{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:32:01Z","timestamp":1742938321967,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319403519"},{"type":"electronic","value":"9783319403526"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-40352-6_8","type":"book-chapter","created":{"date-parts":[[2016,5,27]],"date-time":"2016-05-27T21:54:19Z","timestamp":1464386059000},"page":"91-103","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Fair Channel Sharing by Wi-Fi and LTE-U Networks with Equal Priority"],"prefix":"10.1007","author":[{"given":"Andrey","family":"Garnaev","sequence":"first","affiliation":[]},{"given":"Shweta","family":"Sagari","sequence":"additional","affiliation":[]},{"given":"Wade","family":"Trappe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"key":"8_CR1","unstructured":"Barbagallo, P., McElgunn, T.: 3Gpp Set to Study LTE over Unlicensed Technology, Sowing New Spectrum Battles. Bloomberg BNA, 10, September 2014. \n                    http:\/\/www.bna.com\/3gpp-set-study-n17179894699\/"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Cavalcante, A.M., et al.: Performance evaluation of LTE and Wi-Fi coexistence in unlicensed bands. In: IEEE 77th Vehicular Technology Conference (VTC Spring), pp. 1\u20136 (2013)","DOI":"10.1109\/VTCSpring.2013.6692702"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MCOM.2014.6957143","volume":"52","author":"FM Abinader","year":"2014","unstructured":"Abinader, F.M., et al.: Enabling the coexistence of LTE and Wi-Fi in unlicensed bands. IEEE Comm. Mag. 52, 54\u201361 (2014)","journal-title":"IEEE Comm. Mag."},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Liu, F., Bala, E., Erkip, E., Yang, R.: A framework for femtocells to access both licensed and unlicensed bands. In: International Symposium Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), pp. 407\u2013411 (2011)","DOI":"10.1109\/WIOPT.2011.5930053"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Hajmohammad, S., Elbiaze, H., Ajib, W.: Fine-tuning the femtocell performance in unlicensed bands: case of WiFi Vo-existence. In: International Wireless Communications and Mobile Computing Conference (IWCMC), pp. 250\u2013255 (2014)","DOI":"10.1109\/IWCMC.2014.6906365"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Hajmohammad, S., Elbiaze, H.: Unlicensed spectrum splitting between femtocell and WiFi. In: IEEE International Conference Communication (ICC), pp. 1883\u20131888 (2013)","DOI":"10.1109\/ICC.2013.6654796"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Jian, Y., Shih, C.-F., Krishnaswamy, B., Sivakumar, R.: Coexistence of Wi-Fi and LAA-LTE: experimental evaluation, analysis and insights. In: IEEE International Conference Communication (ICC), pp. 10387\u201310393 (2015)","DOI":"10.1109\/ICCW.2015.7247528"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cano, C., Leith, D.: Coexistence of WiFi and LTE in unlicensed bands: a proportional fair allocation scheme. In: IEEE International Conference Communication (ICC), pp. 10350\u201310355. IEEE (2015)","DOI":"10.1109\/ICCW.2015.7247522"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Sagari, S., Seskar, I., Raychaudhuri, D.: Modeling the coexistence of LTE and WiFi heterogeneous networks in dense deployment scenarios. In: Proceedings of IEEE International Conference Communication (ICC), pp. 10363\u201310368 (2015)","DOI":"10.1109\/ICCW.2015.7247524"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1587\/transcom.E97.B.251","volume":"E97\u2013B","author":"D Raychaudhuri","year":"2014","unstructured":"Raychaudhuri, D., Baid, A.: NASCOR: network assisted spectrum coordination service for coexistence between heterogeneous radio systems. IEICE Trans. Comm. E97\u2013B, 251\u2013260 (2014)","journal-title":"IEICE Trans. Comm."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Sagari, S., Baysting, S., Sahay, D., Seskar, I., Trappe, W., Raychaudhuri, D.: Coordinated dynamic spectrum management of LTE-U and Wi-Fi networks. In: IEEE International Conference on Dynamic Spectrum Access Network (DySPAN), pp. 209\u2013220 (2015)","DOI":"10.1109\/DySPAN.2015.7343904"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/SURV.2013.050113.00015","volume":"16","author":"S Huaizhou","year":"2014","unstructured":"Huaizhou, S., Prasad, R.V., Onur, E., Niemegeers, I.: Fairness in wireless networks: issues, measures and challenges. IEEE Commun. Surv. Tutorials 16, 5\u201324 (2014)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1109\/90.879343","volume":"8","author":"J Mo","year":"2000","unstructured":"Mo, J., Walrand, J.: Fair end-to-end window-based congestion control. IEEE\/ACM Trans. Networking 8, 556\u2013567 (2000)","journal-title":"IEEE\/ACM Trans. Networking"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"2281","DOI":"10.1007\/s11277-013-1467-3","volume":"75","author":"S Kim","year":"2014","unstructured":"Kim, S.: Multi-objective power control algorithm for femtocell networks. Wireless Pers. Commun. 