{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:28:18Z","timestamp":1730233698053,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1109\/icccn52240.2021.9522350","type":"proceedings-article","created":{"date-parts":[[2021,8,31]],"date-time":"2021-08-31T20:31:47Z","timestamp":1630441907000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Interference-Aware Sector Design in IEEE 802.11ad Networks"],"prefix":"10.1109","author":[{"given":"Guillaume","family":"Gaillard","sequence":"first","affiliation":[]},{"given":"Gentian","family":"Jakllari","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/WoWMoM.2018.8449795"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/JSAC.2019.2947820"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICCCN.2019.8847085"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/2716281.2836102"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/JSAC.2017.2720898"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/VTCFall.2019.8891280"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TVT.2019.2908976"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/TMC.2019.2924884"},{"key":"ref18","article-title":"Many-to-Many Beam Alignment in Millimeter Wave Networks","author":"jog","year":"2019","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1145\/3143361.3143384"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/3130242.3130244"},{"year":"2012","journal-title":"IEEE 802 11ad","article-title":"Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications Amendment 3: Enhancements for Very High Throughput in the 60 GHz Band","key":"ref4"},{"year":"2019","author":"bielsa","journal-title":"Analysis and Performance Improvement of Consumer-Grade Millimeter Wave Wireless Networks","key":"ref27"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TAP.2017.2734243"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/3230543.3230581"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/TNET.2011.2122343"},{"year":"2004","author":"monzingo","journal-title":"Introduction to Adaptive Arrays","key":"ref5"},{"key":"ref8","first-page":"307","article-title":"An analytical model for assessing the performance of ieee 802.11 ad beamforming training","author":"dahhani","year":"2020","journal-title":"IFIP Networking 2020"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSP.2018.2886168"},{"key":"ref2","article-title":"Spatial and temporal characteristics of 60-GHZ indoor channels","author":"xu","year":"2002","journal-title":"IEEE JSAC"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TWC.2016.2580510"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/2796314.2745858"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/3241539.3241576"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/TPAMI.1984.4767596"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1109\/COMST.2015.2504600"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/INFCOM.2007.69"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"kirkpatrick","year":"1983","journal-title":"Science"},{"year":"2019","author":"steinmetzer","journal-title":"Performance and Security Enhancements in Practical Millimeter-Wave Communication Systems","key":"ref26"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/3321349.3321354"}],"event":{"name":"2021 International Conference on Computer Communications and Networks (ICCCN)","start":{"date-parts":[[2021,7,19]]},"location":"Athens, Greece","end":{"date-parts":[[2021,7,22]]}},"container-title":["2021 International Conference on Computer Communications and Networks (ICCCN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9521949\/9522143\/09522350.pdf?arnumber=9522350","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:45:15Z","timestamp":1652197515000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9522350\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icccn52240.2021.9522350","relation":{},"subject":[],"published":{"date-parts":[[2021,7]]}}}