{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:32:47Z","timestamp":1730194367083,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/acosis.2016.7843946","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T16:43:51Z","timestamp":1486658631000},"page":"1-7","source":"Crossref","is-referenced-by-count":3,"title":["Review on using game theory in resource allocation for LTE\/LTE-Advanced"],"prefix":"10.1109","author":[{"given":"Sanaa","family":"Oulaourf","sequence":"first","affiliation":[]},{"given":"Abdelfatteh","family":"Haidine","sequence":"additional","affiliation":[]},{"given":"Hassan","family":"Ouahmane","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1109\/AHICI.2009.5340336"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/ISSSTA.2008.28"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/PIMRC.1998.731433"},{"year":"2008","author":"tauman","article-title":"Coalitional Form","key":"ref32"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.4018\/978-1-4666-5202-6.ch095"},{"key":"ref30","first-page":"109","article-title":"Graphs in game theory","volume":"1","author":"manjula","year":"2013","journal-title":"International Journal of Mathematics and Computer Research"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.jmp.2010.01.006"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/WCSP.2011.6096820"},{"key":"ref35","first-page":"522","article-title":"Subcarrier and Power Allocation in Uplink Multi-cell OFDMA Systems Based on Game Theory","author":"hou","year":"0"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.comnet.2010.06.020"},{"year":"2014","journal-title":"LTE Resource Guide","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/TVT.2006.889570"},{"key":"ref11","article-title":"LTE QoS dynamic resource block allocation with power source limitation and queue stability constraints","volume":"5","author":"abd","year":"2013","journal-title":"International Journal of Computer Networks & Communications (IJCNC)"},{"year":"0","author":"mauricio","article-title":"Performance study of multimedia services using virtual token mechanism for resource allocation in lte networks","key":"ref12"},{"key":"ref13","article-title":"Mathematical optimization: finding minima of functions","author":"varoquaux","year":"2016","journal-title":"Internet"},{"key":"ref14","first-page":"2011","article-title":"A Game Theoretical Approach to Communication Security","year":"2011","journal-title":"Technical Report"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1016\/0305-0483(75)90028-6"},{"year":"0","author":"osborne","article-title":"A Course in Game Theory","key":"ref16"},{"year":"0","author":"fudenberg","article-title":"Game Theory","key":"ref17"},{"key":"ref18","article-title":"A Primer in Game Theory","author":"gibbons","year":"1992","journal-title":"Prentice Hall"},{"year":"2012","author":"saad","article-title":"Game Theory in Wireless and Communication Networks","key":"ref19"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.2307\/1969529"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WCNC.2012.6214009"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1073\/pnas.36.1.48"},{"key":"ref3","first-page":"99","article-title":"Architecture and Protocol Support for Radio Resource Management (RRM)&#x201D; in &#x201C;Long Term Evolution: 3GPP LTE Radio and Cellular Technology","author":"fodor","year":"0"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TCOMM.2009.07.070394"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1515\/9781400881970"},{"year":"1944","author":"neumann","article-title":"Theory of Games and Economic Behavior","key":"ref5"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/MWC.2007.314549"},{"key":"ref7","article-title":"Introduction to single carrier fdma","author":"myung","year":"0","journal-title":"15th European Signal Processing Conference (EUSIPCO 2007)"},{"key":"ref2","article-title":"LTE Overview","author":"nohrborg","year":"2016","journal-title":"Internet"},{"key":"ref9","article-title":"On Ultra Extended Cyclic Prefix in Orthogonal Frequency Division Multiplexing (OFDM) Systems: The Case of LTE Downlink","author":"abayomi m","year":"2013","journal-title":"Communications and Network 2013"},{"key":"ref1","first-page":"254","article-title":"From GSM to LTE - An Introduction to Mobile Networks and Mobile Broadband","author":"sauter","year":"2014"},{"key":"ref20","first-page":"1713","article-title":"Essay d'analyse sur les jeux de hazard","volume":"415","author":"de montmort","year":"0","journal-title":"Chez Jacques Quillau"},{"key":"ref22","article-title":"Algebra and Probability Theory","volume":"184","author":"borel","year":"1927","journal-title":"Proceedings of the Academy of Sciences"},{"key":"ref21","article-title":"An outline of the history of game theory","author":"walker","year":"0","journal-title":"University of University of Canterbury Department of Economics Working Papers 9504"},{"key":"ref24","first-page":"1881","article-title":"Mathematical Physics","author":"edgeworth","year":"0"},{"key":"ref41","first-page":"1","article-title":"Downlink scheduling for multiclass trafc in lte","volume":"2009","author":"sadiq","year":"2009"},{"key":"ref23","first-page":"1838","article-title":"Mathematical Principles of the Theory of Wealth","author":"cournot","year":"0"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.2307\/1907266"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.2307\/1906951"}],"event":{"name":"2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)","start":{"date-parts":[[2016,10,17]]},"location":"Marrakesh, Morocco","end":{"date-parts":[[2016,10,19]]}},"container-title":["2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7830757\/7843912\/07843946.pdf?arnumber=7843946","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,1]],"date-time":"2017-03-01T17:32:45Z","timestamp":1488389565000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7843946\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/acosis.2016.7843946","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}