{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T04:20:44Z","timestamp":1751516444134,"version":"3.41.0"},"reference-count":404,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"European H2020 Research and Innovation Project COHERENT","award":["H2020-ICT-671639"],"award-info":[{"award-number":["H2020-ICT-671639"]}]},{"name":"Self-Funded Future Communications Growth Area Project"},{"name":"AFORM5 Project of the VTT Technical Research Centre of Finland, Ltd."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2018.2816605","type":"journal-article","created":{"date-parts":[[2018,3,16]],"date-time":"2018-03-16T19:35:47Z","timestamp":1521228947000},"page":"17464-17499","source":"Crossref","is-referenced-by-count":25,"title":["Multidisciplinary and Historical Perspectives for Developing Intelligent and Resource-Efficient Systems"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6659-4126","authenticated-orcid":false,"given":"Aarne","family":"Mammela","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1694-9152","authenticated-orcid":false,"given":"Jukka","family":"Riekki","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8892-9142","authenticated-orcid":false,"given":"Adrian","family":"Kotelba","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0575-9409","authenticated-orcid":false,"given":"Antti","family":"Anttonen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2304638"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuron.2014.06.001"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1007\/s12559-016-9411-y"},{"key":"ref276","doi-asserted-by":"publisher","DOI":"10.1145\/2601069"},{"key":"ref271","first-page":"164","article-title":"The second cybernetics: Deviation-amplifying mutual causal processes","volume":"5","author":"maruyama","year":"1963","journal-title":"Amer Scientist"},{"key":"ref270","first-page":"20","article-title":"On Shannon and &#x2018;Shannon&#x2019;s formula","volume":"98","author":"lundheim","year":"2002","journal-title":"Telektronikk"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.040310.00002"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-2236(98)01300-9"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1037\/11592-000"},{"key":"ref172","first-page":"95","article-title":"A short history of computational complexity","volume":"80","author":"fortnow","year":"2003","journal-title":"Bull Eur Assoc Theor Comput Sci"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/358141.358144"},{"journal-title":"Beyond Reason Eight Great Problems that Reveal the Limits of Science","year":"2004","author":"dewdney","key":"ref174"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804106"},{"journal-title":"The Incomputable Journeys Beyond the Turing Barrier","year":"2017","author":"cooper","key":"ref176"},{"journal-title":"Computation and Its Limits","year":"2015","author":"cockshott","key":"ref175"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.04.001"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1631\/FITEE.1700053"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6122545"},{"journal-title":"Computational Intelligence Concepts to Implementations","year":"2007","author":"eberhart","key":"ref169"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1007\/BF02169018"},{"journal-title":"Software and Systems Engineering Vocabulary (SE VOCAB)","year":"2017","key":"ref268"},{"journal-title":"IEEE Standards Dictionary","year":"2017","key":"ref269"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1093\/imamci\/9.4.275"},{"key":"ref287","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.012614.130580"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2009.933093"},{"key":"ref285","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1038\/nature24270","article-title":"Mastering the game of go without human knowledge","volume":"550","author":"silver","year":"2017","journal-title":"Nature"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-011-0940-9"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v31i3.2303"},{"key":"ref180","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/3-540-48157-5_29","article-title":"Towards a better understanding of context and context-awareness","volume":"1707","author":"abowd","year":"1999","journal-title":"Handheld and Ubiquitous Computing"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2015.2391182"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2015.7095188"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1016\/S0960-9822(03)00135-0"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008855018923"},{"journal-title":"Largest neuronal network simulation achieved using K computer","year":"2013","key":"ref280"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0013570"},{"key":"ref183","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888900008122"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.909913"},{"journal-title":"An Introduction to Multiagent Systems","year":"2009","author":"wooldridge","key":"ref189"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008942012299"},{"key":"ref187","first-page":"79","article-title":"Multiagent systems","volume":"19","author":"sycara","year":"1998","journal-title":"AI Mag"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010090405266"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/1978802.1978815"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.1701329"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1126\/science.1254642"},{"key":"ref293","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1007\/s12559-009-9009-8","article-title":"Hyperdimensional computing: An introduction to computing in distributed representation with high-dimensional random vectors","volume":"1","author":"kanerva","year":"2009","journal-title":"Cognit Comput"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1109\/49.345864"},{"journal-title":"Communication Systems and Techniques","year":"1966","author":"schwartz","key":"ref295"},{"journal-title":"Fundamentals of Statistical Signal Processing Estimation Theory","year":"1993","author":"kay","key":"ref294"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1958.1105168"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1109\/TAI.1957.6367242"},{"journal-title":"Self-Organizing