• Patel S, Zhang J, Narodystka N and Jyothi S. (2024). Practically High Performant Neural Adaptive Video Streaming. Proceedings of the ACM on Networking. 2:CoNEXT4. (1-23). Online publication date: 1-Dec-2024.

    https://doi.org/10.1145/3696401

  • Mahfouz A, Abuhussein A, Venugopal D and Shiva S. (2020). Ensemble Classifiers for Network Intrusion Detection Using a Novel Network Attack Dataset. Future Internet. 10.3390/fi12110180. 12:11. (180).

    https://www.mdpi.com/1999-5903/12/11/180

  • Gouveia P, Neves J, Segarra C, Liechti L, Issa S, Schiavoni V and Matos M. Kollaps. Proceedings of the Fifteenth European Conference on Computer Systems. (1-16).

    https://doi.org/10.1145/3342195.3387540

  • Yan F, Ayers H, Zhu C, Fouladi S, Hong J, Zhang K, Levis P and Winstein K. Learning in situ. Proceedings of the 17th Usenix Conference on Networked Systems Design and Implementation. (495-512).

    /doi/10.5555/3388242.3388279

  • Janowski R, Grabowski M and Arabas P. (2020). New Heuristics for TCP Retransmission Timers. Progress in Computer Recognition Systems. 10.1007/978-3-030-19738-4_13. (117-129).

    http://link.springer.com/10.1007/978-3-030-19738-4_13

  • Kuang X, Li J and Xu F. (2018). Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment. Intelligence Science and Big Data Engineering. 10.1007/978-3-030-02698-1_7. (68-79).

    https://link.springer.com/10.1007/978-3-030-02698-1_7

  • Esquivel-Gómez J, Balderas-Navarro R, Arjona-Villicaña P, Castillo-Castillo P, Rico-Trejo O and Acosta-Elias J. (2017). On the Emergence of Islands in Complex Networks. Complexity. 2017. (21). Online publication date: 1-Jan-2017.

    https://doi.org/10.1155/2017/7157943

  • Velieva T, Eferina E, Korolkova A, Kulyabov D and Sevastianov L. (2017). Modelica-based TCP simulation. Journal of Physics: Conference Series. 10.1088/1742-6596/788/1/012036. 788. (012036). Online publication date: 1-Jan-2017.

    http://stacks.iop.org/1742-6596/788/i=1/a=012036?key=crossref.a392382fbd3d2d5ff5ae301f7ae10446

  • Tommasi F, De Luca V and Melle C. (2015). Packet losses and objective video quality metrics in H.264 video streaming. Journal of Visual Communication and Image Representation. 27:C. (7-27). Online publication date: 1-Feb-2015.

    https://doi.org/10.1016/j.jvcir.2014.12.003

  • Liu Q, Silva M, Hines M and Da Silva D. Hardware-in-the-loop simulation for automated benchmarking of cloud infrastructures. Proceedings of the Winter Simulation Conference. (1-12).

    /doi/10.5555/2429759.2430064

  • Gamer T. (2012). Collaborative anomaly-based detection of large-scale internet attacks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 56:1. (169-185). Online publication date: 1-Jan-2012.

    https://doi.org/10.1016/j.comnet.2011.08.015

  • Wang J, Li X and Jiao C. (2011). The Network Traffic Management Based on Queuing Theory. Applied Mechanics and Materials. 10.4028/www.scientific.net/AMM.121-126.4721. 121-126. (4721-4725).

    https://www.scientific.net/AMM.121-126.4721

  • (2011). References. An Introduction to Network Modeling and Simulation for the Practicing Engineer. 10.1002/9781118063651.refs. (188-195). Online publication date: 23-Sep-2011.

    https://onlinelibrary.wiley.com/doi/10.1002/9781118063651.refs

  • Gamer T and Mayer C. (2011). Simulative evaluation of distributed attack detection in large-scale realistic environments. Simulation. 87:7. (630-647). Online publication date: 1-Jul-2011.

    https://doi.org/10.1177/0037549710385716

  • Carl G and Kesidis G. (2011). Modeling a policy-capable path-vector routing protocol using Jacobi iteration over a path algebra. Computer Networks. 10.1016/j.comnet.2011.03.013. 55:10. (2361-2379). Online publication date: 1-Jul-2011.

    https://linkinghub.elsevier.com/retrieve/pii/S1389128611001162

  • Pagano M and Secchi R. An introduction to modelling and performance evaluation for TCP networks. Network performance engineering. (571-593).

