{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T06:05:30Z","timestamp":1750313130123,"version":"3.41.0"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1109\/twc.2016.2645688","type":"journal-article","created":{"date-parts":[[2016,12,28]],"date-time":"2016-12-28T19:07:03Z","timestamp":1482952023000},"page":"1344-1356","source":"Crossref","is-referenced-by-count":41,"title":["Relaying and Radio Resource Partitioning for Machine-Type Communications in Cellular Networks"],"prefix":"10.1109","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4436-9200","authenticated-orcid":false,"given":"Utku","family":"Tefek","sequence":"first","affiliation":[]},{"given":"Teng Joon","family":"Lim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Interference in Large Wireless Networks","year":"2009","author":"haenggi","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.093010.090478"},{"journal-title":"Evolved Universal Terrestrial Radio Access (E-UTRA) Medium Access Control (MAC) Protocol Specification","year":"2012","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1515\/9783112719176","volume":"2","author":"stoyan","year":"1987","journal-title":"Stochastic Geometry and its Applications"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2011.100411.100541"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2437378"},{"journal-title":"Service Requirements for Machine-type Communications","year":"2014","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6231296"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2013.6507400"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/VETECF.2011.6092977"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354534"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WCL.2012.031912.110278"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.040714.131583"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2349732"},{"key":"ref18","first-page":"5512","article-title":"Joint optimization of cluster formation and power control for interference-limited machine-to-machine communications","author":"wei","year":"2012","journal-title":"Proc IEEE Global Commun Conf"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QBSC.2014.6841210"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2411737"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2328491"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2015.2502254"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6211484"},{"key":"ref6","article-title":"Heterogeneous access class barring with QoS guarantee in machine-type communications","author":"han","year":"2015","journal-title":"Wiley Trans Emerg Telecom Technol"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2013.2262679"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2014.6883675"},{"journal-title":"Study on RAN Improvements for Machine-type Communications","year":"2011","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2011.6162474"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741148"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6525600"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2016.7564740"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2014.2328338"},{"key":"ref22","first-page":"1","article-title":"Evaluation of multiple access strategies with power control error and variable packet length in M2M","author":"song","year":"2016","journal-title":"Proc IEEE Wireless Commun Netw Conf"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.918730"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037475"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2016.2517073"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.072213.120588"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130506"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/7849239\/07801159.pdf?arnumber=7801159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T23:00:12Z","timestamp":1749855612000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7801159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":35,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/twc.2016.2645688","relation":{},"ISSN":["1536-1276"],"issn-type":[{"type":"print","value":"1536-1276"}],"subject":[],"published":{"date-parts":[[2017,2]]}}}