{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:31:01Z","timestamp":1742801461238},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319077819"},{"type":"electronic","value":"9783319077826"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07782-6_55","type":"book-chapter","created":{"date-parts":[[2014,6,18]],"date-time":"2014-06-18T21:26:14Z","timestamp":1403126774000},"page":"613-623","source":"Crossref","is-referenced-by-count":3,"title":["A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus"],"prefix":"10.1007","author":[{"given":"Jun","family":"Huang","sequence":"first","affiliation":[]},{"given":"Zi","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Jibi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qianbin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Qiang","family":"Duan","sequence":"additional","affiliation":[]},{"given":"Yanxiao","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"55_CR1","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1109\/MCOM.2012.6163598","volume":"50","author":"G. Fodor","year":"2012","unstructured":"Fodor, G., Dahlman, E., Mildh, G., Parkvall, S., Reider, N., Miklos, G., Turanyi, Z.: Design aspects of network assisted device-to-device communications. IEEE Communications Magazine\u00a050, 170\u2013177 (2012)","journal-title":"IEEE Communications Magazine"},{"key":"55_CR2","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MCOM.2009.5350367","volume":"47","author":"K. Doppler","year":"2009","unstructured":"Doppler, K., Rinne, M., Wijting, C., Ribeiro, C., Hugl, K.: Device-to-device communication as an underlay to lte-advanced networks. IEEE Communications Magazine\u00a047, 42\u201349 (2009)","journal-title":"IEEE Communications Magazine"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Fodor, G., Della Penda, D., Belleschi, M., Johansson, M., Abrardo, A.: A comparative study of power control approaches for device-to-device communications. In: 2013 IEEE International Conference on Communications (ICC), pp. 6008\u20136013 (June 2013)","DOI":"10.1109\/ICC.2013.6655561"},{"key":"55_CR4","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1109\/MWC.2013.6590055","volume":"20","author":"P. Phunchongharn","year":"2013","unstructured":"Phunchongharn, P., Hossain, E., Kim, D.: Resource allocation for device-to-device communications underlaying lte-advanced networks. IEEE Wireless Communications\u00a020, 91\u2013100 (2013)","journal-title":"IEEE Wireless Communications"},{"key":"55_CR5","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1109\/JSAC.2013.SUP.0513031","volume":"31","author":"C. Xu","year":"2013","unstructured":"Xu, C., Song, L., Han, Z., Zhao, Q., Wang, X., Cheng, X., Jiao, B.: Efficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach. IEEE Journal on Selected Areas in Communications\u00a031, 348\u2013358 (2013)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"55_CR6","doi-asserted-by":"publisher","first-page":"3611","DOI":"10.1109\/TWC.2013.061713.121956","volume":"12","author":"Y. Pei","year":"2013","unstructured":"Pei, Y., Liang, Y.-C.: Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Transactions on Wireless Communications\u00a012, 3611\u20133621 (2013)","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"5","key":"55_CR7","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1109\/9.284868","volume":"39","author":"C.-S. Chang","year":"1994","unstructured":"Chang, C.-S.: Stability, queue length, and delay of deterministic and stochastic queueing networks. IEEE Transactions on Automatic Control\u00a039(5), 913\u2013931 (1994)","journal-title":"IEEE Transactions on Automatic Control"},{"issue":"1","key":"55_CR8","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1109\/18.61109","volume":"37","author":"R. Cruz","year":"1991","unstructured":"Cruz, R.: A calculus for network delay. i. network elements in isolation. IEEE Transactions on Information Theory\u00a037(1), 114\u2013131 (1991)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"1","key":"55_CR9","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1109\/18.61110","volume":"37","author":"R. Cruz","year":"1991","unstructured":"Cruz, R.: A calculus for network delay, part ii: Network analysis. IEEE Transactions on Information Theory\u00a037(1), 132\u2013144 (1991)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"55_CR10","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1109\/90.779197","volume":"7","author":"R. Agrawal","year":"1999","unstructured":"Agrawal, R., Cruz, R.L., Okino, C., Rajan, R.: Performance bonds for flow control protocols. IEEE\/ACM Trans. Netw.\u00a07(3), 310\u2013323 (1999)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"55_CR11","volume-title":"Stochastic network calculus","author":"Y. Jiang","year":"2008","unstructured":"Jiang, Y., Liu, Y.: Stochastic network calculus. Springer, London (2008)"},{"key":"55_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45318-0","volume-title":"Network Calculus","author":"J.-Y. Boudec Le","year":"2001","unstructured":"Le Boudec, J.-Y., Thiran, P.: Network Calculus. LNCS, vol.\u00a02050. Springer, Heidelberg (2001)"},{"issue":"3","key":"55_CR13","doi-asserted-by":"publisher","first-page":"1087","DOI":"10.1109\/18.669170","volume":"44","author":"J.-Y. Boudec Le","year":"1998","unstructured":"Le Boudec, J.-Y.: Application of network calculus to guaranteed service networks. IEEE Transactions on Information Theory\u00a044(3), 1087\u20131096 (1998)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07782-6_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T03:17:52Z","timestamp":1558927072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07782-6_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319077819","9783319077826"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07782-6_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}