{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:14:44Z","timestamp":1758845684974,"version":"3.37.3"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T00:00:00Z","timestamp":1523491200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2017R1D1A1B03028184"],"award-info":[{"award-number":["2017R1D1A1B03028184"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002643","name":"Kwangwoon University","doi-asserted-by":"publisher","award":["Sabbatical Grant"],"award-info":[{"award-number":["Sabbatical Grant"]}],"id":[{"id":"10.13039\/501100002643","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Jiangsu Higher Education Institutions","award":["16KJB520044"],"award-info":[{"award-number":["16KJB520044"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s11277-018-5746-x","type":"journal-article","created":{"date-parts":[[2018,4,12]],"date-time":"2018-04-12T11:49:49Z","timestamp":1523533789000},"page":"1367-1381","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Hidden Terminal Aware Clustering for Large-scale D2D Networks"],"prefix":"10.1007","volume":"107","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5925-1854","authenticated-orcid":false,"given":"Seung Hyong","family":"Rhee","sequence":"first","affiliation":[]},{"given":"Xiaoying","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,12]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Asadi, A., & Mancuso, V. (2013). WiFi direct and LTE D2D in action. In 2013 IFIP Wireless Days (WD) (pp. 1\u20138) IEEE.","key":"5746_CR1","DOI":"10.1109\/WD.2013.6686520"},{"issue":"3","key":"5746_CR2","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1109\/MWC.2013.6549288","volume":"20","author":"D Camps-Mur","year":"2013","unstructured":"Camps-Mur, D., Garcia-Saavedra, A., & Serrano, P. (2013). Device-to-device communications with Wi-Fi Direct: Overview and experimentation. IEEE Wireless Communications, 20(3), 96\u2013104.","journal-title":"IEEE Wireless Communications"},{"doi-asserted-by":"crossref","unstructured":"Liu, K., et al. (2016). Development of mobile Ad-hoc networks over Wi-Fi direct with off-the-shelf android phones. In 2016 IEEE International Conference on Communications (ICC) (pp. 1\u20136) IEEE.","key":"5746_CR3","DOI":"10.1109\/ICC.2016.7511190"},{"unstructured":"IEEE 802.11-2012. Part 11: Wireless LAN medium access control (MAC) and physical layer (PHY) specifications. IEEE (2012).","key":"5746_CR4"},{"doi-asserted-by":"crossref","unstructured":"Wang, X., Derakhshani, M., & Le-Ngoc, T. (2014). Self-organizing channel assignment for high density 802.11 WLANs. In 2014 IEEE 25th annual international symposium on personal, indoor, and mobile radio communication (PIMRC) (pp. 1637\u20131641) IEEE.","key":"5746_CR5","DOI":"10.1109\/PIMRC.2014.7136430"},{"issue":"11\u201312","key":"5746_CR6","doi-asserted-by":"publisher","first-page":"2720","DOI":"10.1016\/j.mcm.2011.08.048","volume":"57","author":"D-J Deng","year":"2013","unstructured":"Deng, D.-J., Chen, Y.-S., & Wong, Y.-S. (2013). Adaptive channel allocation strategy for mobile ad hoc networks. Mathematical and Computer Modeling, 57(11\u201312), 2720\u20132730.","journal-title":"Mathematical and Computer Modeling"},{"issue":"8","key":"5746_CR7","first-page":"1","volume":"2015","author":"X Lei","year":"2015","unstructured":"Lei, X., & Rhee, S. H. (2015). Performance enhancement of overlapping BSSs via dynamic transmit power control. EURASIP Journal on Wireless Communications and Networking, 2015(8), 1\u20138.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"5746_CR8","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.adhoc.2017.06.001","volume":"63","author":"J Marchanga","year":"2017","unstructured":"Marchanga, J., Ghita, B., & Lancaster, D. (2017). Location based transmission using a neighbor aware with optimized EIFS MAC for ad hoc networks. Ad Hoc Networks, 63, 62\u201378.","journal-title":"Ad Hoc Networks"},{"issue":"2","key":"5746_CR9","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/TMC.2016.2557780","volume":"16","author":"C-K Chau","year":"2017","unstructured":"Chau, C.