{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T20:40:35Z","timestamp":1761597635555,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/icc.2015.7249261","type":"proceedings-article","created":{"date-parts":[[2015,9,11]],"date-time":"2015-09-11T04:40:36Z","timestamp":1441946436000},"page":"5890-5895","source":"Crossref","is-referenced-by-count":15,"title":["Interaction between a content provider and a service provider and its efficiency"],"prefix":"10.1109","author":[{"given":"Ramy","family":"ElDelgawy","sequence":"first","affiliation":[]},{"given":"Richard J.","family":"La","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1120.0420"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5400467"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1515\/9781400829453","author":"laffont","year":"2002","journal-title":"The Theory of Incentives The Principal-Agent Model"},{"key":"ref13","first-page":"577","article-title":"Sponsoring content: motivation and pitfalls for content service providers","author":"liang","year":"2014","journal-title":"IEEE Computer Communications Workshops in INFOCOM"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.2307\/1907266"},{"journal-title":"Game Theory 3rd Ed","year":"1995","author":"owen","key":"ref15"},{"journal-title":"Principles of Mathematical Analysis","year":"1976","author":"rudin","key":"ref16"},{"key":"ref17","volume":"24","author":"wyatt","year":"2014","journal-title":"Comcast and Netflix Reach Deal on Service New York Times"},{"journal-title":"Intermediate Financial Management 10th edition","year":"2009","author":"brigham","key":"ref4"},{"journal-title":"Contract Theory","year":"2005","author":"bolton","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1285639"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1090.0257"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/j.infoecopol.2007.04.001","article-title":"The economics of product-line restrictions with an application to the network neutrality debate","volume":"19","author":"hermalin","year":"2007","journal-title":"Information Economics and Policy"},{"journal-title":"The Theory of Learning in Games","year":"1998","author":"fudenberg","key":"ref7"},{"journal-title":"Nonlinear Programming","year":"1995","author":"bertsekas","key":"ref2"},{"key":"ref1","first-page":"345","article-title":"Economic models of sponsored content in wireless networks with uncertain demand","author":"andrews","year":"2013","journal-title":"IEEE Computer Communications Workshops in INFOCOM"},{"key":"ref9","first-page":"404","article-title":"Worst-case equilibria","author":"koutsoupias","year":"1999","journal-title":"Proc 16th Ann Symp Theoretical Aspects of Computer Science (STACS)"}],"event":{"name":"2015 IEEE International Conference on Signal Processing for Communications (ICC)","start":{"date-parts":[[2015,6,8]]},"location":"London","end":{"date-parts":[[2015,6,12]]}},"container-title":["2015 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7225357\/7248285\/07249261.pdf?arnumber=7249261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T05:25:38Z","timestamp":1599542738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7249261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icc.2015.7249261","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}