{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:33:56Z","timestamp":1729672436624,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,4]]},"DOI":"10.1109\/wiopt.2007.4480098","type":"proceedings-article","created":{"date-parts":[[2008,4,2]],"date-time":"2008-04-02T14:57:29Z","timestamp":1207148249000},"page":"1-10","source":"Crossref","is-referenced-by-count":11,"title":["On the Stability of Two-User Slotted ALOHA with Channel-Aware and Cooperative Users"],"prefix":"10.1109","author":[{"given":"Yao-Win","family":"Hong","sequence":"first","affiliation":[]},{"given":"Chun-Kuang","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Shu-Hsien","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.1328086"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/TIT.2005.862103","article-title":"Distributed approaches for exploiting multiuser diversity in wireless networks","volume":"52","author":"qin","year":"2006","journal-title":"IEEE Trans Inform Theory"},{"key":"ref12","article-title":"Cooperative communications in resource-constrained wireless networks","author":"hong","year":"2007","journal-title":"IEEE Signal Processing Magazine"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.21216"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.771161"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.840878"},{"article-title":"Fundamentals of Queueing Theory","year":"1998","author":"gross","key":"ref16"},{"article-title":"WirelessCommunications","year":"2005","author":"goldsmith","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460100604"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838089"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1979.1056084"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2003.814519"},{"key":"ref7","doi-asserted-by":"crossref","DOI":"10.1109\/TCOMM.2003.819238","article-title":"User Cooperation Diversity-Part: System Description&#x201D; and &#x201C;UserCooperation Diversity-Part II: Implementation Aspects and Performance Analysis","volume":"51","author":"sendonaris","year":"2003","journal-title":"IEEE Trans Commun"},{"article-title":"Multiuser Detection","year":"1998","author":"verd\u00fa","key":"ref2"},{"article-title":"Data Nethiorks","year":"1992","author":"bertsekas","key":"ref1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1995.525188"}],"event":{"name":"2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt)","start":{"date-parts":[[2007,4,16]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2007,4,20]]}},"container-title":["2007 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4479865\/4480002\/04480098.pdf?arnumber=4480098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T02:15:52Z","timestamp":1497752152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4480098\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,4]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/wiopt.2007.4480098","relation":{},"subject":[],"published":{"date-parts":[[2007,4]]}}}