Control of Stochastic Systems","year":"1977","author":"saridis","key":"ref299"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1959.6429404"},{"journal-title":"Introduction to AI Robotics","year":"2000","author":"murphy","key":"ref154"},{"key":"ref153","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-319-58475-1_1","article-title":"System latency guidelines then and now&#x2014;Is zero latency really considered necessary?","author":"attig","year":"2017","journal-title":"Engineering Psychology and Cognitive Ergonomics Cognition and Design"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1016\/S0921-8890(02)00372-X"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/34.982903"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/TRO.2009.2033627"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2497316"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.1994.582864"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-0579-1"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/29.31293"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4158(98)00045-2"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2006.06.027"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/MIM.2007.339540"},{"key":"ref149","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-22658-8","author":"el saddik","year":"2011","journal-title":"Haptics Technologies Bringing Touch to Multimedia"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9792"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1987.6499280"},{"journal-title":"Machine Learning An Algorithmic Perspective","year":"2015","author":"marsland","key":"ref166"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-013-1362-6"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/s11023-007-9079-x"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-07807-5"},{"journal-title":"The Quest for Artificial Intelligence A History of Ideas and Achievements","year":"2010","author":"nilsson","key":"ref162"},{"journal-title":"Machines Who Think A Personal Inquiry into the History and Prospects of Artificial Intelligence","year":"2004","author":"mccorduck","key":"ref161"},{"journal-title":"Thinking Machines The Evolution of Artificial Intelligence","year":"1987","author":"pratt","key":"ref160"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2016.04.018"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.809198"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/s10846-008-9235-4"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2398816"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790423"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1002\/0471722243"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1145\/1380584.1380585"},{"key":"ref194","first-page":"75","article-title":"Potential of cognitive computing and cognitive systems","volume":"5","author":"noor","year":"2015","journal-title":"Open Eng"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2160929"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2322503"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2219061"},{"journal-title":"Multiagent Systems A Modern Approach to Distributed Artificial Intelligence","year":"1999","author":"weiss","key":"ref191"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.5772\/57313"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1002\/0471783021"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199794546.001.0001"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1038\/nrn3214"},{"journal-title":"Digital Communications","year":"2001","author":"sklar","key":"ref209"},{"key":"ref203","volume":"1","author":"comer","year":"2000","journal-title":"Internetworking With TCP\/IP"},{"key":"ref204","volume":"1","author":"fall","year":"2012","journal-title":"TCP\/IP Illustrated The Protocols"},{"key":"ref403","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2352118"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/37.898790"},{"key":"ref404","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.06.010"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1002\/9780470021804"},{"journal-title":"Evolved Universal Terrestrial Radio Access (EUTRA) User Equipment (UE) Radio Access Capabilities","year":"2017","key":"ref401"},{"journal-title":"Principles of Digital Transmission","year":"1999","author":"benedetto","key":"ref207"},{"key":"ref402","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600510CM"},{"journal-title":"Digital Communications","year":"2001","author":"proakis","key":"ref208"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1002\/9781119992943"},{"key":"ref400","doi-asserted-by":"publisher","DOI":"10.1145\/2342441.2342443"},{"journal-title":"4G LTE\/LTE-Advanced for Mobile Broadband","year":"2014","author":"dahlman","key":"ref206"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2015.7054719"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"journal-title":"Network Science","year":"2016","author":"barabasi","key":"ref212"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6658648"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/2559899.2560327"},{"key":"ref215","first-page":"27:1","article-title":"Software-defined networking paradigms in wireless networks: A survey","volume":"47","author":"jagadeesan","year":"2014","journal-title":"ACM Comput Surv"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2320094"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2014.012214.00180"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2371999"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2330903"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2451514"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1986.1092925"},{"key":"ref221","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1978.11151"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6710069"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6507392"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.021312.00116"},{"key":"ref226","doi-asserted-by":"crossref","first-page":"3018","DOI":"10.1016\/j.comcom.2008.02.001","article-title":"A study of self-organization mechanisms in ad hoc and sensor networks","volume":"31","author":"dressler","year":"2008","journal-title":"Comput