{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T09:10:22Z","timestamp":1730279422976,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/iwcmc.2014.6906347","type":"proceedings-article","created":{"date-parts":[[2014,9,30]],"date-time":"2014-09-30T14:59:25Z","timestamp":1412089165000},"page":"146-150","source":"Crossref","is-referenced-by-count":2,"title":["An accumulated credibility-based weighted cooperative spectrum sensing algorithm"],"prefix":"10.1109","author":[{"given":"Shibing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Lianlian","family":"Song","sequence":"additional","affiliation":[]},{"given":"Xiaoge","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","article-title":"Weighted cooperative spectrum sensing algorithm based on accumulated reliability","volume":"29","author":"wang","year":"0","journal-title":"Data Acquisition and Processing"},{"key":"16","first-page":"81","article-title":"Algorithm studies and design of node reliability model","volume":"39","author":"ma","year":"2012","journal-title":"Computer Science"},{"key":"13","first-page":"577","article-title":"SNR-based weighted cooperative spectrum sensing technology","volume":"44","author":"li","year":"2010","journal-title":"Journal of Huazhong Normal University (Natural Sciences)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S1005-8885(09)60437-4"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICoSP.2012.6491906"},{"key":"12","first-page":"51","article-title":"Cooperative sensing method based on grouping","volume":"32","author":"xu","year":"2009","journal-title":"Modern Electronics Technique"},{"key":"3","first-page":"191","article-title":"Signal spectrum forming method of OFDM opportunistic spectrum access","volume":"31","author":"qu","year":"2009","journal-title":"Journal of electronics and information technology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2010.2093210"},{"key":"1","first-page":"2","article-title":"Federal communications commission","year":"2002","journal-title":"Spectrum Policy Task Force et Docket"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2009.5426015"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.012411.100611"},{"key":"6","first-page":"3460","article-title":"Research on energy detection algorithm in cognitive radio systems","author":"yu","year":"2011","journal-title":"Proceedings of 2011 International Conference on Computer Science and Service System"},{"key":"5","first-page":"160","article-title":"SDM-based opportunistic spectrum access in cognitive radio networks","volume":"33","author":"li","year":"2011","journal-title":"Journal of electronics and information technology"},{"key":"4","first-page":"18","article-title":"Prediction mechanism-based opportunistic spectrum access in cognitive radio networks","volume":"21","author":"yang","year":"2009","journal-title":"Journal of Chongqing University of posts and Telecommunications"},{"key":"9","first-page":"483","article-title":"Detection model of malicious nodes in P2P networks","volume":"32","author":"han","year":"2011","journal-title":"Computer Engineering and Design"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ISKE.2010.5680819"}],"event":{"name":"2014 International Wireless Communications and Mobile Computing Conference (IWCMC)","start":{"date-parts":[[2014,8,4]]},"location":"Nicosia, Cyprus","end":{"date-parts":[[2014,8,8]]}},"container-title":["2014 International Wireless Communications and Mobile Computing Conference (IWCMC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6895209\/6906315\/06906347.pdf?arnumber=6906347","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:05:17Z","timestamp":1602691517000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6906347"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/iwcmc.2014.6906347","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}