{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T02:10:03Z","timestamp":1755915003157,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,2,23]],"date-time":"2024-02-23T00:00:00Z","timestamp":1708646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,2,23]]},"DOI":"10.1145\/3653876.3653881","type":"proceedings-article","created":{"date-parts":[[2024,8,1]],"date-time":"2024-08-01T12:28:23Z","timestamp":1722515303000},"page":"89-95","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Research on C-V2X slice random access technology"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0002-2856-4361","authenticated-orcid":false,"given":"Fei","family":"Wu","sequence":"first","affiliation":[{"name":"Nanjing Normal University of Special Education, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1448-3181","authenticated-orcid":false,"given":"Baofeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Purple Mountain Laboratories, China"}]}],"member":"320","published-online":{"date-parts":[[2024,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7498068"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2017.2773633"},{"issue":"4","key":"e_1_3_2_1_3_1","first-page":"179","article-title":"communication research defined by software[J]","volume":"2019","author":"Wenjuan Shao","unstructured":"Shao Wenjuan, Shen Qingguo.Overview of D2D and V2X communication research defined by software[J],Journal of Communications,2019(4): 179-194.","journal-title":"Journal of Communications"},{"key":"e_1_3_2_1_4_1","volume-title":"2018 4th IEEE conference on network softwarizationandworkshops (NetSoft) (pp. 400\u2013405)","author":"R.","year":"2018","unstructured":"Campolo, C., Molinaro, A., Iera, A., Fontes, R. R., & Rothenberg, C. E. (2018). Towards 5G network slicing for the V2X ecosystem. In 2018 4th IEEE conference on network softwarizationandworkshops (NetSoft) (pp. 400\u2013405)."},{"volume-title":"Technical Specification Group Services and System Aspects","year":"2016","key":"e_1_3_2_1_5_1","unstructured":"[5]3GPP, \u201cTechnical Specification Group Services and System Aspects; Feasibility Study on New Services and Markets Technology Enablers, Stage 1 (Release 14),\u201d TR 22.891 v. 14.2.0, Sept. 2016."},{"key":"e_1_3_2_1_6_1","first-page":"569","volume":"2019","author":"Caixia Liu","unstructured":"Liu Caixia, Hu Xinxin. Overview of 5G Network Slicing Technology[J]. Radio Communications Technology,2019,45(6):569-575.","journal-title":"Overview of 5G Network Slicing Technology[J]. Radio Communications Technology"},{"issue":"14","key":"e_1_3_2_1_7_1","first-page":"56","volume":"2014","author":"Qingguo Shen","unstructured":"Shen Qingguo, Zhang Gaoming, Luo Jian.Analysis of SDN Features and Introduction to Typical Applications[J], Mobile Communications,2014, (14):56-61.","journal-title":"Mobile Communications"},{"volume-title":"2014 International Conference on Next Generation Wired\/Wireless Networking.","author":"Samouylov Konstantin","key":"e_1_3_2_1_8_1","unstructured":"Konstantin Samouylov, Yuliya Gaidamaka, Pavel Abaev and Shamil A. Etezov, Modelling a Random Access Channel with Collisions for M2M Traffic in LTE Networks, In 2014 International Conference on Next Generation Wired\/Wireless Networking."},{"issue":"6","key":"e_1_3_2_1_9_1","first-page":"38","volume":"24","author":"C","year":"2018","unstructured":"CampoloC , Molinaro A , Iera A , 5G Network Slicing for Vehicle-to-Everything Services[J]. IEEE Wireless Communications, 2018, 24(6):38-45.","journal-title":"IEEE Wireless Communications"},{"key":"e_1_3_2_1_10_1","unstructured":"3GPP TS 36.321 \"Evolved Universal Terrestrial Radio Access (E-UTRA);Medium Access Control (MAC) protocol specification(Release 16) \" V16.5.0 Jun. 2021"},{"key":"e_1_3_2_1_11_1","unstructured":"3GPP TS 38.321 \"Medium Access Control (MAC) protocol specification (Release 16) \" V16.5.0 Jun. 2021"},{"key":"e_1_3_2_1_12_1","unstructured":"Ericsson \"LTE random-access capacity and collision probability\". TSG-RAN WG1 #45 R1-061369. 2006."},{"volume-title":"Sep., 2011.","author":"GPP TR","key":"e_1_3_2_1_13_1","unstructured":"3GPP TR 37.868, \"RAN improvements for machine-type communication,\" v. 11.0.0, Sep., 2011."},{"key":"e_1_3_2_1_14_1","unstructured":"3GPP TR 36.885 \"Technical Specification Group Radio Access Network; Study on LTE-based V2X Services \" v. 2.0.0 Jun. 2016."},{"volume-title":"Jan., 2016.","author":"GPP TR","key":"e_1_3_2_1_15_1","unstructured":"3GPP TR 36.912, \"Feasibility study for further advancements for E-UTRA (LTE-Advanced),\" v. 13.0.0, Jan., 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MVT.2017.2668738"}],"event":{"name":"ICDSP 2024: 2024 8th International Conference on Digital Signal Processing","acronym":"ICDSP 2024","location":"Hangzhou China"},"container-title":["Proceedings of the 2024 8th International Conference on Digital Signal Processing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653876.3653881","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3653876.3653881","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T01:34:04Z","timestamp":1755912844000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3653876.3653881"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,23]]},"references-count":16,"alternative-id":["10.1145\/3653876.3653881","10.1145\/3653876"],"URL":"https:\/\/doi.org\/10.1145\/3653876.3653881","relation":{},"subject":[],"published":{"date-parts":[[2024,2,23]]},"assertion":[{"value":"2024-08-01","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}