 2010) July 9-11 2010 Qinghuang Dao China"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/205511.205520"},{"key":"13","article-title":"The TCP Bandwidth-Delay Product revisited: Network buffering, cross traffic, and socket buffer auto-sizing","author":"jain","year":"2003","journal-title":"CERCS Technical Reports"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934923"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5935217"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018443"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633035"},{"key":"3","article-title":"Safe and effective finegrained TCP retransmissions for datacenter communication","author":"vasudevan","year":"0","journal-title":"SIGCOMM 2009 August 17-21 2009 Barcelona Spain"},{"journal-title":"Bulk TCP Use and Performance on Intenet2","year":"2002","author":"shalunov","key":"20"},{"key":"2","article-title":"Measurement and analysis of TCP throughput collapse in cluster-based storage systems","author":"phanishayee","year":"0","journal-title":"Proc USENIX Conference on File and Storage Technologies (FAST 08) Feb 2008 San Jose CA"},{"key":"1","article-title":"The panasas activescale storage cluster: Delivering scalable high bandwidth storage","author":"nagle","year":"0","journal-title":"Proc the 2004 ACM\/IEEE Conference on Supercomputing (SC 04) Washington DC USA 2004"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797706"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921186"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2012.6245995"},{"key":"8","first-page":"1","article-title":"An Effective Approach to Preventing TCP Incast Throughput Collapse for Data Center Networks","author":"zheng","year":"2011","journal-title":"Proc IEEE Global Telecommunications Conference (GLOBECOM 2011)"}],"event":{"name":"2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC)","start":{"date-parts":[[2012,10,10]]},"location":"Sanya, China","end":{"date-parts":[[2012,10,12]]}},"container-title":["2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6383189\/6384924\/06385005.pdf?arnumber=6385005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T22:12:17Z","timestamp":1490134337000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6385005\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cyberc.2012.78","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}