{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:17:04Z","timestamp":1759637824398,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,1,4]],"date-time":"2023-01-04T00:00:00Z","timestamp":1672790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,1,4]]},"DOI":"10.1145\/3571306.3571335","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:17:12Z","timestamp":1672762632000},"page":"188-196","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Structured Hypergraphs in Cellular Mobile Communication Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0972-9303","authenticated-orcid":false,"given":"Ashwin","family":"Ganesan","sequence":"first","affiliation":[{"name":"International School of Engineering (INSOFE), uDGX Institute of Technology, India"}]}],"member":"320","published-online":{"date-parts":[[2023,1,4]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/2339123.2339125"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1109\/JSAC.2004.830909"},{"unstructured":"Claude Berge. 1985. Graphs and Hypergraphs. Elsevier Science Ltd.  Claude Berge. 1985. Graphs and Hypergraphs. Elsevier Science Ltd.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Hypergraphs","author":"Berge Claude","unstructured":"Claude Berge . 1989. Hypergraphs ( 3 rd ed.). Elsevier . Claude Berge. 1989. Hypergraphs (3rd ed.). Elsevier.","edition":"3"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/7228"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/800230.806984"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1109\/TIT.2007.913537"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1145\/2629600"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/NetCoM.2009.17"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1016\/j.aml.2010.02.001"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/s11276-013-0680-z"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/WiSPNET48689.2020.9198485"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TNET.2019.2959797"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1109\/TIT.2021.3059719"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/3427796.3427806"},{"volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"Garey R.","unstructured":"Michael\u00a0 R. Garey and David\u00a0 S. Johnson . 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness . W. H. Freeman and Company , New York . http:\/\/www.amazon.com\/Computers-Intractability-NP-Completeness-Mathematical-Sciences\/dp\/0716710455 Michael\u00a0R. Garey and David\u00a0S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman and Company, New York. http:\/\/www.amazon.com\/Computers-Intractability-NP-Completeness-Mathematical-Sciences\/dp\/0716710455","key":"e_1_3_2_1_17_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-1-4613-0163-9"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1109\/18.825799"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1016\/j.adhoc.2006.01.003"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1109\/18.21215"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1109\/PROC.1980.11899"},{"key":"e_1_3_2_1_23_1","series-title":"Lecture Notes in Computer Science","volume-title":"Halld\u00f3rsson and Roger Wattenhofer","author":"M.","year":"2019","unstructured":"Magn\u00fas\u00a0 M. Halld\u00f3rsson and Roger Wattenhofer . 2019 . Wireless Network Algorithmics. In Computing and Software Science, Lecture Notes in Computer Science (LNCS), Bernhard Steffen and Gerhard Woeginger (Eds.). Vol.\u00a010000. Springer International Publishing , Cham, 141\u2013160. Magn\u00fas\u00a0M. Halld\u00f3rsson and Roger Wattenhofer. 2019. Wireless Network Algorithmics. In Computing and Software Science, Lecture Notes in Computer Science (LNCS), Bernhard Steffen and Gerhard Woeginger (Eds.). Vol.\u00a010000. Springer International Publishing, Cham, 141\u2013160."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/GLOCOM.2003.1258790"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.1145\/1096166.1096170"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_26_1","DOI":"10.1109\/MILCOM.1995.483546"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/938985.938993"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_28_1","DOI":"10.1109\/TNET.2005.852873"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1109\/LCOMM.2021.3102116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_30_1","DOI":"10.1109\/PIMRC.2017.8292404"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_31_1","DOI":"10.1109\/TVT.2011.2176520"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.1002\/net.3230250205"},{"volume-title":"Proceedings of the 3rd IEE Conference on Telecommunications","author":"J.","unstructured":"Robert\u00a0 J. McEliece and Kumar\u00a0N. Sivarajan. 1991. Performance limits for FDMA cellular systems described by hypergraphs . In Proceedings of the 3rd IEE Conference on Telecommunications . Edinburgh, UK, 360\u2013365. Robert\u00a0J. McEliece and Kumar\u00a0N. Sivarajan. 1991. Performance limits for FDMA cellular systems described by hypergraphs. In Proceedings of the 3rd IEE Conference on Telecommunications. Edinburgh, UK, 360\u2013365.","key":"e_1_3_2_1_33_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_34_1","DOI":"10.1109\/18.272452"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_35_1","DOI":"10.1016\/0095-8956(80)90074-X"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_36_1","DOI":"10.15807\/jorsj.44.194"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_37_1","DOI":"10.1109\/25.669084"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_38_1","DOI":"10.1002\/sapm1949281148"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_39_1","DOI":"10.1145\/1161089.1161116"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_40_1","DOI":"10.1109\/INFOCOM.2006.176"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_41_1","DOI":"10.1109\/TWC.2016.2547862"}],"event":{"acronym":"ICDCN 2023","name":"ICDCN 2023: 24th International Conference on Distributed Computing and Networking","location":"Kharagpur India"},"container-title":["Proceedings of the 24th International Conference on Distributed Computing and Networking"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571335","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3571306.3571335","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:07:53Z","timestamp":1750183673000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3571306.3571335"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,4]]},"references-count":40,"alternative-id":["10.1145\/3571306.3571335","10.1145\/3571306"],"URL":"https:\/\/doi.org\/10.1145\/3571306.3571335","relation":{},"subject":[],"published":{"date-parts":[[2023,1,4]]},"assertion":[{"value":"2023-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}