{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:20:13Z","timestamp":1761402013048},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Commun."],"published-print":{"date-parts":[[2019,9,1]]},"DOI":"10.1587\/transcom.2018ebp3233","type":"journal-article","created":{"date-parts":[[2019,3,21]],"date-time":"2019-03-21T22:33:50Z","timestamp":1553207630000},"page":"1914-1923","source":"Crossref","is-referenced-by-count":1,"title":["A Generalized Data Uploading Scheme for D2D-Enhanced Cellular Networks"],"prefix":"10.23919","volume":"E102.B","author":[{"given":"Xiaolan","family":"LIU","sequence":"first","affiliation":[{"name":"School of Systems Information Science, Future University Hakodate"},{"name":"School of Computer and Information Engineering, Chuzhou University"}]},{"given":"Lisheng","family":"MA","sequence":"additional","affiliation":[{"name":"School of Computer and Information Engineering, Chuzhou University"}]},{"given":"Xiaohong","family":"JIANG","sequence":"additional","affiliation":[{"name":"School of Systems Information Science, Future University Hakodate"}]}],"member":"263","reference":[{"key":"1","doi-asserted-by":"publisher","unstructured":"[1] J.M. Vella and S. Zammit, \u201cA survey of multicasting over wireless access networks,\u201d IEEE Commun. Surveys Tuts., vol.15, no.2, pp.718-753, June 2013. 10.1109\/surv.2012.050412.00095","DOI":"10.1109\/SURV.2012.050412.00095"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[2] F. Rebecchi, M.D.D. Amorim, V. Conan, A. Passarella, R. Bruno, and M. Conti, \u201cData offloading techniques in cellular networks: A survey,\u201d IEEE Commun. Surveys Tuts., vol.17, no.2, pp.580-603, Jan. 2015. 10.1109\/comst.2014.2369742","DOI":"10.1109\/COMST.2014.2369742"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] Z. Zheng, T. Wang, L. Song, Z. Han, and J. Wu, \u201cSocial-aware multi-file dissemination in device-to-device overlay networks,\u201d 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp.219-220, 2014. 10.1109\/infcomw.2014.6849234","DOI":"10.1109\/INFCOMW.2014.6849234"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[4] M. Siekkinen, F. Masala, and J.K. Nurminen, \u201cOptimized upload strategies for live scalable video transmission from mobile mevices,\u201d IEEE Trans. Mobile Comput., vol.16, no.4, pp.1059-1072, April 2017. 10.1109\/tmc.2016.2585138","DOI":"10.1109\/TMC.2016.2585138"},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] P. Mohan, V.N. Padmanabhan, and R. Ramjee, \u201cNericell: Rich monitoring of road and traffic conditions using mobile smartphones,\u201d Proc. 6th ACM Conference on Embedded Network Sensor Systems, pp.323-336, 2008. 10.1145\/1460412.1460444","DOI":"10.1145\/1460412.1460444"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[6] H. Nishiyama, T. Ngo, S. Oiyama, and N. Kato, \u201cRelay by smart device: Innovative communications for efficient information sharing among vehicles and pedestrians,\u201d IEEE Veh. Technol. Mag., vol.10, no.4, pp.54-62, Dec. 2015. 10.1109\/mvt.2015.2481558","DOI":"10.1109\/MVT.2015.2481558"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] N. Oliver and F.F. Mangas, \u201cHealthGear: Automatic sleep apnea detection and monitoring with a mobile phone,\u201d J. Communications, vol.2, no.2, pp.1-9, March 2007. 10.4304\/jcm.2.2.1-9","DOI":"10.4304\/jcm.2.2.1-9"},{"key":"8","doi-asserted-by":"publisher","unstructured":"[8] H. Nishiyama, M. Ito, and N. Kato, \u201cRelay-by-smartphone: Realizing multihop device-to-device communications,\u201d IEEE Commun. Mag., vol.52, no.4, pp.56-65, April 2014. 10.1109\/mcom.2014.6807947","DOI":"10.1109\/MCOM.2014.6807947"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[9] Y. Zhu, \u201cOptimizing upload time of data from mobile devices,\u201d IEEE Global Communications Conference on Global Telecommunications Conference (GLOBECOM), pp.1-6, 2010. 