Commun"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.499"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2005.1470824"},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2002.1006968"},{"journal-title":"Control and Coordination in Hierarchical Systems","year":"1980","author":"findeisen","key":"ref127"},{"key":"ref126","doi-asserted-by":"crossref","first-page":"1115","DOI":"10.1109\/PROC.1979.11407","article-title":"toward the realization of intelligent controls","volume":"67","author":"saridis","year":"1979","journal-title":"Proceedings of the IEEE"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1978.1101704"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1109\/PROC.1970.7545","article-title":"multilevel systems and concepts in process control","volume":"58","author":"mesarovic","year":"1970","journal-title":"Proceedings of the IEEE"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2005.08.003"},{"journal-title":"An Introduction to Intelligent and Autonomous Control","year":"1993","author":"antsaklis","key":"ref128"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2008.03.004"},{"journal-title":"Adaptive Signal Processing","year":"1985","author":"widrow","key":"ref133"},{"journal-title":"Adaptive Filter Theory","year":"2013","author":"haykin","key":"ref134"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1016\/j.jprocont.2009.02.003"},{"journal-title":"Adaptation and Learning in Automatic Systems","year":"1972","author":"tsypkin","key":"ref132"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2007.4342833"},{"key":"ref233","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090303"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2301595"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2017.1600304WC"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2467174"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2306253"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2093210"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2009.2013017"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00113"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.042711.00078"},{"journal-title":"Intelligent Systems Architecture Design and Control","year":"2002","author":"meystel","key":"ref136"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1007\/BF00126465"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1109\/37.898792"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/37.898794"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887288"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2219540"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1007\/s11633-015-0894-x"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.071812.00124"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1016\/S1874-1029(13)60013-0"},{"key":"ref144","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-07803-8","author":"garcia","year":"2014","journal-title":"Model-Based Control of Networked Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s40309-014-0036-7"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/70.258052"},{"journal-title":"The Sixth Wave How to Succeed in a Resource-Limited World","year":"2010","author":"moody","key":"ref1"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2182100"},{"key":"ref242","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7470948"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2525398"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.1500157RP"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.040912.00180"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1109\/65.752646"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/35.685385"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13317"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2764181"},{"key":"ref249","first-page":"59","article-title":"Network-wide decision making: Toward a wafer-thin control plane","author":"rexford","year":"2004","journal-title":"Proc HOTNETS"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.5784\/25-2-76"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2009.13"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2007.02.039"},{"journal-title":"An Annotated Timeline of Operations Research An Informal History","year":"2005","author":"gass","key":"ref106"},{"article-title":"A literature review on reaction time","year":"2013","author":"kosinski","key":"ref105"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0711-36"},{"journal-title":"A History of the Brain From Stone Age Surgery to Modern Neuroscience","year":"2015","author":"wickens","key":"ref103"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s10237-015-0662-4"},{"journal-title":"Applied Iterative Methods","year":"2008","author":"byrne","key":"ref111"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1016\/j.cirp.2008.09.007"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1142\/8042"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2301637"},{"key":"ref251","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092311.00031"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2004.1299346"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.041110.00018"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2375213"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/98.511762"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511619748"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2187132"},{"journal-title":"Modern Control Engineering","year":"2010","author":"ogata","key":"ref10"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.100412.00017"},{"journal-title":"Engineering of Mind An Introduction to the Science of Intelligent Systems","year":"2001","author":"albus","key":"ref11"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511818363"},{"journal-title":"Autonomous Robots From Biological Inspiration to Implementation and Control","year":"2005","author":"bekey","key":"ref12"},{"journal-title":"Introduction to the Theory of Computation","year":"2006","author":"sipser","key":"ref13"},{"journal-title":"Communication Systems","year":"2001","author":"haykin","key":"ref14"},{"journal-title":"Computer Networks","year":"2011","author":"tanenbaum","key":"ref15"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.1597059"},{"journal-title":"Computer