{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:24:59Z","timestamp":1725737099248},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/glocomw.2013.6824980","type":"proceedings-article","created":{"date-parts":[[2014,6,17]],"date-time":"2014-06-17T01:53:24Z","timestamp":1402970004000},"page":"163-169","source":"Crossref","is-referenced-by-count":20,"title":["Learning relaying strategies in cellular D2D networks with token-based incentives"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Mastronarde","sequence":"first","affiliation":[]},{"given":"Viral","family":"Patel","sequence":"additional","affiliation":[]},{"family":"Jie Xu","sequence":"additional","affiliation":[]},{"given":"Mihaela","family":"van der Schaar","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.121002"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2011.2158088"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.896061"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070209"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.06090"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.070176"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.061013.120777"},{"key":"4","article-title":"Nuglets: A virtual currency to stimulate cooperation in self-organized mobile ad hoc networks","author":"buttyan","year":"2001","journal-title":"EPFL Techinical Report"},{"journal-title":"Channel Models A Tutorial","year":"2007","author":"jain","key":"9"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316887","author":"puterman","year":"1994","journal-title":"Markov Decision Processes Discrete Stochastic Dynamic Programming"},{"key":"11","article-title":"Fair exchange with a semi-trusted third party","author":"franklin","year":"1997","journal-title":"ACM conference on computer and communication security"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2007.06026"}],"event":{"name":"2013 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2013,12,9]]},"location":"Atlanta, GA","end":{"date-parts":[[2013,12,13]]}},"container-title":["2013 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6820092\/6824917\/06824980.pdf?arnumber=6824980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T13:56:31Z","timestamp":1649426191000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6824980\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/glocomw.2013.6824980","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}