{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:22:23Z","timestamp":1761744143035},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2015,9,12]],"date-time":"2015-09-12T00:00:00Z","timestamp":1442016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s00779-015-0872-x","type":"journal-article","created":{"date-parts":[[2015,9,12]],"date-time":"2015-09-12T03:37:45Z","timestamp":1442029065000},"page":"1033-1043","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["Interference-controlled D2D routing aided by knowledge extraction at cellular infrastructure towards ubiquitous CPS"],"prefix":"10.1007","volume":"19","author":[{"given":"Qinghe","family":"Du","sequence":"first","affiliation":[]},{"given":"Houbing","family":"Song","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Pinyi","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Li","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,12]]},"reference":[{"key":"872_CR1","unstructured":"3GPP TR 36.843: Study on LTE Device-to-Device Proximity Services\u201d, Mar 2014"},{"issue":"8","key":"872_CR2","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TWC.2011.060811.102120","volume":"10","author":"CH Yu","year":"2011","unstructured":"Yu CH, Doppler K, Ribeiro CB, Tirkkonen O (2011) Resource sharing optimization for device-to-device communication underlaying cellular networks. IEEE Trans Wirel Commun 10(8):2752\u20132763","journal-title":"IEEE Trans Wirel Commun"},{"issue":"2","key":"872_CR3","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1109\/TWC.2011.122010.100963","volume":"10","author":"H Min","year":"2011","unstructured":"Min H, Seo W, Lee J, Park S, Hong D (2011) Reliability improvement using receive mode selection in the device-to-device uplink period underlaying cellular networks. IEEE Trans Wirel Commun 10(2):413\u2013418","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"872_CR4","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1109\/TWC.2012.011513.120063","volume":"12","author":"B Kaufman","year":"2013","unstructured":"Kaufman B, Lilleberg J, Aazhang B (2013) Spectrum sharing scheme between cellular users and ad-hoc device-to-device users. IEEE Trans Wirel Commun 12(3):1038\u20131049","journal-title":"IEEE Trans Wirel Commun"},{"issue":"3","key":"872_CR5","first-page":"169","volume":"2","author":"P Janis","year":"2009","unstructured":"Janis P, Yu C-H, Doppler K, Ribeiro CB, Wijting C, Hugl K, Tirkkonen O, Koivunen V (2009) Device-to-device communication underlaying cellular communications systems. Int J Commun Netw Syst Sci 2(3):169\u2013178","journal-title":"Int J Commun Netw Syst Sci"},{"key":"872_CR6","doi-asserted-by":"crossref","unstructured":"Koskela T, Hakola S, Chen T, Lehtomaki J. (2010) Clustering concept using device-to-device communication in cellular system In: Proceedings of IEEE WCNC, pp. 1\u20136","DOI":"10.1109\/WCNC.2010.5506183"},{"key":"872_CR7","unstructured":"Fitzek FHP, Katz M, Zhang Q (2006) Cellular controlled short-range communication for cooperative P2P networking. In: Proceedings of wireless world research forum, vol. 17, pp. 1\u20135"},{"issue":"8","key":"872_CR8","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TWC.2011.060811.102120","volume":"10","author":"C-H Yu","year":"2011","unstructured":"Yu C-H, Doppler K, Ribeiro CB, Trikkonen O (2011) Resource sharing optimization for device-to-device communication underlying cellular networks. IEEE Trans Wirel Commun 10(8):2752\u20132763","journal-title":"IEEE Trans Wirel Commun"},{"key":"872_CR9","doi-asserted-by":"crossref","unstructured":"Yu C-H, Doppler K, Tirkkonen O, Riberro C (2009) Power optimization of device-to-device communication underlaying cellular communication. In: Proceedings of IEEE ICC 2009, pp.1-5","DOI":"10.1109\/ICC.2009.5199353"},{"key":"872_CR10","doi-asserted-by":"crossref","unstructured":"Yu C-H, Tirkkonen O, Doppler K, Ribeiro CB (2009) On the performance of device-to-device underlay communication with simple power control. In: Proceedings of IEEE VTC, Spring, 2009, pp. 1-5","DOI":"10.1109\/VETECS.2009.5073734"},{"key":"872_CR11","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2011","unstructured":"Han J, Kamber M, Pei J (2011) Data mining: concepts and techniques, 3rd edn. Morgan Kaufmann, Burlington","edition":"3"},{"issue":"1","key":"872_CR12","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/TWC.2010.01.090180","volume":"9","author":"M Xie","year":"2010","unstructured":"Xie M, Zhang W, Wong K-K (2010) A geometric approach to improve spectrum efficiency for cognitive relay networks. IEEE Trans Wirel Commun 9(1):268\u2013281","journal-title":"IEEE Trans Wirel Commun"},{"key":"872_CR13","volume-title":"Computer networks","author":"S Tanenbaum Andrew","year":"2003","unstructured":"Tanenbaum Andrew S (2003) Computer networks, 4th edn. Prentice Hall, Upper Saddle River 2003","edition":"4"},{"key":"872_CR14","volume-title":"Introduction to algorithms","author":"TH Cormen","year":"2001","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C (2001) Introduction to algorithms, 2nd edn. MIT Press, Cambridge","edition":"2"},{"key":"872_CR15","doi-asserted-by":"crossref","DOI":"10.1002\/9780470742891","volume-title":"LTE\u2014the UMTS long term evolution: rom theory to practice","author":"S Sesia","year":"2009","unstructured":"Sesia S, Toufik I, Baker M (2009) LTE\u2014the UMTS long term evolution: rom theory to practice. Wiley, Hoboken"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0872-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-015-0872-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0872-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-015-0872-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T07:59:56Z","timestamp":1567151996000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-015-0872-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,12]]},"references-count":15,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["872"],"URL":"https:\/\/doi.org\/10.1007\/s00779-015-0872-x","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,12]]}}}