Networking A Top-Down Approach Featuring the Internet","year":"2013","author":"kurose","key":"ref16"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/2.294849"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1057\/jors.2008.176"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.4018\/978-1-4666-4715-2","author":"hu","year":"2014","journal-title":"Multidisciplinary Perspectives on Telecommunications Wireless Systems and Mobile Computing"},{"journal-title":"Evolutionary Algorithms for Solving Multi-Objective Problems","year":"2007","author":"coello","key":"ref119"},{"journal-title":"Complex Systems Relationships Between Control Communications and Computing","year":"2016","author":"dimirovski","key":"ref19"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2610578"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2330661"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.000000"},{"key":"ref115","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1109\/PROC.1980.11718","article-title":"Team decision theory and information structures","volume":"68","author":"ho","year":"1980","journal-title":"Proc IEEE"},{"key":"ref120","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1038\/scientificamerican1070-110","article-title":"The origins of feedback control","volume":"223","author":"mayr","year":"1970","journal-title":"Sci Amer"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/37.506394"},{"key":"ref122","doi-asserted-by":"crossref","DOI":"10.5040\/9798216009511","author":"nocks","year":"2007","journal-title":"The Robot The Life Story of a Technology"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78831-7_4"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2014.2311211"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2605240"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1985.1092451"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13298"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.6035816"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.10.024"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.08.022"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1109\/12.2150"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42415"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2013.418"},{"journal-title":"International Technology Roadmap for Semiconductors (ITRS)","year":"2016","key":"ref362"},{"key":"ref361","doi-asserted-by":"publisher","DOI":"10.1145\/2627369.2627641"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2010.2076793"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.29"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1086\/358203"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(89)90093-9"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6736754"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2013.2295069"},{"key":"ref359","first-page":"25","article-title":"Fundamental limits of heat transfer","author":"avila","year":"2007","journal-title":"Proc Thermes"},{"key":"ref30","first-page":"15","article-title":"&#x2018;It&#x2019;s so touching&#x2019;: Emotional value in distal contact","volume":"4","author":"lenay","year":"2010","journal-title":"Int J"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1126\/science.1205008"},{"key":"ref357","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2190155"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.robot.2012.11.006"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2190170"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/3516.951367"},{"journal-title":"Engineering Design A Systematic Approach","year":"2007","author":"pahl","key":"ref355"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887290"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1109\/ROBOT.1993.292093"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.329691"},{"key":"ref351","doi-asserted-by":"publisher","DOI":"10.2307\/1543475"},{"key":"ref354","first-page":"2","article-title":"Information: The third fundamental quantity","volume":"56","author":"gitt","year":"1989","journal-title":"Siemens Rev"},{"key":"ref353","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1094909"},{"key":"ref350","doi-asserted-by":"publisher","DOI":"10.1109\/18.720551"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2009.2035462"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.14"},{"journal-title":"Distributed Systems Principles and Paradigms","year":"2007","author":"tanenbaum","key":"ref29"},{"journal-title":"Conceptual Foundations for Multidisciplinary Thinking","year":"1995","author":"kline","key":"ref20"},{"journal-title":"Adaptive Control Algorithms Analysis and Applications","year":"2011","author":"landau","key":"ref348"},{"key":"ref349","volume":"3","author":"cohen","year":"1982","journal-title":"The Handbook of Artificial Intelligence"},{"journal-title":"Telerobotics Automation and Human Supervisory Control","year":"1992","author":"sheridan","key":"ref22"},{"key":"ref21","first-page":"45","article-title":"Telepresence","volume":"2","author":"minsky","year":"1980","journal-title":"OMNI Mag"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2590438"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2383691"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/JPROC.2012.2189792","article-title":"Cyber&#x2013;physical systems: A perspective at the centennial","volume":"100","author":"kim","year":"2012","journal-title":"Proc IEEE"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2016.7378433"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30301-5_9"},{"key":"ref346","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2509638"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/S0269888998004020"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110414"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"ref383","doi-asserted-by":"publisher","DOI":"10.1109\/35.587710"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1186778.1186782"},{"key":"ref382","doi-asserted-by":"publisher","DOI":"10.1109\/MSSC.2012.2193074"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.092011.100157"},{"journal-title":"Minimum Requirements Related to Technical Performance for IMT-2020 Radio