{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:05:54Z","timestamp":1730304354501,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/wcnc.2013.6554774","type":"proceedings-article","created":{"date-parts":[[2013,7,25]],"date-time":"2013-07-25T18:58:33Z","timestamp":1374778713000},"page":"1434-1439","source":"Crossref","is-referenced-by-count":5,"title":["An efficient interference management framework for multi-hop wireless networks"],"prefix":"10.1109","author":[{"family":"Lei Shi","sequence":"first","affiliation":[]},{"family":"Yi Shi","sequence":"additional","affiliation":[]},{"family":"Yuxiang Ye","sequence":"additional","affiliation":[]},{"family":"Zhenchun Wei","sequence":"additional","affiliation":[]},{"family":"Jianghong Han","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Handbook of Optimization in Complex Networks Theory and Applications","year":"2011","author":"thai","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195781"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683178"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.901153"},{"year":"0","key":"11"},{"journal-title":"Linear Programming and Network Flows","year":"2010","author":"bazaraa","key":"12"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2008.151"},{"journal-title":"Multiuser Detection","year":"1998","author":"verdu","key":"2"},{"key":"1","first-page":"814","article-title":"Further advancements for e-utra physical layer aspects","volume":"36","author":"andrews","year":"0","journal-title":"3GPP TR"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199541"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/26.774855"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1994.368852"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2005.1421925"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1409944.1409983"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462062"}],"event":{"name":"2013 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2013,4,7]]},"location":"Shanghai, Shanghai, China","end":{"date-parts":[[2013,4,10]]}},"container-title":["2013 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6548699\/6554525\/06554774.pdf?arnumber=6554774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T04:23:30Z","timestamp":1490243010000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6554774\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wcnc.2013.6554774","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}