{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T16:49:07Z","timestamp":1768409347574,"version":"3.49.0"},"reference-count":30,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010428","name":"Innovation and Technology Fund","doi-asserted-by":"publisher","award":["ITS\/204\/20"],"award-info":[{"award-number":["ITS\/204\/20"]}],"id":[{"id":"10.13039\/501100010428","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003452","name":"Innovation and Technology Commission of the Hong Kong Special Administrative Region, China and the CUHK direct","doi-asserted-by":"publisher","award":["4055166"],"award-info":[{"award-number":["4055166"]}],"id":[{"id":"10.13039\/501100003452","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Research Talent Hub PiH\/456\/21","award":["ITS\/204\/20"],"award-info":[{"award-number":["ITS\/204\/20"]}]},{"name":"2022 IEEE International Symposium on Information Theory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tcomm.2023.3281486","type":"journal-article","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T17:21:16Z","timestamp":1685467276000},"page":"4707-4720","source":"Crossref","is-referenced-by-count":14,"title":["Age of Information in Reservation Multi-Access Networks With Stochastic Arrivals: Analysis and Optimization"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5072-5518","authenticated-orcid":false,"given":"Qian","family":"Wang","sequence":"first","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong, SAR, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8886-9680","authenticated-orcid":false,"given":"He","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong, SAR, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834345"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195689"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524524"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2012.6310931"},{"key":"ref5","volume-title":"Cellular Networks for Massive IoT","year":"2016"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873606"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2959774"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437712"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326510"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3124949"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2019.8845145"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3032237"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006544"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065043"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162973"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2022.3180965"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488897"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.23919\/WiOPT47501.2019.9144109"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3060429"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3084454"},{"key":"ref21","volume-title":"Broadband Wireless Access","author":"Bing","year":"2000"},{"key":"ref22","volume-title":"Data Networks","author":"Bertsekas","year":"2021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2013.060513.130995"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-78242-102-3.00009-5"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ieeestd.2012.6361248"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1499586.1499753"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1983.1095866"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2019.02.021"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2900528"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541765"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10219032\/10138556.pdf?arnumber=10138556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T06:30:08Z","timestamp":1709274608000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10138556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":30,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3281486","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"value":"0090-6778","type":"print"},{"value":"1558-0857","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}