{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T12:13:13Z","timestamp":1767183193388,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61871362"],"award-info":[{"award-number":["61871362"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"publisher","award":["2017YFB0802202"],"award-info":[{"award-number":["2017YFB0802202"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1717736","CNS-1409797"],"award-info":[{"award-number":["CNS-1717736","CNS-1409797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2020,10,1]]},"DOI":"10.1109\/tmc.2019.2924000","type":"journal-article","created":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T21:34:25Z","timestamp":1561066465000},"page":"2475-2488","source":"Crossref","is-referenced-by-count":3,"title":["Turning Waste into Wealth: Free Control Message Transmissions in Indoor WiFi Networks"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3601-0505","authenticated-orcid":false,"given":"Bing","family":"Feng","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6528-1427","authenticated-orcid":false,"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7568-015X","authenticated-orcid":false,"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1079-3871","authenticated-orcid":false,"given":"Yuguang","family":"Fang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1145\/1998412.1998428"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TVT.2019.2897399"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1145\/2342356.2342400"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1109\/TMC.2012.194"},{"key":"ref37","first-page":"2752","article-title":"On cognitive radio networks with opportunistic power control strategies in fading channels","volume":"7","author":"chen","year":"2008","journal-title":"IEEE Trans Mobile Comput"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/INFCOM.2003.1208698"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/TWC.2009.080580"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/T-WC.2009.070993"},{"key":"ref10","first-page":"75","article-title":"Sora: High performance software radio using general purpose multi-core processors","author":"tan","year":"2009","journal-title":"Proc USENIX NSDI"},{"key":"ref11","first-page":"159","article-title":"Predictable 802.11 packet delivery from wireless channel measurements","author":"halperin","year":"2011","journal-title":"Proc ACM SIGCOMM Conf"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ICECE.2006.355657"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1145\/1592568.1592571"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TWC.2009.080862"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/JSAC.2007.070407"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TCOM.1980.1094784"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/381677.381700"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/INFCOM.2013.6567122"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/TWC.2004.827731"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1145\/1614320.1614330"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/WCNC.2008.298"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/2789168.2790098"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/2030613.2030641"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/TWC.2013.090413.121308"},{"key":"ref29","first-page":"65","article-title":"802.11 ec: Collision avoidance without control messages","author":"magistretti","year":"2012","journal-title":"Proc 18th Annu Int Conf Mobile Comput Netw"},{"key":"ref5","first-page":"175","article-title":"Accurate: Constellation based rate estimation in wireless networks.","author":"sen","year":"2010","journal-title":"Proc USENIX NSDI"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/2030613.2030642"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TMC.2015.2421938"},{"year":"2007","journal-title":"Part 11 Wireless LAN medium access control (MAC) and physical layer (PHY) specifications","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/TMC.2005.57"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICDCS.2017.120"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/INFCOM.2003.1208923"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/35.1000232"},{"key":"ref21","first-page":"2250","article-title":"Fast collision resolution (fcr) mac algorithm for wireless local area networks","volume":"3","author":"kwon","year":"2002","journal-title":"Proc IEEE Globecom"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/TNET.2012.2225842"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"549","DOI":"10.1017\/S1743921313003177","article-title":"Use your frequency wisely: Explore frequency domain for channel contention and ack","author":"feng","year":"2012","journal-title":"Proc IEEE InfoCom"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/2348543.2348573"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1145\/1614320.1614342"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/7755\/9181831\/8742623-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/9181831\/08742623.pdf?arnumber=8742623","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T16:36:20Z","timestamp":1651077380000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8742623\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,1]]},"references-count":37,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tmc.2019.2924000","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"type":"print","value":"1536-1233"},{"type":"electronic","value":"1558-0660"},{"type":"electronic","value":"2161-9875"}],"subject":[],"published":{"date-parts":[[2020,10,1]]}}}