{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:40:09Z","timestamp":1750228809306,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,6,22]],"date-time":"2015-06-22T00:00:00Z","timestamp":1434931200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1422277,ECCS-1408409,CNS-1117462"],"award-info":[{"award-number":["CNS-1422277,ECCS-1408409,CNS-1117462"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["HDTRA1-13-1-0029"],"award-info":[{"award-number":["HDTRA1-13-1-0029"]}],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"name":"SUTD-ZJU Research Collaboration Grant","award":["SUTD-ZJU\/RES\/03\/2014"],"award-info":[{"award-number":["SUTD-ZJU\/RES\/03\/2014"]}]},{"name":"Alexander von Humboldt-Stiftung"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,6,22]]},"DOI":"10.1145\/2746285.2746315","type":"proceedings-article","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T18:43:54Z","timestamp":1434134634000},"page":"147-156","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["When Network Effect Meets Congestion Effect"],"prefix":"10.1145","author":[{"given":"Xiaowen","family":"Gong","sequence":"first","affiliation":[{"name":"Arizona State University, Tempe, AZ, USA"}]},{"given":"Lingjie","family":"Duan","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"given":"Xu","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Goettingen, Goettingen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,6,22]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"\"WeChat: The new way to connect.\" {Online}. Available: http:\/\/www.wechat.com\/  \"WeChat: The new way to connect.\" {Online}. Available: http:\/\/www.wechat.com\/"},{"key":"e_1_3_2_1_2_1","unstructured":"\"WhatsApp: Simple. Personal. Real time messaging.\" {Online}. Available: http:\/\/www.whatsapp.com\/  \"WhatsApp: Simple. Personal. Real time messaging.\" {Online}. Available: http:\/\/www.whatsapp.com\/"},{"key":"e_1_3_2_1_3_1","unstructured":"\"Global Digital Statistics.\" {Online}. Available: http:\/\/wearesocial.net\/tag\/sdmw\/  \"Global Digital Statistics.\" {Online}. Available: http:\/\/wearesocial.net\/tag\/sdmw\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2006.1653003"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.1120.1066"},{"key":"e_1_3_2_1_6_1","volume-title":"Game Theory","author":"Fudenberg D.","year":"1991","unstructured":"D. Fudenberg and J. Tirole , Game Theory . MIT Press , 1991 . D. Fudenberg and J. Tirole, Game Theory. MIT Press, 1991."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/1911749"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1257\/jep.14.3.159"},{"key":"e_1_3_2_1_10_1","unstructured":"\"SNAP: Network datasets: Brightkite.\" {Online}. Available: http:\/\/snap.stanford.edu\/data\/loc-brightkite.html  \"SNAP: Network datasets: Brightkite.\" {Online}. Available: http:\/\/snap.stanford.edu\/data\/loc-brightkite.html"},{"key":"e_1_3_2_1_11_1","first-page":"17","volume-title":"On the evolution of random graphs","author":"Erdos P.","year":"1960","unstructured":"P. Erdos and A. Renyi , \" On the evolution of random graphs ,\"; Publications of the Mathematical Institute of the Hungarian Academy of Sciences , pp. 17 -- 61 , 1960 . P. Erdos and A. Renyi, \"On the evolution of random graphs,\"; Publications of the Mathematical Institute of the Hungarian Academy of Sciences, pp. 17--61, 1960."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034832.2034837"},{"key":"e_1_3_2_1_13_1","volume-title":"Exploring bundling sale strategy in online service markets with network effects,\" in Proc. of IEEE INFOCOM","author":"Wu W.","year":"2014","unstructured":"W. Wu , T. B. Ma , and C. S. Lui , \" Exploring bundling sale strategy in online service markets with network effects,\" in Proc. of IEEE INFOCOM 2014 . W. Wu, T. B. Ma, and C. S. Lui, \"Exploring bundling sale strategy in online service markets with network effects,\" in Proc. of IEEE INFOCOM 2014."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807342.1807356"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2008.080602"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1530748.1530790"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491288.2491302"},{"key":"e_1_3_2_1_18_1","volume-title":"IEEE Allerton Conference on Communication, Control, and Computing","author":"Gong X.","year":"2013","unstructured":"X. Gong , X. Chen , and J. Zhang , \" Social group utility maximization game with applications in mobile social networks,\" in Proc . IEEE Allerton Conference on Communication, Control, and Computing 2013 . X. Gong, X. Chen, and J. Zhang, \"Social group utility maximization game with applications in mobile social networks,\" in Proc. IEEE Allerton Conference on Communication, Control, and Computing 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"IEEE INFOCOM","author":"Chen X.","year":"2014","unstructured":"X. Chen , X. Gong , L. Yang , and J. Zhang , \" A social group utility maximization framework with applications in database assisted spectrum access,\" in Proc . IEEE INFOCOM 2014 . X. Chen, X. Gong, L. Yang, and J. Zhang, \"A social group utility maximization framework with applications in database assisted spectrum access,\" in Proc. IEEE INFOCOM 2014."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218473"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.38.10.886"},{"issue":"1","key":"e_1_3_2_1_22_1","first-page":"170","article-title":"A further generalization of the Kakutani fixed point theorem, with application to Nash equilibrium","volume":"3","author":"Glicksberg I.","year":"1952","unstructured":"I. Glicksberg , \" A further generalization of the Kakutani fixed point theorem, with application to Nash equilibrium ,\" Proceedings of the American Mathematical Society , vol. 3 , no. 1 , pp. 170 -- 174 , 1952 . I. Glicksberg, \"A further generalization of the Kakutani fixed point theorem, with application to Nash equilibrium,\" Proceedings of the American Mathematical Society, vol. 3, no. 1, pp. 170--174, 1952.","journal-title":"Proceedings of the American Mathematical Society"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.38.2.121"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/5509"}],"event":{"name":"MobiHoc'15: The Sixteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"],"location":"Hangzhou China","acronym":"MobiHoc'15"},"container-title":["Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746315","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2746285.2746315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:57Z","timestamp":1750227417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2746285.2746315"}},"subtitle":["Leveraging Social Services for Wireless Services"],"short-title":[],"issued":{"date-parts":[[2015,6,22]]},"references-count":23,"alternative-id":["10.1145\/2746285.2746315","10.1145\/2746285"],"URL":"https:\/\/doi.org\/10.1145\/2746285.2746315","relation":{},"subject":[],"published":{"date-parts":[[2015,6,22]]},"assertion":[{"value":"2015-06-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}