    /doi/10.5555/1996629.1996659

  • Wang H, Murata Y, Takizawa H and Kobayashi H. Adaptive Control of Redundant Task Execution for Dependable Volunteer Computing. Cloud, Grid and High Performance Computing. 10.4018/978-1-60960-603-9.ch009. (135-154).

    http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-60960-603-9.ch009

  • Pagano M and Secchi R. (2011). An Introduction to Modelling and Performance Evaluation for TCP Networks. Network Performance Engineering. 10.1007/978-3-642-02742-0_24. (571-593).

    https://link.springer.com/10.1007/978-3-642-02742-0_24

  • Liu J. (2011). Parallel Discrete‐Event Simulation. Wiley Encyclopedia of Operations Research and Management Science. 10.1002/9780470400531.eorms0639. Online publication date: 1-Jan-2011.

    https://onlinelibrary.wiley.com/doi/10.1002/9780470400531.eorms0639

  • Mills K, Schwartz E and Yuan J. How to model a TCP/IP network using only 20 parameters. Proceedings of the Winter Simulation Conference. (849-860).

    /doi/10.5555/2433508.2433608

  • Byrne J, Heavey C and Byrne P. (2010). A review of Web-based simulation and supporting tools. Simulation Modelling Practice and Theory. 10.1016/j.simpat.2009.09.013. 18:3. (253-276). Online publication date: 1-Mar-2010.

    http://linkinghub.elsevier.com/retrieve/pii/S1569190X0900149X

  • Li M. (2010). Generation of teletraffic of generalized Cauchy type. Physica Scripta. 10.1088/0031-8949/81/02/025007. 81:2. (025007). Online publication date: 1-Feb-2010.

    https://iopscience.iop.org/article/10.1088/0031-8949/81/02/025007

  • Landsiedel O, Kunz G, Götz S and Wehrle K. A virtual platform for network experimentation. Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. (45-52).

    https://doi.org/10.1145/1592648.1592657

  • Liu L and Mondragón R. Conservation of alternative paths as a method to simplify large networks. Proceedings of the 1st Annual Workshop on Simplifying Complex Network for Practitioners. (1-6).

    https://doi.org/10.1145/1610304.1610305

  • Rahman M, Pakštas A and Wang F. (2009). Network modelling and simulation tools. Simulation Modelling Practice and Theory. 10.1016/j.simpat.2009.02.005. 17:6. (1011-1031). Online publication date: 1-Jul-2009.

    https://linkinghub.elsevier.com/retrieve/pii/S1569190X09000197

  • Li M and Zhao W. A note on simulation of LRD network traffic. Proceedings of the 8th WSEAS international conference on Instrumentation, measurement, circuits and systems. (25-30).

    /doi/10.5555/1576594.1576600

  • Heidemann J, Pradkin Y, Govindan R, Papadopoulos C, Bartlett G and Bannister J. Census and survey of the visible internet. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. (169-182).

    https://doi.org/10.1145/1452520.1452542

  • Abrahao B and Kleinberg R. On the internet delay space dimensionality. Proceedings of the 8th ACM SIGCOMM conference on Internet measurement. (157-168).

    https://doi.org/10.1145/1452520.1452541

  • Erman D, Saavedra D, Sánchez González J and Popescu A. (2008). Validating BitTorrent models. Telecommunications Systems. 39:2. (103-116). Online publication date: 1-Oct-2008.

    https://doi.org/10.1007/s11235-008-9115-z

  • Nayyar H and Ghorbani A. (2008). Approximate autoregressive modeling for network attack detection. Journal of Computer Security. 16:2. (165-197). Online publication date: 1-Apr-2008.

    /doi/10.5555/1370687.1370690

  • Gates C. A case study in testing a network security algorithm. Proceedings of the 4th International Conference on Testbeds and research infrastructures for the development of networks & communities. (1-6).