75, 2281\u20132288 (2014)","journal-title":"Wireless Pers. Commun."},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Generalized \n                    \n                      \n                    \n                    $$\\alpha $$\n                    \n                      \n                        \u03b1\n                      \n                    \n                  -fair resource allocation in wireless networks. In: 47th IEEE Conference on Decision and Control (CDC), pp. 2414\u20132419 (2008)","DOI":"10.1109\/CDC.2008.4738709"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.peva.2009.08.002","volume":"67","author":"E Altman","year":"2010","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Fair resource allocation in wireless networks in the presence of a jammer. Perform. Eval. 67, 338\u2013349 (2010)","journal-title":"Perform. Eval."},{"key":"8_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-319-23440-3_9","volume-title":"Multiple Access Communications","author":"A Garnaev","year":"2015","unstructured":"Garnaev, A., Sagari, S., Trappe, W.: Fair allocation of throughput under harsh operational conditions. In: Jonsson, M., Vinel, A., Bellalta, B., Tirkkonen, O. (eds.) MACOM 2015. LNCS, vol. 9305, pp. 108\u2013119. Springer, Heidelberg (2015)"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"757","DOI":"10.1109\/TSP.2013.2290496","volume":"62","author":"S Yerramalli","year":"2014","unstructured":"Yerramalli, S., Jain, R., Mitra, U.: Coalitional games for transmitter cooperation in MIMO multiple access channels. IEEE Trans. Sign. Proc. 62, 757\u2013771 (2014)","journal-title":"IEEE Trans. Sign. Proc."},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Jamming in wireless networks: the case of several jammers. In: International Conference on Game Theory for Networks (GameNets 2009), pp. 585\u2013592 (2009)","DOI":"10.1109\/GAMENETS.2009.5137448"},{"key":"8_CR20","unstructured":"Garnaev, A., Hayel, Y., Altman, E.: A Bayesian jamming game in an OFDM wireless network. In: 10th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WIOPT), pp. 41\u201348 (2012)"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/978-3-642-00393-6_14","volume-title":"Network Control and Optimization","author":"E Altman","year":"2009","unstructured":"Altman, E., Avrachenkov, K., Garnaev, A.: Transmission power control game with SINR as objective function. In: Altman, E., Chaintreau, A. (eds.) NET-COOP 2008. LNCS, vol. 5425, pp. 112\u2013120. Springer, Heidelberg (2009)"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Garnaev, A., Trappe, W., Kung, C.-T.: Dependence of optimal monitoring strategy on the application to be protected. In: IEEE Global Communications Conference (GLOBECOM), pp. 1054\u20131059 (2012)","DOI":"10.1109\/GLOCOM.2012.6503252"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"1064","DOI":"10.1109\/TIFS.2015.2398360","volume":"10","author":"A Garnaev","year":"2015","unstructured":"Garnaev, A., Trappe, W.: One-time spectrum coexistence in dynamic spectrum access when the secondary user may be malicious. IEEE Trans. Inf. Forensics Secur. 10, 1064\u20131075 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR24","doi-asserted-by":"publisher","first-page":"837","DOI":"10.1109\/TIFS.2015.2510959","volume":"11","author":"A Garnaev","year":"2016","unstructured":"Garnaev, A., Trappe, W.: A bandwidth monitoring strategy under uncertainty of the adversary\u2019s activity. IEEE Trans. Inf. Forensics Secur. 11, 837\u2013849 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Marina, N., Arslan, G., Kavcic, A.: A power allocation game in a four node relaynetwork: an upper bound on the worst-case equilibrium efficiency. In: Conference onTelecommunications (ICT), pp. 1\u20136 (2008)","DOI":"10.1109\/ICTEL.2008.4652675"},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/TIFS.2014.2329241","volume":"9","author":"A Garnaev","year":"2014","unstructured":"Garnaev, A., Baykal-Gursoy, M., Poor, H.V.: Incorporating attack-type uncertainty into network protection. IEEE Trans. Inf. Forensics Secur. 9, 1278\u20131287 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cognitive Radio Oriented Wireless Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-40352-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T09:30:27Z","timestamp":1558517427000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-40352-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319403519","9783319403526"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-40352-6_8","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"29 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CrownCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cognitive Radio Oriented Wireless Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenoble","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 May 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 June 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crowncom2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}