{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T06:48:47Z","timestamp":1774680527004,"version":"3.50.1"},"reference-count":52,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2011,9,1]],"date-time":"2011-09-01T00:00:00Z","timestamp":1314835200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/tit.2011.2162265","type":"journal-article","created":{"date-parts":[[2011,9,12]],"date-time":"2011-09-12T19:28:06Z","timestamp":1315855686000},"page":"5840-5862","source":"Crossref","is-referenced-by-count":13,"title":["Cross-Layer Optimization for Wireless Networks With Deterministic Channel Models"],"prefix":"10.1109","volume":"57","author":[{"given":"Ziyu","family":"Shao","sequence":"first","affiliation":[]},{"given":"Minghua","family":"Chen","sequence":"additional","affiliation":[]},{"given":"A. Salman","family":"Avestimehr","sequence":"additional","affiliation":[]},{"given":"Shuo-Yen Robert","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"A deterministic approach to wireless relay networks","volume-title":"Proc. Allerton Conf.","author":"Avestimehr"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2110110"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2006.887322"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/jsac.2006.879351"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/18.737513"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.915665"},{"key":"ref8","article-title":"Cross-layer optimization for MIMO-based mesh networks with dirty paper coding","volume-title":"Proc. IEEE ICC","author":"Liu"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.907125"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062050"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.926344"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2006.872546"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.240"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.913537"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2110110"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461998"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1769-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2008.4797741"},{"key":"ref21","doi-asserted-by":"crossref","DOI":"10.4108\/ICST.BROADNETS2009.7401","volume-title":"Convergence and Tradeoff of Utility-Optimal CSMA","author":"Liu","year":"2009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/cdc.2009.5400349"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2008.53"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2035046"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2009.2030681"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2006447"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/ett.1287"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2120210"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2177773"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054590"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161116"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1239\/aap\/1151337082"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530771"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/tnet.2009.2026276"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462046"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558577"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2492101.1555365"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462229"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/90.879343"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-8176-8216-3","volume-title":"The Mathematics of Internet Congestion Control","author":"Srikant","year":"2004"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375477"},{"key":"ref42","volume-title":"Stability of Congestion Control Algorithms with Multi-Path Routing and Linear Stochastic Modelling of Congestion Control","author":"Voice","year":"2006"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511804441"},{"key":"ref44","volume-title":"Approximation Algorithms","author":"Vazirani","year":"2001"},{"key":"ref45","volume-title":"Reversibility and Stochastic Networks","author":"Kelly","year":"1979"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2081490"},{"key":"ref47","volume-title":"Stochastic Approximation and Recursive Algorithms and Applications","author":"Kushner","year":"2003"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.913572"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1214\/aoap\/1177005980"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4899-3132-0"},{"key":"ref51","volume-title":"Nonlinear Systems","author":"Khalil","year":"2001"},{"key":"ref52","volume-title":"Introduction to Optimization","author":"Polyak","year":"1987"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/6006569\/06006605.pdf?arnumber=6006605","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T06:17:16Z","timestamp":1709360236000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6006605\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":52,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tit.2011.2162265","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,9]]}}}