{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:51:49Z","timestamp":1730209909520,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/comsnets.2016.7439964","type":"proceedings-article","created":{"date-parts":[[2016,3,29]],"date-time":"2016-03-29T20:54:20Z","timestamp":1459284860000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Towards a crowdsourcing-based transmission paradigm in heterogeneous networks"],"prefix":"10.1109","author":[{"given":"Ye","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guanghui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shaohua","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Qinyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/0165551512437638"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2003.812178"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080818"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.2307\/1911749"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.620"},{"journal-title":"Game Theory","year":"1991","author":"fudenberg","key":"ref15"},{"year":"0","key":"ref4","article-title":"Turning Small Cells into Big Profits Using economic simulation to make the right decisions for your market Strategic"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6146489"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070206"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032113.120652"},{"key":"ref8","first-page":"458","article-title":"Evaluating the Device Reputation Through Full Observation in MANETs","volume":"4","author":"bella","year":"2009","journal-title":"J Information Assurance and Security"},{"key":"ref7","first-page":"1273","article-title":"Multihop Cellular: A New Architecture for Wireless Communications","author":"lin","year":"2000","journal-title":"Proc IEEE Infocom 2000"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130503"},{"year":"2009","key":"ref1","article-title":"Further advancements for E-UTRA physical layer aspects"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2011.92"}],"event":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2016,1,5]]},"location":"Bangalore","end":{"date-parts":[[2016,1,10]]}},"container-title":["2016 8th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435615\/7439923\/07439964.pdf?arnumber=7439964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,2]],"date-time":"2020-02-02T04:39:27Z","timestamp":1580618367000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7439964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2016.7439964","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}