{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T23:56:33Z","timestamp":1725407793785},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1109\/iccnc.2016.7440719","type":"proceedings-article","created":{"date-parts":[[2016,3,24]],"date-time":"2016-03-24T16:20:24Z","timestamp":1458836424000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["A game theoretical approach to coexistence of heterogeneous MIMO wireless networks with interference cancellation"],"prefix":"10.1109","author":[{"given":"Yantian","family":"Hou","sequence":"first","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Dejun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.082813.120710"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080907"},{"key":"ref12","first-page":"553","article-title":"Interference detection and mitigation in ieee 802.15. 4 networks","author":"shah","year":"2008","journal-title":"IEEE IPSN'08"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2004.42"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511807213"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2092773"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107510"},{"article-title":"A game theoretical approach to coexistence of heterogeneous mimo wireless networks with interference cancellation","year":"2015","author":"hou","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1288107.1288124"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762779"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848016"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018454"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1869983.1870014"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2011.5984924"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.274"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2012.6364362"}],"event":{"name":"2016 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2016,2,15]]},"location":"Kauai, HI, USA","end":{"date-parts":[[2016,2,18]]}},"container-title":["2016 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7430154\/7440540\/7440719.pdf?arnumber=7440719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,9,29]],"date-time":"2016-09-29T20:43:51Z","timestamp":1475181831000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7440719\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,2]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2016.7440719","relation":{},"subject":[],"published":{"date-parts":[[2016,2]]}}}