{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:41:43Z","timestamp":1740123703378,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T00:00:00Z","timestamp":1510790400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Fundamental Research Funds for Central Universities","award":["2014ZDPY16"],"award-info":[{"award-number":["2014ZDPY16"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11036-017-0974-y","type":"journal-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T00:08:26Z","timestamp":1510790906000},"page":"599-610","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Cooperative Game-based Cheating in Full-duplex Relaying-based D2D Communication Underlaying Heterogeneous Cellular Networks"],"prefix":"10.1007","volume":"23","author":[{"given":"Bowen","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1389-3958","authenticated-orcid":false,"given":"Yanjing","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Song","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yanfen","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,16]]},"reference":[{"key":"974_CR1","unstructured":"Combinatorial optimization: polyhedra and efficiency. Springer (2004)"},{"key":"974_CR2","doi-asserted-by":"crossref","unstructured":"Alon N, Yuster R, Zwick U (1994) Color-coding: a new method for finding simple paths, cycles and other small subgraphs within large graphs. In: Twenty-Sixth ACM symposium on theory of computing. Montr\u00e9al, pp 326\u2013335","DOI":"10.1145\/195058.195179"},{"issue":"8","key":"974_CR3","first-page":"44","volume":"12","author":"BJ Bangjensen","year":"2010","unstructured":"Bangjensen B J, Gutin G (2010) Directed graphs: theory, algorithms and applications. Springer Berlin 12 (8):44\u201351","journal-title":"Springer Berlin"},{"issue":"1\u20132","key":"974_CR4","doi-asserted-by":"crossref","first-page":"222","DOI":"10.1007\/978-3-540-27836-8_21","volume":"3142","author":"A Bj\u00f6rklund","year":"2004","unstructured":"Bj\u00f6rklund A, Husfeldt T, Khanna S (2004) Approximating longest directed paths and cycles. Lect Notes Comput Sci 3142(1\u20132):222\u2013233","journal-title":"Lect Notes Comput Sci"},{"issue":"1","key":"974_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1006\/jagm.1993.1001","volume":"14","author":"HL Bodlaender","year":"1993","unstructured":"Bodlaender H L (1993) On linear time minor tests with depth-first search. J Algor 14(1):1\u201323","journal-title":"J Algor"},{"key":"974_CR6","unstructured":"Chen J, Lu S, Sze S H, Zhang F (2007) Improved algorithms for path, matching, and packing problems. In: Eighteenth Acm-Siam symposium on discrete algorithms, SODA 2007. New Orleans, pp 298\u2013307"},{"key":"974_CR7","unstructured":"Cormen T H, Leiserson C E, Rivest R L, Stein C (2001) Introduction to algorithms, 2nd edn. pp 1297\u20131305"},{"issue":"502","key":"974_CR8","first-page":"67","volume":"173","author":"R Diestel","year":"2011","unstructured":"Diestel R (2011) Graph theory. Math Gazette 173(502):67\u2013128","journal-title":"Math Gazette"},{"issue":"12","key":"974_CR9","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MCOM.2009.5350367","volume":"47","author":"K Doppler","year":"2010","unstructured":"Doppler K, Rinne M, Wijting C, Ribeiro C B (2010) Device-to-device communication as an underlay to lte-advanced networks. IEEE Commun Mag 47(12):42\u201349","journal-title":"IEEE Commun Mag"},{"key":"974_CR10","unstructured":"Duarte M (2012) Full-duplex wireless: design, implementation and characterization. Dissertations & Theses - Gradworks"},{"key":"974_CR11","doi-asserted-by":"crossref","unstructured":"Fodor G, Reider N (2011) A distributed power control scheme for cellular network assisted d2d communications. In: Global communications conference, GLOBECOM 2011. Houston, pp 1\u20136","DOI":"10.1109\/GLOCOM.2011.6133537"},{"issue":"69","key":"974_CR12","first-page":"9","volume":"120","author":"D Gale","year":"2013","unstructured":"Gale D, Shapley