{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T20:00:21Z","timestamp":1648929621662},"reference-count":34,"publisher":"Oxford University Press (OUP)","license":[{"start":{"date-parts":[[2019,1,11]],"date-time":"2019-01-11T00:00:00Z","timestamp":1547164800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/open_access\/funder_policies\/chorus\/standard_publication_model"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1093\/comjnl\/bxy139","type":"journal-article","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T12:07:32Z","timestamp":1546085252000},"source":"Crossref","is-referenced-by-count":1,"title":["Redundancy-Aware and Budget-Feasible Incentive Mechanism in Crowd Sensing"],"prefix":"10.1093","author":[{"given":"Juan","family":"Li","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Yanmin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jiadi","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"286","published-online":{"date-parts":[[2019,1,11]]},"reference":[{"key":"key\n\t\t\t\t2019012510555943300_bxy139C1","author":"Burger","year":"2011"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C2","author":"Developers, A","year":"2018"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C3","author":"Predic","year":"2013"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C4","author":"Kandappu","year":"2016"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C5","author":"Kandappu","year":"2016"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C6","author":"Zhou","year":"2013"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C7","author":"Rana","year":"2010"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C8","author":"Yan","year":"2009"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C9","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/COMST.2015.2415528","article-title":"Incentives for mobile crowd sensing: a survey","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C10","doi-asserted-by":"crossref","first-page":"370","DOI":"10.1109\/JIOT.2015.2409151","article-title":"A survey of incentive techniques for mobile crowd sensing","volume":"2","author":"Jaimes","year":"2015","journal-title":"IEEE Internet Things J."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C11","author":"Jaimes","year":"2012"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C12","doi-asserted-by":"crossref","first-page":"2764","DOI":"10.1109\/TMC.2017.2653774","article-title":"Crowdsourcing sensing to smartphones: a randomized auction approach","volume":"16","author":"Li","year":"2017","journal-title":"IEEE Trans. Mobile Comput."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C13","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1109\/TNET.2014.2379281","article-title":"Budget-feasible online incentive mechanisms for crowdsourcing tasks truthfully","volume":"24","author":"Zhao","year":"2016","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C14","author":"Feng","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C15","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1002\/dac.3001","article-title":"Marginal quality-based long-term incentive mechanisms for crowd sensing","volume":"29","author":"Sun","year":"2016","journal-title":"Int. J. Commun. Syst."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C16","author":"He","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C17","author":"Luo","year":"2012"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C18","author":"Singer","year":"2010"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C19","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1016\/j.geb.2007.12.009","article-title":"Truthful approximation mechanisms for restricted combinatorial auctions","volume":"64","author":"Mu\u2019alem","year":"2008","journal-title":"Games Econ. Behav."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C20","author":"Archer","year":"2001"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C21","year":"2007"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C22","volume-title":"Algorithmic Game Theory","author":"Nisan","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C23","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1145\/1284320.1284321","article-title":"Adwords and generalized online matching","volume":"54","author":"Mehta","year":"2007","journal-title":"J. ACM"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C24","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/S0020-0190(99)00031-9","article-title":"The budgeted maximum coverage problem","volume":"70","author":"Khuller","year":"1999","journal-title":"Inf. Process. Lett."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C25","first-page":"555","article-title":"Utilization and fairness in spectrum assignment for opportunistic spectrum access","volume":"11","author":"Peng","year":"2006","journal-title":"MONET"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C26","author":"Song","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C27","author":"Sun","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C28","author":"Li","year":"2014"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C29","author":"Lee","year":"2010"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C30","doi-asserted-by":"crossref","first-page":"1633","DOI":"10.1016\/j.adhoc.2011.05.010","article-title":"Fair content dissemination in participatory DTNs","volume":"1","author":"Mashhadi","year":"2012","journal-title":"Ad Hoc Netw."},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C31","author":"Li","year":"2015"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C32","author":"Yang","year":"2012"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C33","author":"Koutsopoulos","year":"2013"},{"key":"key\n\t\t\t\t2019012510555943300_bxy139C34","author":"Zhao","year":"2014"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/advance-article-pdf\/doi\/10.1093\/comjnl\/bxy139\/27495135\/bxy139.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T07:22:28Z","timestamp":1573629748000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/advance-article\/doi\/10.1093\/comjnl\/bxy139\/5288327"}},"subtitle":[],"editor":[{"given":"Petra","family":"Berenbrink","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2019,1,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy139","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,11]]}}}