{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:26:23Z","timestamp":1730222783175,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/fskd.2017.8393215","type":"proceedings-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T18:38:33Z","timestamp":1531766313000},"page":"2755-2761","source":"Crossref","is-referenced-by-count":2,"title":["A novel relay selection algorithm based on mobile social networks for device-to-device cooperative communications"],"prefix":"10.1109","author":[{"given":"Zhiwei","family":"Fang","sequence":"first","affiliation":[]},{"given":"Xiaobin","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883659"},{"key":"ref12","first-page":"1","article-title":"Optimal relay selection based on social threshold for D2D communications underlay cellular networks","author":"li","year":"2016","journal-title":"International Conference on Wireless Communications & Signal Processing"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VTCSpring.2016.7504379"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195545"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2012.6362495"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/VTCFall.2013.6692247"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2924","DOI":"10.1109\/TCOMM.2013.061013.120777","article-title":"Token system design or autonomic wireless relay networks","volume":"61","author":"xu","year":"2013","journal-title":"IEEE Trans on Communications"},{"key":"ref5","first-page":"455","article-title":"Performance of multihop decode-and-forward relaying assisted device-to-device communication underlaying cellular networks","author":"lee","year":"2012","journal-title":"Pmc of the International Symposium on Information Theory and Its Applications"},{"key":"ref8","first-page":"107","article-title":"Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks","author":"michiardi","year":"2002","journal-title":"ACM Conf Computer and Communications Security"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.06.091263"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/WIMOB.2010.5645039"},{"journal-title":"Cisco","article-title":"Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update","year":"2017","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LWC.2015.2410768"}],"event":{"name":"2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2017,7,29]]},"location":"Guilin","end":{"date-parts":[[2017,7,31]]}},"container-title":["2017 13th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8384043\/8392854\/08393215.pdf?arnumber=8393215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T18:54:49Z","timestamp":1598208889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8393215\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/fskd.2017.8393215","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}