L S (2013) College admissions and the stability of marriage. Amer Math Monthly 120 (69):9\u201315","journal-title":"Amer Math Monthly"},{"key":"974_CR13","doi-asserted-by":"crossref","unstructured":"Goldsmith A (2005) Wireless communications, 1st edn","DOI":"10.1017\/CBO9780511841224"},{"key":"974_CR14","unstructured":"Gu Y, Zhang Y, Pan M, Han Z (2015) Cheating in matching of device to device pairs in cellular network. In: Global communications conference, pp 4910\u20134915"},{"issue":"10","key":"974_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSAC.2015.2461071","volume":"33","author":"Y Gu","year":"2015","unstructured":"Gu Y, Zhang Y, Pan M, Han Z (2015) Matching and cheating in device to device communications underlying cellular networks. IEEE J Select Areas Commun 33(10):1\u20131","journal-title":"IEEE J Select Areas Commun"},{"key":"974_CR16","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","volume":"3","author":"A Gupta","year":"2015","unstructured":"Gupta A, Jha R K (2015) A survey of 5g network: architecture and emerging technologies. Access IEEE 3:1206\u20131232","journal-title":"Access IEEE"},{"key":"974_CR17","volume-title":"Cheating by men in the Gale-Shapley stable matching algorithm","author":"CC Huang","year":"2006","unstructured":"Huang C C (2006) Cheating by men in the Gale-Shapley stable matching algorithm. Springer, Berlin"},{"key":"974_CR18","doi-asserted-by":"crossref","unstructured":"Kaufman B, Aazhang B (2008) Cellular networks with an overlaid device to device network. In: Asilomar conference on signals, systems and computers, pp 1537\u20131541","DOI":"10.1109\/ACSSC.2008.5074679"},{"key":"974_CR19","doi-asserted-by":"crossref","unstructured":"Koutis I (2008) Faster algebraic algorithms for path and packing problems. In: International colloquium on automata, languages and programming, pp 575\u2013586","DOI":"10.1007\/978-3-540-70575-8_47"},{"issue":"3","key":"974_CR20","first-page":"461","volume":"84","author":"EL Lawler","year":"2001","unstructured":"Lawler E L (2001) Combinatorial optimization. Netw Matroids 84(3):461\u2013463","journal-title":"Netw Matroids"},{"key":"974_CR21","doi-asserted-by":"crossref","unstructured":"Manlove D F (2013) Algorithmics of matching under preferences. world Scientific Pub Co","DOI":"10.1142\/8591"},{"key":"974_CR22","unstructured":"Massiot GC L, Vercauteren J, Men-Olivier L L, L\u00e9vy J, Guilhem J, Pascard C (2015) Game theory based radio resource allocation for full-duplex systems. In: Vehicular technology conference, pp 1\u20135"},{"issue":"7","key":"974_CR23","doi-asserted-by":"crossref","first-page":"3611","DOI":"10.1109\/TWC.2013.061713.121956","volume":"12","author":"Y Pei","year":"2013","unstructured":"Pei Y, Liang Y C (2013) Resource allocation for device-to-device communications overlaying two-way cellular networks. IEEE Trans Wirel Commun 12(7):3611\u20133621","journal-title":"IEEE Trans Wirel Commun"},{"issue":"9","key":"974_CR24","doi-asserted-by":"crossref","first-page":"3074","DOI":"10.1109\/TWC.2011.071411.102266","volume":"10","author":"T Riihonen","year":"2011","unstructured":"Riihonen T, Werner S, Wichman R (2011) Hybrid full-duplex\/half-duplex relaying with transmit power adaptation. Wireless Commun IEEE Trans 10(9):3074\u20133085","journal-title":"Wireless Commun IEEE Trans"},{"issue":"12","key":"974_CR25","doi-asserted-by":"crossref","first-page":"5983","DOI":"10.1109\/TSP.2011.2164910","volume":"59","author":"T Riihonen","year":"2011","unstructured":"Riihonen T, Werner S, Wichman R (2011) Mitigation of loopback self-interference in full-duplex mimo relays. Signal Process IEEE Trans 59(12):5983\u20135993","journal-title":"Signal Process IEEE Trans"},{"key":"974_CR26","unstructured":"Wang F, Song L, Han Z, Zhao Q (2013) Joint scheduling and resource allocation for device-to-device underlay communication. In: Wireless communications and networking conference, pp 