Interfaces","year":"2017","key":"ref380"},{"key":"ref387","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090208"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1561\/1300000060"},{"journal-title":"Vocabulary of Terms of Broadband Aspects of ISDN","year":"1997","key":"ref384"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.839380"},{"journal-title":"Requirements Related to Technical Performance for IMT-Advanced Radio Interfaces","year":"2008","key":"ref379"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/98.788210"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"journal-title":"Architectures for Digital Signal Processing","year":"1998","author":"pirsch","key":"ref377"},{"journal-title":"Science Strategy and War The Strategic Theory of John Boyd","year":"2005","author":"osinga","key":"ref56"},{"key":"ref378","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.02.004"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1960.1105002"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1080\/026013700293458"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1932.tb02344.x"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25808-9_10"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1149\/1.2778363"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.1109\/MCISE.2003.1166548"},{"journal-title":"Impossibility The Limits of Science and the Science of Limits","year":"1998","author":"barrow","key":"ref40"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1038\/nmat2163"},{"key":"ref374","doi-asserted-by":"publisher","DOI":"10.1109\/53.29644"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.03.023"},{"journal-title":"Random House Webster&#x2019;s Concise College Dictionary","year":"1999","author":"house","key":"ref376"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.71"},{"journal-title":"Systems Thinking Systems Practice","year":"1999","author":"checkland","key":"ref4"},{"journal-title":"Cisco Visual Networking Index Global Mobile Data Traffic Forecast Update","year":"2017","key":"ref3"},{"journal-title":"Artificial Intelligence A Modern Approach","year":"2010","author":"russell","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1142\/4846"},{"key":"ref8","doi-asserted-by":"crossref","DOI":"10.1007\/b100605","author":"figueira","year":"2005","journal-title":"Multiple Criteria Decision Analysis State of the Art Surve"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-011-9175-4"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-52121-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/9780470549124"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/21.97471"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.818324"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2013.01.007"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1007\/s10825-015-0754-5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00090"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/JEDS.2013.2258631"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.871600"},{"key":"ref369","first-page":"145","article-title":"More than Moore","volume":"530","author":"waldrop","year":"2016","journal-title":"Nature"},{"key":"ref42","first-page":"351","article-title":"Multidisciplinarity, interdisciplinarity and transdisciplinarity in health research, services, education and policy: 1. Definitions, objectives, and evidence of effectiveness","volume":"29","author":"choi","year":"2006","journal-title":"Clin Invest Med"},{"journal-title":"Methodology for Creating Business Knowledge","year":"1997","author":"arbnor","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2015.09.003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.joi.2010.06.004"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/34.824819"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1972.8880"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2.3.197"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9151"},{"journal-title":"General System Theory Foundations Development Applications","year":"1971","author":"von bertalanffy","key":"ref71"},{"key":"ref70","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1038\/nature07127","article-title":"The quantum Internet","volume":"453","author":"kimble","year":"2008","journal-title":"Nature"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(03)00056-1"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1109\/5.58323"},{"journal-title":"A Methodology for Systems Engineering","year":"1962","author":"hall","key":"ref77"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2014.09.003"},{"journal-title":"Webster&#x2019;s Third New International Dictionary of the English Language Unabridged","year":"1993","author":"gove","key":"ref74"},{"key":"ref316","doi-asserted-by":"crossref","first-page":"436","DOI":"10.1038\/nature14539","article-title":"Deep learning","volume":"521","author":"lecun","year":"2015","journal-title":"Nature"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/2.933500"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/5.558710"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235254"},{"key":"ref313","first-page":"132","article-title":"Intelligent systems","volume":"3","author":"rudas","year":"2008","journal-title":"Int J Comput Commun Control"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1002\/9781118001028"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1016\/j.jocn.2005.04.010"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2794381"},{"journal-title":"The Psychology of Touch","year":"1991","author":"heller","key":"ref311"},{"key":"ref319","first-page":"845","article-title":"Recent developments in pattern recognition","volume":"29","author":"fu","year":"1980","journal-title":"IEEE Trans Comput"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58475-1_4"},{"key":"ref60","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0017806","author":"m\u00fcller","year":"1996","journal-title":"The Design of Intelligent Agents A Layered Approach"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s00158-003-0368-6"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2504350"},{"journal-title":"Theory of Hierarchical Multilevel