{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:36:23Z","timestamp":1740101783159,"version":"3.37.3"},"reference-count":11,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1109\/wcnc55385.2023.10118949","type":"proceedings-article","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T17:35:33Z","timestamp":1683912933000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Online Control of Two-Step Random Access: A Step Towards uMTC"],"prefix":"10.1109","author":[{"given":"Shilun","family":"Song","sequence":"first","affiliation":[{"name":"Hanyang University,Dept. Electrical and Electronic Engineering,Ansan,South Korea"}]},{"given":"Jun-Bae","family":"Seo","sequence":"additional","affiliation":[{"name":"Gyeongsang National University,Dept. Information and Communication Engineering,Tongyeong,South Korea"}]},{"given":"Hu","family":"Jin","sequence":"additional","affiliation":[{"name":"Hanyang University,Dept. Electrical and Electronic Engineering,Ansan,South Korea"}]}],"member":"263","reference":[{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3048824"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3012449"},{"key":"ref9","article-title":"NR; Medium Access Control (MAC) protocol specification (V16.7.0)","volume":"38","year":"2021","journal-title":"3GPP Technical Specification (TS)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-021-09060-4"},{"journal-title":"Tech Rep R2-1700416","article-title":"Text Proposal to TR 38.804 on Random Access Procedure","year":"17","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3048698"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.011.2000317"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP49889.2020.9299681"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9111974"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2017.2681206"},{"journal-title":"5G Mobile and Wireless Communications Technology","year":"2016","author":"dohler","key":"ref1"}],"event":{"name":"2023 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2023,3,26]]},"location":"Glasgow, United Kingdom","end":{"date-parts":[[2023,3,29]]}},"container-title":["2023 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10118584\/10118587\/10118949.pdf?arnumber=10118949","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,29]],"date-time":"2023-05-29T17:30:39Z","timestamp":1685381439000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10118949\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/wcnc55385.2023.10118949","relation":{},"subject":[],"published":{"date-parts":[[2023,3]]}}}