134\u2013139"},{"issue":"6","key":"974_CR27","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/j.ipl.2008.11.004","volume":"109","author":"R Williams","year":"2009","unstructured":"Williams R (2009) Finding paths of length k in o*(2 k ) time. Inf Process Lett 109(6):315\u2013318","journal-title":"Inf Process Lett"},{"issue":"8","key":"974_CR28","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1109\/MCOM.2015.7180514","volume":"53","author":"D Wu","year":"2015","unstructured":"Wu D, He J, Wang H, Wang C (2015) A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks. IEEE Commun Mag 53(8):92\u201398","journal-title":"IEEE Commun Mag"},{"key":"974_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TVT.2015.2391053","volume":"65","author":"D Wu","year":"2016","unstructured":"Wu D, Wang Y, Wang H, Yang B (2016) Dynamic coding control in social intermittent connectivity wireless networks. IEEE Trans Veh Technol 65:1\u20131","journal-title":"IEEE Trans Veh Technol"},{"key":"974_CR30","doi-asserted-by":"publisher","unstructured":"Wu D, Yan J, Wang H, Wu D, Wang R (2017) Social attribute aware incentive mechanisms for video distribution in device-to-device communications. IEEE Trans Multimed. https:\/\/doi.org\/a10.1109\/TMM.2017.2692648","DOI":"10.1109\/TMM.2017.2692648"},{"issue":"12","key":"974_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/TWC.2016.2550028","volume":"15","author":"D Wu","year":"2016","unstructured":"Wu D, Zhang P, Wang H, Wang C, Wang R (2016) Node service ability aware packet forwarding mechanism in intermittently connected wireless networks. IEEE Trans Wirel Commun 15(12):1\u20131","journal-title":"IEEE Trans Wirel Commun"},{"issue":"9","key":"974_CR32","doi-asserted-by":"crossref","first-page":"348","DOI":"10.1109\/JSAC.2013.SUP.0513031","volume":"31","author":"C Xu","year":"2013","unstructured":"Xu C, Song L, Han Z, Zhao Q (2013) Efficiency resource allocation for device-to-device underlay communication systems: a reverse iterative combinatorial auction based approach. Select Areas Communi IEEE J 31(9):348\u2013358","journal-title":"Select Areas Communi IEEE J"},{"key":"974_CR33","unstructured":"Yin R (2014) Joint spectrum and power allocation for d2d communications underlaying cellular networks. In: ICC 2014 - 2014 IEEE International conference on communications, pp 5342\u20135347"},{"issue":"8","key":"974_CR34","doi-asserted-by":"crossref","first-page":"2752","DOI":"10.1109\/TWC.2011.060811.102120","volume":"10","author":"CH Yu","year":"2011","unstructured":"Yu C H, Doppler K, Ribeiro C B, Tirkkonen O (2011) Resource sharing optimization for device-to-device communication underlaying cellular networks. Wireless Commun IEEE Trans 10(8):2752\u20132763","journal-title":"Wireless Commun IEEE Trans"},{"issue":"10","key":"974_CR35","first-page":"1","volume":"64","author":"G Zhang","year":"2014","unstructured":"Zhang G, Yang K, Liu P, Wei J (2014) Power allocation for full-duplex relaying-based d2d communication underlaying cellular networks. Veh Technol IEEE Trans 64(10):1\u20131","journal-title":"Veh Technol IEEE Trans"},{"issue":"6","key":"974_CR36","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/MCOM.2015.7120046","volume":"53","author":"N Zhang","year":"2015","unstructured":"Zhang N, Cheng N, Gamage A T, Zhang K (2015) Cloud assisted hetnets toward 5g wireless networks. IEEE Commun Mag 53(6):59\u201365","journal-title":"IEEE Commun Mag"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11036-017-0974-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0974-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-017-0974-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T02:09:08Z","timestamp":1570327748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11036-017-0974-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,11,16]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["974"],"URL":"https:\/\/doi.org\/10.1007\/s11036-017-0974-y","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2017,11,16]]}}}