10.1109\/glocom.2010.5684290","DOI":"10.1109\/GLOCOM.2010.5684290"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] L. Zhang, Z. Li, C. Wu, and M. Chen, \u201cOnline algorithms for uploading deferrable big data to the cloud,\u201d 2014 IEEE Conference on Computer Communications (INFOCOM 2014), pp.2022-2030, 2014. 10.1109\/infocom.2014.6848143","DOI":"10.1109\/INFOCOM.2014.6848143"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[11] H. Wang, D. He, and S. Tang, \u201cIdentity-based proxy-oriented data uploading and remote data integrity checking in public cloud,\u201d IEEE Transactions on Information Forensics and Security, vol.11, no.6, pp.1165-1176, June 2016. 10.1109\/TIFS.2016.2520886","DOI":"10.1109\/TIFS.2016.2520886"},{"key":"12","doi-asserted-by":"publisher","unstructured":"[12] L. Militano, A. Orsino, G. Araniti, A. Molinaro, and A. Iera, \u201cA constrained coalition formation game for multihop D2D content uploading,\u201d IEEE Trans. Wireless Commun., vol.15, no.3, pp.2012-2024, March 2016. 10.1109\/twc.2015.2497682","DOI":"10.1109\/TWC.2015.2497682"},{"key":"13","doi-asserted-by":"publisher","unstructured":"[13] L. Militano, A. Orsino, G. Araniti, M. Nitti, L. Atzori, and A. Iera, \u201cTrust-based and social-aware coalition formation game for multihop data uploading in 5G systems,\u201d Computer Networks, vol.111, pp.141-151, Aug. 2016. 10.1016\/j.comnet.2016.08.001","DOI":"10.1016\/j.comnet.2016.08.001"},{"key":"14","doi-asserted-by":"publisher","unstructured":"[14] X. Chen, B. Proulx, X. Gong, and J. Zhang, \u201cExploiting social ties for cooperative D2D communications: A mobile social networking case,\u201d IEEE\/ACM Trans. Netw., vol.23, no.5, pp.1471-1484, Oct. 2015. 10.1109\/tnet.2014.2329956","DOI":"10.1109\/TNET.2014.2329956"},{"key":"15","doi-asserted-by":"publisher","unstructured":"[15] B. Zhang, Y. Li, D. Jin, P. Hui, and Z. Han, \u201cSocial-aware peer discovery for D2D communications underlaying cellular networks,\u201d IEEE Trans. Wireless Commun., vol.14, no.5, pp.2426-2439, May 2015. 10.1109\/twc.2014.2386865","DOI":"10.1109\/TWC.2014.2386865"},{"key":"16","unstructured":"[16] S. Hussain, \u201cDynamic Radio Resource Management in 3GPP LTE,\u201d Jan. 2009."},{"key":"17","doi-asserted-by":"publisher","unstructured":"[17] Y. Li, D. Jin, J. Yuan, and Z. Han, \u201cCoalitional games for resource allocation in the device-to-device uplink underlaying cellular networks,\u201d IEEE Trans. Wireless Commun., vol.13, no.7, pp.3965-3977, May 2014. 10.1109\/twc.2014.2325552","DOI":"10.1109\/TWC.2014.2325552"},{"key":"18","unstructured":"[18] 3GPP, \u201cEvolved Universal Terrestrial Radio Access (E-UTRA) and Evolved Universal Terrestrial Radio Access Network (E-UTRAN),\u201d User Equipment (UE) Radio Access Capabilities (3GPP TS 36.306 version 10.4. 0 Release 10), Sept. 2012."},{"key":"19","doi-asserted-by":"publisher","unstructured":"[19] Y. Chang, H. Chen, and F. Zhao, \u201cEnergy efficiency maximization of full-duplex and half-duplex D2D communications underlaying cellular networks,\u201d Mobile Information Systems, vol.2016, Aug. 2016. 10.1155\/2016\/2748673","DOI":"10.1155\/2016\/2748673"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[20] J. Yao, S. Feng, X. Zhou, and Y. Liu, \u201cSecure routing in multihop wireless ad-hoc networks with decode-and-forward relaying,\u201d IEEE Trans. Commun., vol.64, no.2, pp.753-764, Dec. 2016. 10.1109\/tcomm.2015.2514094","DOI":"10.1109\/TCOMM.2015.2514094"},{"key":"21","doi-asserted-by":"publisher","unstructured":"[21] X. Chen, L. Song, Z. Han, Q. Zhao, X. Wang, X. Cheng, and B. Jiao, \u201cEfficiency resource allocation for device-to-device underlay communication systems: A reverse iterative combinatorial auction based approach,\u201d IEEE J. Sel. Areas Commun., vol.31, no.9, pp.348-358, Nov. 2013. 10.1109\/jsac.2013.sup.0513031","DOI":"10.1109\/JSAC.2013.SUP.0513031"},{"key":"22","doi-asserted-by":"publisher","unstructured":"[22] Y. Li, S. Su, and S. Chen, \u201cSocial-aware resource allocation for device-to-device communications underlaying cellular networks,\u201d IEEE Wireless Commun. Lett., vol.4, no.3, pp.293-296, Dec. 2015. 