    /doi/10.5555/1390576.1390610

  • Costa A, Macedo J, Nicolau M and Santos A. QoS aware multicast routing protocols evaluation through simulation. Proceedings of the 1st international conference on Simulation tools and techniques for communications, networks and systems & workshops. (1-8).

    /doi/10.5555/1416222.1416224

  • Wang Q, Vincent J and King G. (2007). Prediction based link state update. International Journal of Computers and Applications. 29:4. (379-393). Online publication date: 1-Sep-2007.

    https://doi.org/10.1080/1206212X.2007.11441869

  • Vlachos V and Spinellis D. (2007). A PRoactive malware identification system based on the computer hygiene principles. Information Management & Computer Security. 10.1108/09685220710817815. 15:4. (295-312). Online publication date: 21-Aug-2007.

    http://www.emeraldinsight.com/doi/10.1108/09685220710817815

  • Longo M and Postiglione F. End-to-end loss probabilities in different internet-like networks with a given average hop count. Proceedings of the 11th Conference on 11th WSEAS International Conference on Communications - Volume 11. (83-88).

    /doi/10.5555/1348101.1348117

  • Gates C, Taylor C and Bishop M. Dependable security. Proceedings of the 3rd workshop on on Hot Topics in System Dependability. (12-es).

    /doi/10.5555/1323140.1323152

  • Li M, Lim S and Feng H. Generating Traffic Time Series Based on Generalized Cauchy Process. Proceedings of the 7th international conference on Computational Science, Part I: ICCS 2007. (374-381).

    https://doi.org/10.1007/978-3-540-72584-8_48

  • Wang Q, Vincent J and King G. (2007). PREDICTION BASED LINK STATE UPDATE. International Journal of Computers and Applications. 10.2316/Journal.202.2007.4.202-2140. 29:4.

    http://www.actapress.com/PaperInfo.aspx?paperId=32221

  • Nayyar H and Ghorbani A. Approximate autoregressive modeling for network attack detection. Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services. (1-11).

    https://doi.org/10.1145/1501434.1501462

  • Meddahi A and Afifi H. (2006). Packet-E-Model. Computer Networks: The International Journal of Computer and Telecommunications Networking. 50:15. (2659-2675). Online publication date: 18-Oct-2006.

    https://doi.org/10.1016/j.comnet.2005.10.008

  • Kowalik K and Collier M. (2006). Reducing traffic fluctuations of link state QoS routing algorithms in virtual circuit networks. Computer Networks: The International Journal of Computer and Telecommunications Networking. 50:15. (2805-2819). Online publication date: 18-Oct-2006.

    https://doi.org/10.1016/j.comnet.2005.03.005

  • Gates C and Taylor C. Challenging the anomaly detection paradigm. Proceedings of the 2006 workshop on New security paradigms. (21-29).

    https://doi.org/10.1145/1278940.1278945

  • Avallone S, Emma D, Pescapè A and Ventre G. (2006). High Performance Internet Traffic Generators. The Journal of Supercomputing. 35:1. (5-26). Online publication date: 1-Jan-2006.

    https://doi.org/10.1007/s11227-006-0798-1

  • Tripathi S, Sharma P and Raghavan S. Challenges in Design of Next Generation Networks. Modeling and Simulation Tools for Emerging Telecommunication Networks. 10.1007/0-387-34167-6_2. (19-42).

    http://link.springer.com/10.1007/0-387-34167-6_2

  • Wolski R, Obertelli G, Allen M, Nurmi D and Brevik J. Predicting Grid Resource Performance Online. Handbook of Nature-Inspired and Innovative Computing. 10.1007/0-387-27705-6_18. (575-611).

    http://link.springer.com/10.1007/0-387-27705-6_18

  • Vlachos V, Vouzi V, Chatziantoniou D and Spinellis D. NGCE – network graphs for computer epidemiologists. Proceedings of the 10th Panhellenic conference on Advances in Informatics. (672-683).

    https://doi.org/10.1007/11573036_64

  • Nurmi D, Brevik J and Wolski R. Modeling machine availability in enterprise and wide-area distributed computing environments. Proceedings of the 11th international Euro-Par conference on Parallel Processing. (432-441).