-K., et al. (2017). Effective static and adaptive carrier sensing for dense wireless CSMA networks. IEEE Transactions on Mobile Computing, 16(2), 355\u2013366.","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"26","key":"5746_CR10","first-page":"1","volume":"2016","author":"X Lei","year":"2016","unstructured":"Lei, X., & Rhee, S. H. (2016). Improving the IEEE 802.11 power-saving mechanism in the presence of hidden terminals. EURASIP Journal on Wireless Communications and Networking, 2016(26), 1\u201310.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"key":"5746_CR11","doi-asserted-by":"publisher","first-page":"12597","DOI":"10.1155\/2007\/12597","volume":"2007","author":"Y Yuan","year":"2007","unstructured":"Yuan, Y., Arbaugh, W. A., & Lu, S. (2007). Towards scalable MAC design for High-speed Wireless LANs. EURASIP Journal on Wireless Communications and Networking, 2007, 12597.","journal-title":"EURASIP Journal on Wireless Communications and Networking"},{"issue":"12","key":"5746_CR12","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1109\/TMC.2011.264","volume":"2","author":"Z Abichar","year":"2013","unstructured":"Abichar, Z., & Chang, J. M. (2013). Group-based medium access control for IEEE 802.11n wireless LANs. IEEE Transactions on Computing, 2(12), 304\u2013317.","journal-title":"IEEE Transactions on Computing"},{"issue":"7","key":"5746_CR13","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1109\/JSAC.2014.2332047","volume":"32","author":"Y Yang","year":"2014","unstructured":"Yang, Y., & Roy, S. (2014). Grouping-based MAC protocols for EV charging data transmission in smart metering network. IEEE Journal on Selected Areas in Communications, 32(7), 1328\u20131343.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"5","key":"5746_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.comnet.2016.05.011","volume":"105","author":"S-G Yoon","year":"2016","unstructured":"Yoon, S.-G., Seo, J.-O., & Bahk, S. (2016). Regrouping algorithm to alleviate the hidden node problem in 802.11ah networks. Computer Networks, 105(5), 22\u201332.","journal-title":"Computer Networks"},{"issue":"5","key":"5746_CR15","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1016\/j.comnet.2016.09.006","volume":"108","author":"W Damayanti","year":"2016","unstructured":"Damayanti, W., Kim, S., & Yun, J.-H. (2016). Collision chain mitigation and hidden device-aware grouping in large-scale IEEE 802.11ah networks. Computer Networks, 108(5), 296\u2013306.","journal-title":"Computer Networks"},{"issue":"5","key":"5746_CR16","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1109\/TC.2003.1197122","volume":"52","author":"Y-C Tseng","year":"2003","unstructured":"Tseng, Y.-C., Ni, S.-Y., & Shih, E.-Y. (2003). Adaptive approaches to relieving broadcast storms in a wireless multihop mobile Ad hoc network. IEEE Transactions on Computer, 52(5), 545\u2013557.","journal-title":"IEEE Transactions on Computer"},{"key":"5746_CR17","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1109\/49.840210","volume":"18","author":"Giusepe Bianchi","year":"2000","unstructured":"Bianchi, Giusepe. (2000). Performance analysis of the IEEE 802.11 distributed coordination function. IEEE Journal on Selected Areas in Communications, 18, 535\u2013547.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"unstructured":"OPNET modeler. \n                              www.riverbed.com\n                              \n                           . Accessed 1 Feb 2018.","key":"5746_CR18"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5746-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-018-5746-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-018-5746-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,25]],"date-time":"2019-09-25T11:25:59Z","timestamp":1569410759000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-018-5746-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,12]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["5746"],"URL":"https:\/\/doi.org\/10.1007\/s11277-018-5746-x","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"type":"print","value":"0929-6212"},{"type":"electronic","value":"1572-834X"}],"subject":[],"published":{"date-parts":[[2018,4,12]]},"assertion":[{"value":"12 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}