Systems","year":"1970","author":"mesarovic","key":"ref63"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1971.1099633"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1121\/1.3183369"},{"key":"ref304","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1968.1099015"},{"journal-title":"IMT vision&#x2014;Framework and overall objectives of the future development of IMT for 2020 and beyond","year":"2015","key":"ref65"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1080\/02640410600718004"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7551335"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.1995.594467"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/MCAS.2016.2642679"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1966.1053865"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/MCSE.2017.31"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1966.1098229"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1038\/nature13570","article-title":"Limits on fundamental limits to computation","volume":"512","author":"markov","year":"2014","journal-title":"Nature"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1966.1098345"},{"key":"ref302","first-page":"210","article-title":"Learning systems&#x2014;A review and outlook","volume":"ac 15","author":"fu","year":"1970","journal-title":"IEEE Trans Autom Control"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2017.1"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2010.11.003"},{"journal-title":"An Introduction to Natural Computation","year":"2000","author":"ballard","key":"ref95"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/5.58356"},{"journal-title":"Analog VLSI and Neural Systems","year":"1989","author":"mead","key":"ref93"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2370.2005.00107.x"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1016\/S0016-7185(00)00035-X"},{"journal-title":"Myths Models and Paradigms","year":"1974","author":"barbour","key":"ref342"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.3.216"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2015.7113220"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/54.64954"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2006.11.001"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950804"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1981.1095117"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1109\/35.606024"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.1984.1091865"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.2007.0007"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2013721"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1109\/35.689630"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1098\/rsif.2006.0127","article-title":"Biomimetics: Its practice and theory","volume":"3","author":"vincent","year":"2006","journal-title":"J Roy Soc Interface"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6963801"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511841446"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2064324"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1038\/nrm2357"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1038\/nrg1523"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.5962\/bhl.title.5851"},{"journal-title":"Cybernetics Or Control and Communication in the Animal and the Machine","year":"1965","author":"wiener","key":"ref83"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1982.1095547"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.compstruc.2005.03.002"},{"journal-title":"Principles of Data Communication","year":"1968","author":"lucky","key":"ref331"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/26.293682"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/MCS.2003.1213602"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/98.468361"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1145\/2481244.2481246"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1983.12775"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1109\/EuCNC.2017.7980645"},{"key":"ref85","first-page":"35","article-title":"Introduction to sociocybernetics (Part 1): Third order cybernetics and a basic framework for society","volume":"42","author":"mancilla","year":"2011","journal-title":"J Sociocybern"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9735"},{"journal-title":"Introduction to VLSI Systems","year":"1980","author":"mead","key":"ref86"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.29"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1985.13218"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1049\/cp:19950799"},{"key":"ref88","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-71713-5","author":"rabaey","year":"2009","journal-title":"Low Power Design Essentials"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1109\/5.158595"},{"key":"ref399","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2014.7000974"},{"journal-title":"5G White Paper","year":"2015","author":"erfanian","key":"ref389"},{"key":"ref388","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.03.005"},{"journal-title":"Introduction to Radar systems","year":"2001","author":"skolnik","key":"ref390"},{"key":"ref397","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2326303"},{"key":"ref398","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.071812.00127"},{"key":"ref395","first-page":"24","article-title":"A 5G wireless communications vision","volume":"55","author":"fettweis","year":"2012","journal-title":"Microw J"},{"key":"ref396","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2014.6898939"},{"key":"ref393","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600788"},{"key":"ref394","doi-asserted-by":"publisher","DOI":"10.1109\/5.790636"},{"key":"ref391","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2014.7063628"},{"key":"ref392","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.2335093"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08318568.pdf?arnumber=8318568","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T21:10:18Z","timestamp":1751490618000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8318568\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":404,"URL":"https:\/\/doi.org\/10.1109\/access.2018.2816605","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}