{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T06:16:54Z","timestamp":1770358614229,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T00:00:00Z","timestamp":1562025600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,2]]},"DOI":"10.1145\/3323679.3326505","type":"proceedings-article","created":{"date-parts":[[2019,6,4]],"date-time":"2019-06-04T16:07:11Z","timestamp":1559664431000},"page":"71-80","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation"],"prefix":"10.1145","author":[{"given":"Shaoran","family":"Li","sequence":"first","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA"}]},{"given":"Yan","family":"Huang","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA"}]},{"given":"Chengzhang","family":"Li","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA"}]},{"given":"Brian A.","family":"Jalaian","sequence":"additional","affiliation":[{"name":"U.S. Army Research Laboratory, Adelphi, MD"}]},{"given":"Y. Thomas","family":"Hou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA"}]},{"given":"Wenjing","family":"Lou","sequence":"additional","affiliation":[{"name":"Virginia Polytechnic Institute and State University, Blacksburg, VA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"June","year":"2018","unstructured":"3GPP. 3GPP TR 36.931 : Radio Frequency (RF) requirements for LTE Pico Node B , June 2018 . Version 15.0.0. Available: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2589. 3GPP. 3GPP TR 36.931: Radio Frequency (RF) requirements for LTE Pico Node B, June 2018. Version 15.0.0. Available: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2589."},{"key":"e_1_3_2_1_2_1","volume-title":"July","year":"2018","unstructured":"3GPP. 3GPP TR 36.932 : Scenarios and requirements for small cell enhancements for E-UTRA and E-UTRAN , July 2018 . Version 15.0.0. Available: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2590. 3GPP. 3GPP TR 36.932: Scenarios and requirements for small cell enhancements for E-UTRA and E-UTRAN, July 2018. Version 15.0.0. Available: https:\/\/portal.3gpp.org\/desktopmodules\/Specifications\/SpecificationDetails.aspx?specificationId=2590."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10957-006-9084-x"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4623708"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2425356"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.6.1.73"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2007.895188"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2011.081711.110323"},{"key":"e_1_3_2_1_9_1","volume-title":"A survey on 3GPP heterogeneous networks","author":"Damnjanovic A.","year":"2011","unstructured":"Damnjanovic , A. , Montojo , J. , Wei , Y. , Ji , T. , Luo , T. , Vajapeyam , M. , Yoo , T. , Song , O. , and Malladi , D . A survey on 3GPP heterogeneous networks . IEEE Wireless communications 18, 3 ( 2011 ), 10--21. Damnjanovic, A., Montojo, J., Wei, Y., Ji, T., Luo, T., Vajapeyam, M., Yoo, T., Song, O., and Malladi, D. A survey on 3GPP heterogeneous networks. IEEE Wireless communications 18, 3 (2011), 10--21."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350367"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2420676"},{"key":"e_1_3_2_1_12_1","volume-title":"An introduction to probability theory and its applications","author":"Feller W.","year":"2008","unstructured":"Feller , W. An introduction to probability theory and its applications , vol. 2 . John Wiley & Sons , 2008 . Feller, W. An introduction to probability theory and its applications, vol. 2. John Wiley & Sons, 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2406254"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/993515"},{"key":"e_1_3_2_1_15_1","first-page":"97","article-title":"Breaking spectrum gridlock with cognitive radios: An information theoretic perspective","volume":"5","author":"Goldsmith A. J.","year":"2009","unstructured":"Goldsmith , A. J. , Jafar , S. A. , Maric , I. , and Srinivasa , S . Breaking spectrum gridlock with cognitive radios: An information theoretic perspective . Proceedings of the IEEE 5 , 97 ( 2009 ), 894--914. Goldsmith, A. J., Jafar, S. A., Maric, I., and Srinivasa, S. Breaking spectrum gridlock with cognitive radios: An information theoretic perspective. Proceedings of the IEEE 5, 97 (2009), 894--914.","journal-title":"Proceedings of the IEEE"},{"key":"e_1_3_2_1_16_1","volume-title":"Matrix computations","author":"Golub G. H.","year":"2012","unstructured":"Golub , G. H. , and Van Loan , C. F. Matrix computations , vol. 3 . JHU press , 2012 . Golub, G. H., and Van Loan, C. F. Matrix computations, vol. 3. JHU press, 2012."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-4708-5","volume-title":"Probability: A graduate course","author":"Gut A.","year":"2013","unstructured":"Gut , A. Probability: A graduate course , vol. 75 . Springer Science & Business Media , 2013 . Gut, A. Probability: A graduate course, vol. 75. Springer Science & Business Media, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139088466"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3241539.3241552"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2013.022713.120340"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2120270"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.100512.110011"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070890"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2017.2706063"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062197"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2010.2046434"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1137\/050622328"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.842996"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2014.2329296"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2012.2205719"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.011713.120155"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2010.2043454"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2452251"},{"key":"e_1_3_2_1_34_1","first-page":"5","article-title":"-F. Error control and concealment for video communication: A review","volume":"86","author":"Wang Y.","year":"1998","unstructured":"Wang , Y. , and Zhu , Q . -F. Error control and concealment for video communication: A review . Proceedings of the IEEE 86 , 5 ( 1998 ), 974--997. Wang, Y., and Zhu, Q.-F. Error control and concealment for video communication: A review. Proceedings of the IEEE 86, 5 (1998), 974--997.","journal-title":"Proceedings of the IEEE"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.022912.110073"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2009.090109"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080698"}],"event":{"name":"Mobihoc '19: The Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing","location":"Catania Italy","acronym":"Mobihoc '19","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326505","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3323679.3326505","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:25:40Z","timestamp":1750206340000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3323679.3326505"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,2]]},"references-count":37,"alternative-id":["10.1145\/3323679.3326505","10.1145\/3323679"],"URL":"https:\/\/doi.org\/10.1145\/3323679.3326505","relation":{},"subject":[],"published":{"date-parts":[[2019,7,2]]},"assertion":[{"value":"2019-07-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}