    https://doi.org/10.1007/11549468_50

  • Halpern J and Li L. (2005). Minimum-Energy Topology Control Algorithms in Ad Hoc Networks. Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks. 10.1201/9780203323687.ch8. Online publication date: 8-Aug-2005.

    http://www.crcnetbase.com/doi/10.1201/9780203323687.ch8

  • Avallone S, Emma D, Pescapé A and Ventre G. (2005). Performance evaluation of an open distributed platform for realistic traffic generation. Performance Evaluation. 60:1-4. (359-392). Online publication date: 1-May-2005.

    https://doi.org/10.1016/j.peva.2004.10.012

  • Wolski R, Nurmi D, Brevik J, Casanova H and Chien A. Models and Modeling Infrastructures for Global Computational Platforms. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 10 - Volume 11.

    https://doi.org/10.1109/IPDPS.2005.294

  • Koller G and Sauter T. (2004). Das Internet in der Automation — eine Herausforderung für die RegelungstechnikThe Internet in automation — a challenge for control engineering. e & i Elektrotechnik und Informationstechnik. 10.1007/BF03054964. 121:2. (31-36). Online publication date: 1-Feb-2004.

    http://link.springer.com/10.1007/BF03054964

  • References. Web Caching and its Applications. 10.1007/1-4020-8050-6_21. (184-228).

    http://link.springer.com/10.1007/1-4020-8050-6_21

  • Li M and Chi C. (2003). A correlation-based computational model for synthesizing long-range dependent data. Journal of the Franklin Institute. 10.1016/j.jfranklin.2003.09.002. 340:6-7. (503-514). Online publication date: 1-Sep-2003.

    http://linkinghub.elsevier.com/retrieve/pii/S0016003203000693

  • Feng W, Goel A, Bezzaz A, Feng W and Walpole J. TCPivo. Proceedings of the ACM SIGCOMM workshop on Models, methods and tools for reproducible network research. (57-64).

    https://doi.org/10.1145/944773.944783

  • Hu F, Sharma N and Ziobro J. (2003). An accurate model for analyzing wireless TCP performance with the coexistence of Non-TCP traffic. Computer Networks: The International Journal of Computer and Telecommunications Networking. 42:4. (419-439). Online publication date: 15-Jul-2003.

    https://doi.org/10.1016/S1389-1286(03)00193-2

  • Mathis M, Heffner J and Reddy R. (2003). Web100. ACM SIGCOMM Computer Communication Review. 33:3. (69-79). Online publication date: 1-Jul-2003.

    https://doi.org/10.1145/956993.957002

  • Wolski R. (2003). Experiences with predicting resource performance on-line in computational grid settings. ACM SIGMETRICS Performance Evaluation Review. 30:4. (41-49). Online publication date: 1-Mar-2003.

    https://doi.org/10.1145/773056.773064

  • Belani R, Das S and Fisher D. Modeling very large scale systems. Proceedings of the 34th conference on Winter simulation: exploring new frontiers. (720-724).

    /doi/10.5555/1030453.1030553

  • Lee Y and Chen E. (2002). BASF Uses a Framework for Developing Web-Based Production-Planning-Optimization Tools. Interfaces. 32:6. (15-24). Online publication date: 1-Nov-2002.

    https://doi.org/10.1287/inte.32.6.15.6478

  • Liljenstam M and Ogielski A. (2002). Crossover scaling effects in aggregated TCP traffic with congestion losses. ACM SIGCOMM Computer Communication Review. 32:5. (89-100). Online publication date: 1-Nov-2002.

    https://doi.org/10.1145/774749.774761

  • Chen X and Mohapatra P. (2002). Performance Evaluation of Service Differentiating Internet Servers. IEEE Transactions on Computers. 51:11. (1368-1375). Online publication date: 1-Nov-2002.

    https://doi.org/10.1109/TC.2002.1047760

  • Rao D and Wilsey P. (2002). An ultra-large-scale simulation framework. Journal of Parallel and Distributed Computing. 10.1016/S0743-7315(02)00003-5. 62:11. (1670-1693). Online publication date: 1-Nov-2002.

