{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T21:10:01Z","timestamp":1748553001618,"version":"3.41.0"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319218366"},{"type":"electronic","value":"9783319218373"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-21837-3_17","type":"book-chapter","created":{"date-parts":[[2015,7,31]],"date-time":"2015-07-31T13:40:31Z","timestamp":1438350031000},"page":"165-174","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Estimation Based Adaptive ACB Scheme for M2M Communications"],"prefix":"10.1007","author":[{"given":"Hongliang","family":"He","sequence":"first","affiliation":[]},{"given":"Pinyi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Qinghe","family":"Du","sequence":"additional","affiliation":[]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,1]]},"reference":[{"issue":"15","key":"17_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. J. Comput. Netw. 54(15), 2787\u20132805 (2010)","journal-title":"J. Comput. Netw."},{"issue":"1","key":"17_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/SURV.2013.111313.00244","volume":"16","author":"A Laya","year":"2014","unstructured":"Laya, A., Alonso, L., Alonso-Zarate, J.: Is the random access channel of LTE and LTE-a suitable for M2M communications? a survey of alternatives. IEEE Commun. Surv. Tutorials 16(1), 4\u201316 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Xu, Q., Su, Z., Han, B., Fang, D., Xu, Z., Gan, X.: Analytical model with a novel selfishness division of mobile nodes to participate cooperation. Peer-to-Peer Networking and Applications, pp.1\u20139 (2015). 10.1007\/s12083-015-0330-6","DOI":"10.1007\/s12083-015-0330-6"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Su, Z., Xu, Q., Zhu, H., Wang, Y.: A novel design for content delivery over software defined mobile social networks. IEEE Network 29(4) (2015)","DOI":"10.1109\/MNET.2015.7166192"},{"issue":"3","key":"17_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MVT.2012.2204544","volume":"7","author":"AG Gotsis","year":"2012","unstructured":"Gotsis, A.G., Lioumpas, A.S., Alexiou, A.: M2M scheduling over LTE: challenges and new perspectives. IEEE Veh. Technol. 7(3), 34\u201339 (2012)","journal-title":"IEEE Veh. Technol."},{"issue":"4","key":"17_CR6","first-page":"4936","volume":"49","author":"G Wu","year":"2011","unstructured":"Wu, G., Talwar, S., Johnsson, K., Himayat, N., Johnson, K.: M2M: From mobile to embedded Internet. IEEE Commun. Mag. 49(4), 4936\u20134943 (2011)","journal-title":"IEEE Commun. Mag."},{"issue":"1","key":"17_CR7","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/TWC.2014.2328491","volume":"14","author":"DT Wiriaatmadja","year":"2015","unstructured":"Wiriaatmadja, D.T., Choi, K.W.: Hybrid random access and data transmission protocol for machine-to-machine communications in cellular networks. Ieee trans. wirel. commun. 14(1), 33\u201346 (2015)","journal-title":"Ieee trans. wirel. commun."},{"issue":"6","key":"17_CR8","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MCOM.2012.6211484","volume":"50","author":"M Cheng","year":"2012","unstructured":"Cheng, M., Lin, G., Wei, H., Hsu, A.: Overload control for machinetype-communications in LTE-advanced system. IEEE Commun. Mag. 50(6), 38\u201345 (2012)","journal-title":"IEEE Commun. Mag."},{"key":"17_CR9","unstructured":"3GPP TR 23.898 V7.0.0: Access class barring and overload protection (2005)"},{"issue":"6","key":"17_CR10","doi-asserted-by":"publisher","first-page":"1904","DOI":"10.1109\/TNET.2013.2241076","volume":"21","author":"H Wu","year":"2013","unstructured":"Wu, H., Zhu, C., La, R., Liu, X., Zhang, Y.: FASA: accelerated S-ALOHA using access history for event-driven M2M communications. IEEE\/ACM Trans. Netw. 21(6), 1904\u20131917 (2013)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"3","key":"17_CR11","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1109\/LCOMM.2011.011811.101798","volume":"15","author":"S Lien","year":"2011","unstructured":"Lien, S., Chen, K.: Massive access management for QoS guarantees in 3GPP machine-to-machine communications. IEEE. Commun. Lett. 15(3), 311\u2013313 (2011)","journal-title":"IEEE. Commun. Lett."},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Wang, G., Zhong, X., Mei, S., Wang, J.: An adaptive medium access control mechanism for cellular based machine to machine (M2M) communication. In: Proceedings of IEEE International Conference on Wireless Information Technology and Systems (ICWITS), pp. 1\u20134. IEEE Press, New York (2010)","DOI":"10.1109\/ICWITS.2010.5611820"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Duan, S., Shah-Mansouri, V., Wong, V.W.S.: Dynamic access class barring for M2M communications in LTE networks. In: IEEE Global Communications Conference (GLOBECOM), pp. 4747\u20134752. IEEE Press, New York (2013)","DOI":"10.1109\/GLOCOMW.2013.6855701"},{"issue":"1","key":"17_CR14","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/TWC.2011.111611.110350","volume":"11","author":"SY Lien","year":"2012","unstructured":"Lien, S.Y., Liau, T.H., Kao, C.Y., Chen, K.C.: Cooperative access class barring for machine-to-machine communications. IEEE Trans. Wirel. Commun. 11(1), 27\u201332 (2012)","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Phuyal, U., Koc, A.T., Fong, M., Vannithamby, R.: Controlling access overload and signaling congestion in M2M networks. Proceedings Conference Record of the Forty Sixth Asilomar Conference on Signals. Systems and Computers (ASILOMAR) 2012, pp. 591\u2013595. IEEE Press, New York (2010)","DOI":"10.1109\/ACSSC.2012.6489075"},{"key":"17_CR16","unstructured":"3GPP TSG RAN WG2 #71 R2\u2013104663, [70bis#11] LTE: MTC LTE simulations (2010)"}],"container-title":["Lecture Notes in Computer Science","Wireless Algorithms, Systems, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-21837-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T20:48:43Z","timestamp":1748551723000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-21837-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319218366","9783319218373"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-21837-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"1 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}