{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,5,18]],"date-time":"2023-05-18T21:51:36Z","timestamp":1684446696616},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2011,3,1]],"date-time":"2011-03-01T00:00:00Z","timestamp":1298937600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2011,3]]},"DOI":"10.1109\/tit.2010.2103756","type":"journal-article","created":{"date-parts":[[2011,2,18]],"date-time":"2011-02-18T18:17:37Z","timestamp":1298053057000},"page":"1274-1283","source":"Crossref","is-referenced-by-count":16,"title":["To Decode the Interference or to Consider It as Noise"],"prefix":"10.1109","volume":"57","author":[{"given":"Abolfazl S.","family":"Motahari","sequence":"first","affiliation":[]},{"given":"Amir K.","family":"Khandani","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009793"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009807"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847720"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2004.838725"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACSSC.2002.1197112"},{"key":"ref13","article-title":"optimal order of decoding for max-min fairness in <formula formulatype=\"inline\"><tex notation=\"tex\">$k$<\/tex><\/formula>-user memoryless interference channels","author":"maddah-ali","year":"2007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901153"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032725"},{"key":"ref16","article-title":"outage minimization and rate allocation for the multiuser gaussian interference channels with successive group decoding","author":"tajer","year":"2009"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1006\/jctb.2000.1989"},{"key":"ref18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-97881-4","author":"grtschel","year":"1988","journal-title":"Geometric Algorithms and Combinatorial Optimization"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/502090.502096"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.828151"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055812"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056307"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.907482"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057085"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.070402"},{"key":"ref8","article-title":"joint power control and user scheduling in multicell wireless networks: capacity scaling laws","author":"gesbert","year":"0","journal-title":"IEEE Trans Inf Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.907518"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1975.1055432"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.842576"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1981.1056416"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(79)90337-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1214\/aop\/1176996549"},{"key":"ref21","author":"liao","year":"1972","journal-title":"Multiple access channels"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-02431-3","author":"rockafellar","year":"1998","journal-title":"Variational Analysis"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/18.959289"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90413-8"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/5714236\/05714251.pdf?arnumber=5714251","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,10]],"date-time":"2021-10-10T23:46:33Z","timestamp":1633909593000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5714251\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,3]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tit.2010.2103756","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,3]]}}}