    https://linkinghub.elsevier.com/retrieve/pii/S0743731502000035

  • Bhattacharyya S, Diot C, Taft N and Jetcheva J. (2008). Geographical and temporal characteristics of inter‐POP flows: View from a single pop. European Transactions on Telecommunications. 10.1002/ett.4460130103. 13:1. (5-22). Online publication date: 1-Jan-2002.

    https://onlinelibrary.wiley.com/doi/10.1002/ett.4460130103

  • Bhattacharyya S, Diot C and Jetcheva J. Pop-level and access-link-level traffic dynamics in a tier-1 POP. Proceedings of the 1st ACM SIGCOMM Workshop on Internet measurement. (39-53).

    https://doi.org/10.1145/505202.505209

  • Yücesan E, Luo Y, Chen C and Lee I. (2001). Distributed web-based simulation experiments for optimization. Simulation Practice and Theory. 10.1016/S0928-4869(01)00037-4. 9:1-2. (73-90). Online publication date: 1-Oct-2001.

    http://linkinghub.elsevier.com/retrieve/pii/S0928486901000374

  • Yeom I and Reddy A. (2001). ENDE. Multimedia Tools and Applications. 14:3. (269-296). Online publication date: 1-Aug-2001.

    https://doi.org/10.1023/A:1011314230120

  • Smith F, Campos F, Jeffay K and Ott D. (2001). What TCP/IP protocol headers can tell us about the web. ACM SIGMETRICS Performance Evaluation Review. 29:1. (245-256). Online publication date: 1-Jun-2001.

    https://doi.org/10.1145/384268.378789

  • Smith F, Campos F, Jeffay K and Ott D. What TCP/IP protocol headers can tell us about the web. Proceedings of the 2001 ACM SIGMETRICS international conference on Measurement and modeling of computer systems. (245-256).

    https://doi.org/10.1145/378420.378789

  • Joo Y, Ribeiro V, Feldmann A, Gilbert A and Willinger W. (2001). TCP/IP traffic dynamics and network performance. ACM SIGCOMM Computer Communication Review. 31:2. (25-37). Online publication date: 1-Apr-2001.

    https://doi.org/10.1145/505666.505670

  • Grossglauser M and Krishnamurthy B. (2001). Looking for Science in the Art of Network Measurement. Evolutionary Trends of the Internet. 10.1007/3-540-45400-4_34. (524-535).

    http://link.springer.com/10.1007/3-540-45400-4_34

  • Luo Y, Chen C, Yücesan E and Lee I. Distributed web-based simulation optimization. Proceedings of the 32nd conference on Winter simulation. (1785-1793).

    /doi/10.5555/510378.510640

  • Allman M. (2000). A web server's view of the transport layer. ACM SIGCOMM Computer Communication Review. 30:5. (10-20). Online publication date: 31-Oct-2000.

    https://doi.org/10.1145/505672.505674

  • Duffield N and Grossglauser M. (2000). Trajectory sampling for direct traffic observation. ACM SIGCOMM Computer Communication Review. 30:4. (271-282). Online publication date: 1-Oct-2000.

    https://doi.org/10.1145/347057.347555

  • Duffield N and Grossglauser M. Trajectory sampling for direct traffic observation. Proceedings of the conference on Applications, Technologies, Architectures, and Protocols for Computer Communication. (271-282).

    https://doi.org/10.1145/347059.347555

  • Bayvel P, Gibbens R, Midwinter J and Crowcroft J. (2000). Herding cats: modelling Quality of Service for Internet applications. Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences. 10.1098/rsta.2000.0642. 358:1773. (2209-2215). Online publication date: 15-Aug-2000.

    http://www.royalsocietypublishing.org/doi/10.1098/rsta.2000.0642

  • Haas Z, Halpern J, Li L and Wicker S. A decision-theoretic approach to resource allocation in wireless multimedia networks. Proceedings of the 4th international workshop on Discrete algorithms and methods for mobile computing and communications. (86-95).

    https://doi.org/10.1145/345848.345870

  • Medina A, Matta I and Byers J. (2000). On the origin of power laws in Internet topologies. ACM SIGCOMM Computer Communication Review. 30:2. (18-28). Online publication date: 1-Apr-2000.

    https://doi.org/10.1145/505680.505683

  • Poplawski A and Nicol D. An investigation of out-of-core parallel discrete-event simulation. Proceedings of the 31st conference on Winter simulation: Simulation---a bridge to the future - Volume 1. (524-530).

    https://doi.org/10.1145/324138.324317

  • Fiedler U, Plattner B and Alonso G. Quality of Service in Business-to-Business E-Commerce Applications. Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems.

