{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:37:04Z","timestamp":1750307824535,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,5,26]],"date-time":"2008-05-26T00:00:00Z","timestamp":1211760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,5,26]]},"DOI":"10.1145\/1374618.1374624","type":"proceedings-article","created":{"date-parts":[[2008,5,28]],"date-time":"2008-05-28T16:50:20Z","timestamp":1211993420000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":46,"title":["Complexity in wireless scheduling"],"prefix":"10.1145","author":[{"given":"Yung","family":"Yi","sequence":"first","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]},{"given":"Alexandre","family":"Prouti\u00e8re","sequence":"additional","affiliation":[{"name":"Microsft Research, Cambridge, United Kingdom"}]},{"given":"Mung","family":"Chiang","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,5,26]]},"reference":[{"volume-title":"Proc. of Allerton","year":"2005","author":"Chaporkar P.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.267"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.142"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.65"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/314613.314705"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.11"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557418"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.239"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.835596"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/792538.792544"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2006.376968"},{"volume-title":"Proc. of Infocom","year":"2005","author":"Lin X.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1550713"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140283"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498453"},{"volume-title":"Proc. of CISS","year":"2002","author":"Neely M. J.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208724"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49116-3_24"},{"volume-title":"Proc. of Information Theory and Applications Second Workshop","year":"2007","author":"Ray S.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254920"},{"volume-title":"Proc. of Allerton","year":"2006","author":"Sarkar S.","key":"e_1_3_2_1_21_1"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019350"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1161089.1161116"},{"volume-title":"Proc. of Infocom","year":"1998","author":"Tassiulas L.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/9.182479"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"V. V. Vazirani. Approximate Algorithms. Springer-Verlag 2001.   V. V. Vazirani. Approximate Algorithms. Springer-Verlag 2001.","DOI":"10.1007\/3-540-44669-9_6"},{"volume-title":"Proc. of Infocom","year":"2006","author":"Wu X.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","article-title":"Stochastic network utility maximization","author":"Yi Y.","year":"2008","journal-title":"European Transactions on Telecommunications"},{"volume-title":"Proc. of ICC","year":"2008","author":"Yi Y.","key":"e_1_3_2_1_29_1"}],"event":{"name":"MobiHoc08: The Ninth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","ACM Association for Computing Machinery"],"location":"Hong Kong Hong Kong, China","acronym":"MobiHoc08"},"container-title":["Proceedings of the 9th ACM international symposium on Mobile ad hoc networking and computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374618.1374624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1374618.1374624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:50Z","timestamp":1750255070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1374618.1374624"}},"subtitle":["impact and tradeoffs"],"short-title":[],"issued":{"date-parts":[[2008,5,26]]},"references-count":29,"alternative-id":["10.1145\/1374618.1374624","10.1145\/1374618"],"URL":"https:\/\/doi.org\/10.1145\/1374618.1374624","relation":{},"subject":[],"published":{"date-parts":[[2008,5,26]]},"assertion":[{"value":"2008-05-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}