{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:01:03Z","timestamp":1776441663450,"version":"3.51.2"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. on Mobile Comput."],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/tmc.2021.3064063","type":"journal-article","created":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T20:43:27Z","timestamp":1614977007000},"page":"1-1","source":"Crossref","is-referenced-by-count":65,"title":["Interference-aware Game-theoretic Device Allocation for Mobile Edge Computing"],"prefix":"10.1109","author":[{"given":"Guangming","family":"Cui","sequence":"first","affiliation":[]},{"given":"Qiang","family":"He","sequence":"additional","affiliation":[]},{"given":"Feifei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yiwen","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","article-title":"Ericsson mobility report","author":"Heuveldop","year":"2017"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2831230"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2011.2166093"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2841758"},{"key":"ref5","article-title":"Developing software for multi-access edge computing","volume":"20","author":"Sabella","year":"2019","journal-title":"ETSI White Paper"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2018.2871147"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2474364"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_15"},{"issue":"11","key":"ref9","first-page":"1","article-title":"Mobile edge computing\u00a1\u00aaa key technology towards 5G","volume":"11","author":"Hu","year":"2015","journal-title":"ETSI White Paper"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2938944"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2018.2873002"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2928811"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2016.2579198"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2881191"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.157"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2016.2642190"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2014.2318700"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2462951"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/j.ctvjsf522"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2487344"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161131"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1594233.1594260"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057150"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524340"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.010912.00081"},{"key":"ref26","volume-title":"A Course in Game Theory","author":"Osborne","year":"1994"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0308738101"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1006\/game.1996.0044"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2017273"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2008.2010885"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2316834"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.21236\/ada637949"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2537809"},{"key":"ref34","volume-title":"Wireless Communications: Principles and Practice","volume":"2","author":"Rappaport","year":"1996"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2342509.2342513"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2020.3025116"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.2968209"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1800254"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3016344"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.3010521"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3015316"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD49709.2020.00037"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2016.2633522"}],"container-title":["IEEE Transactions on Mobile Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7755\/4358975\/09371399.pdf?arnumber=9371399","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,9]],"date-time":"2024-01-09T22:59:31Z","timestamp":1704841171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9371399\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/tmc.2021.3064063","relation":{},"ISSN":["1536-1233","1558-0660","2161-9875"],"issn-type":[{"value":"1536-1233","type":"print"},{"value":"1558-0660","type":"electronic"},{"value":"2161-9875","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}