    /doi/10.5555/829524.831021

  • Allman M and Falk A. (1999). On the effective evaluation of TCP. ACM SIGCOMM Computer Communication Review. 29:5. (59-70). Online publication date: 5-Oct-1999.

    https://doi.org/10.1145/505696.505703

  • Feldmann A, Gilbert A, Huang P and Willinger W. (1999). Dynamics of IP traffic. ACM SIGCOMM Computer Communication Review. 29:4. (301-313). Online publication date: 1-Oct-1999.

    https://doi.org/10.1145/316194.316235

  • Faloutsos M, Faloutsos P and Faloutsos C. (1999). On power-law relationships of the Internet topology. ACM SIGCOMM Computer Communication Review. 29:4. (251-262). Online publication date: 1-Oct-1999.

    https://doi.org/10.1145/316194.316229

  • Shaikh A, Rexford J and Shin K. (1999). Load-sensitive routing of long-lived IP flows. ACM SIGCOMM Computer Communication Review. 29:4. (215-226). Online publication date: 1-Oct-1999.

    https://doi.org/10.1145/316194.316225

  • Kushida T. (1999). Research note. Computer Communications. 22:17. (1607-1618). Online publication date: 1-Oct-1999.

    https://doi.org/10.1016/S0140-3664(99)00136-X

  • Feldmann A, Gilbert A, Huang P and Willinger W. Dynamics of IP traffic. Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. (301-313).

    https://doi.org/10.1145/316188.316235

  • Faloutsos M, Faloutsos P and Faloutsos C. On power-law relationships of the Internet topology. Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. (251-262).

    https://doi.org/10.1145/316188.316229

  • Shaikh A, Rexford J and Shin K. Load-sensitive routing of long-lived IP flows. Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication. (215-226).

    https://doi.org/10.1145/316188.316225

  • Subhlok J, Lieu P and Lowekamp B. (1999). Automatic node selection for high performance applications on networks. ACM SIGPLAN Notices. 34:8. (163-172). Online publication date: 1-Aug-1999.

    https://doi.org/10.1145/329366.301119

  • Subhlok J, Lieu P and Lowekamp B. Automatic node selection for high performance applications on networks. Proceedings of the seventh ACM SIGPLAN symposium on Principles and practice of parallel programming. (163-172).

    https://doi.org/10.1145/301104.301119

  • Watson E, Shi Y and Chen Y. (1999). A user-access model-driven approach to proxy cache performance analysis. Decision Support Systems. 10.1016/S0167-9236(99)00017-2. 25:4. (309-338). Online publication date: 1-May-1999.

    http://linkinghub.elsevier.com/retrieve/pii/S0167923699000172

  • Savage S, Anderson T, Aggarwal A, Becker D, Cardwell N, Collins A, Hoffman E, Snell J, Vahdat A, Voelker G and Zahorjan J. (1999). Detour. IEEE Micro. 19:1. (50-59). Online publication date: 1-Jan-1999.

    https://doi.org/10.1109/40.748796

  • Rao D and Wilsey P. (1999). An Object-Oriented Framework for Parallel Simulation of Ultra-large Communication Networks. Computing in Object-Oriented Parallel Environments. 10.1007/10704054_4. (37-48).

    http://link.springer.com/10.1007/10704054_4

  • Padhye J, Firoiu V, Towsley D and Kurose J. (1998). Modeling TCP throughput. ACM SIGCOMM Computer Communication Review. 28:4. (303-314). Online publication date: 1-Oct-1998.

    https://doi.org/10.1145/285243.285291

  • Padhye J, Firoiu V, Towsley D and Kurose J. Modeling TCP throughput. Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication. (303-314).

    https://doi.org/10.1145/285237.285291