{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:51:49Z","timestamp":1726037509166},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242701"},{"type":"electronic","value":"9783030242718"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24271-8_2","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:19:24Z","timestamp":1563405564000},"page":"13-24","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Virtualization of 5G Cellular Networks: A Combinatorial Share-Averse Auction Approach"],"prefix":"10.1007","author":[{"given":"Yuanyuan","family":"Xu","sequence":"first","affiliation":[]},{"given":"Shan","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MIM.2015.7108393","volume":"18","author":"E Hossain","year":"2015","unstructured":"Hossain, E., Hasan, M.: 5G cellular: key enabling technologies and research challenges. IEEE Instrum. Meas. Mag. 18(3), 11\u201321 (2015)","journal-title":"IEEE Instrum. Meas. Mag."},{"issue":"1","key":"2_CR2","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1109\/COMST.2014.2352118","volume":"17","author":"C Liang","year":"2014","unstructured":"Liang, C., Yu, F.R.: Wireless network virtualization: a survey, some research issues and challenges. IEEE Commun. Surv. Tuts. 17(1), 358\u2013380 (2014)","journal-title":"IEEE Commun. Surv. Tuts."},{"issue":"7","key":"2_CR3","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MCOM.2013.6553675","volume":"51","author":"X Costa-Perez","year":"2013","unstructured":"Costa-Perez, X., Guo, T., Mahindra, R., Rangarajan, S.: Radio access network virtualization for future mobile carrier networks. IEEE Wirel. Commun. Mag. 51(7), 27\u201335 (2013)","journal-title":"IEEE Wirel. Commun. Mag."},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Yang, M., Li, Y., Jin, D., Yuan, J., Su, L., Zeng, L.: Opportunistic spectrum sharing based resource allocation for wireless virtualization. In: Proceedings of IEEE VTC (2014)","DOI":"10.1109\/WCNC.2014.6952523"},{"issue":"7","key":"2_CR5","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1109\/LCOMM.2013.052013.130959","volume":"17","author":"B Liu","year":"2013","unstructured":"Liu, B., Tian, H.: A bankruptcy game-based resource allocation approach among virtual mobile operators. IEEE Commun. Lett. 17(7), 1420\u20131423 (2013)","journal-title":"IEEE Commun. Lett."},{"issue":"1","key":"2_CR6","first-page":"123","volume":"56","author":"J Zhang","year":"2018","unstructured":"Zhang, J., Xie, N., Zhang, X., Yue, K., Li, W., Kumar, D.: Machine learning based resource allocation of cloud computing in auction. CMC: Comput. Mater. Continua 56(1), 123\u2013135 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"10","key":"2_CR7","doi-asserted-by":"publisher","first-page":"2640","DOI":"10.1109\/TMC.2015.2506578","volume":"15","author":"K Zhu","year":"2016","unstructured":"Zhu, K., Hossain, E.: Virtualization of 5G cellular networks as a hierarchical combinatorial auction. IEEE Trans. Mob. Comput. 15(10), 2640\u20132654 (2016)","journal-title":"IEEE Trans. Mob. Comput."},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-540-92185-1_67","volume-title":"Internet and Network Economics","author":"M Salek","year":"2008","unstructured":"Salek, M., Kempe, D.: Auctions for share-averse bidders. In: Papadimitriou, C., Zhang, S. (eds.) WINE 2008. LNCS, vol. 5385, pp. 609\u2013620. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-92185-1_67"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Brocas, I.: Auctions with type-dependent and negative externalities: the optimal mechanism. SSRN Electron. J. (2007)","DOI":"10.2139\/ssrn.1031532"},{"issue":"5","key":"2_CR10","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1111\/1468-0262.00240","volume":"69","author":"P Jehiel","year":"2001","unstructured":"Jehiel, P., Moldovanu, B.: Efficient design with interdependent valuations. Econometrica 69(5), 1237\u20131259 (2001)","journal-title":"Econometrica"},{"issue":"2","key":"2_CR11","doi-asserted-by":"crossref","first-page":"283","DOI":"10.32604\/cmc.2018.03791","volume":"57","author":"B Wang","year":"2018","unstructured":"Wang, B., et al.: Research on hybrid model of garlic short-term price forecasting based on big data. CMC: Comput. Mater. Continua 57(2), 283\u2013296 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.elerap.2013.11.001","volume":"13","author":"J Pei","year":"2014","unstructured":"Pei, J., Klabjan, D., Xie, W.: Approximations to auctions of digital goods with share-averse bidders. Electron. Commer. Res. Appl. 13, 128\u2013138 (2014)","journal-title":"Electron. Commer. Res. Appl."},{"issue":"2","key":"2_CR13","first-page":"258","volume":"85","author":"P Jehiel","year":"1994","unstructured":"Jehiel, P., Moldovanu, B., Stacchetti, E.: Multidimensional mechanism design for auctions with externalities. Sonderforschungsbereich Publ. 85(2), 258\u2013293 (1994)","journal-title":"Sonderforschungsbereich Publ."},{"issue":"1","key":"2_CR14","first-page":"165","volume":"28","author":"T Sandholm","year":"2004","unstructured":"Sandholm, T.: Approaches to winner determination in combinatorial auctions. J. Ind. Eng. Eng. Manag. 28(1), 165\u2013176 (2004)","journal-title":"J. Ind. Eng. Eng. Manag."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24271-8_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,18]],"date-time":"2023-09-18T10:25:41Z","timestamp":1695032741000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24271-8_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242701","9783030242718"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24271-8_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}