10.1109\/lwc.2015.2410768","DOI":"10.1109\/LWC.2015.2410768"},{"key":"23","unstructured":"[24] M.J. Osborne and A. Rubinstein, A Course in Game Theory, MIT Press, 1994."},{"key":"24","doi-asserted-by":"publisher","unstructured":"[25] T. Ning, Y. Liu, Z. Yang, and H. Wu, \u201cIncentive mechanisms for data dissemination in autonomous mobile social networks,\u201d IEEE Trans. Mobile Comput., vol.16, no.11, pp.3084-3099, Nov. 2017. 10.1109\/tmc.2017.2685390","DOI":"10.1109\/TMC.2017.2685390"},{"key":"25","doi-asserted-by":"publisher","unstructured":"[26] J. Li, Y. Zhu, Y. Hua, and J. Yu, \u201cCrowdsourcing sensing to smartphones: A randomized auction approach,\u201d IEEE Trans. Mobile Comput., vol.16, no.10, pp.2764-2777, Oct. 2017. 10.1109\/TMC.2017.2653774","DOI":"10.1109\/TMC.2017.2653774"},{"key":"26","doi-asserted-by":"publisher","unstructured":"[27] D. Yang, G. Xue, X. Fang, and J. Tang, \u201cIncentive mechanisms for crowdsensing: Crowdsourcing with smartphones,\u201d IEEE\/ACM Trans. Netw., vol.24, no.3, pp.1732-1744, June 2016. 10.1109\/tnet.2015.2421897","DOI":"10.1109\/TNET.2015.2421897"},{"key":"27","doi-asserted-by":"publisher","unstructured":"[28] W. Saad, Z. Han, M. Debbah, A. Hj\u00f8rungnes, and T. Basar, \u201cCoalitional game theory for communication networks,\u201d IEEE Signal Process. Mag., vol.26, no.5, pp.77-97, May 2009. 10.1109\/msp.2009.000000","DOI":"10.1109\/MSP.2009.000000"},{"key":"28","unstructured":"[29] D.E. Knuth, The Art of Computer Programming, Volume 4, Fascicle 3: Generating All Combinations and Partitions, Addison-Wesley Professional, 2005."},{"key":"29","doi-asserted-by":"publisher","unstructured":"[30] T. Sandholm, K. Larson, M. Andersson, O. Shehory, and F. Tohm\u00e9, \u201cCoalition structure generation with worst case guarantees,\u201d Artif. Intell., vol.111, no.1-2, pp.209-238, July 1999. 10.1016\/s0004-3702(99)00036-3","DOI":"10.1016\/S0004-3702(99)00036-3"},{"key":"30","doi-asserted-by":"publisher","unstructured":"[31] K.R. Apt and A. Witzel, \u201cA generic approach to coalition formation,\u201d Int. Game Theory Rev., vol.11, no.03, pp.347-367, Sept. 2009. 10.1142\/s0219198909002352","DOI":"10.1142\/S0219198909002352"},{"key":"31","doi-asserted-by":"publisher","unstructured":"[32] H. Zhang, Y. Liao, and L. Song, \u201cD2D-U: Device-to-device communications in unlicensed bands for 5G system,\u201d IEEE Trans. Wireless Commun., vol.16, no.6, pp.3507-3519, June 2017. 10.1109\/twc.2017.2683479","DOI":"10.1109\/TWC.2017.2683479"},{"key":"32","unstructured":"[33] K.R. Apt and T. Radzik, \u201cStable partitions in coalitional games,\u201d arXiv preprint cs\/0605132, May 2006."},{"key":"33","doi-asserted-by":"publisher","unstructured":"[34] F. Wang, Y. Li, Z. Wang, and Z. Yang, \u201cSocial-community-aware resource allocation for D2D communications underlaying cellular networks,\u201d IEEE Trans. Veh. Technol., vol.65, no.5, pp.3628-3640, May 2016. 10.1109\/tvt.2015.2450774","DOI":"10.1109\/TVT.2015.2450774"},{"key":"34","doi-asserted-by":"publisher","unstructured":"[35] A. Al-Hourani, S. Kandeepan, and A. Jamalipour, \u201cStochastic geometry study on device-to-device communication as a disaster relief solution,\u201d IEEE Trans. Veh. Technol., vol.65, no.5, pp.3005-3017, May 2016. 10.1109\/tvt.2015.2450223","DOI":"10.1109\/TVT.2015.2450223"},{"key":"35","doi-asserted-by":"publisher","unstructured":"[36] Z. Lu, G. Cao, and T.L. Porta, \u201cTeamPhone: Networking smartphones for disaster recovery,\u201d IEEE Trans. Mobile Comput., vol.16, no.12, pp.3554-3567, Dec. 2017. 10.1109\/tmc.2017.2695452","DOI":"10.1109\/TMC.2017.2695452"},{"key":"36","unstructured":"[37] http:\/\/netsg.cs.sfu.ca\/youtubedata.html"}],"container-title":["IEICE Transactions on Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/9\/E102.B_2018EBP3233\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T15:02:22Z","timestamp":1704898942000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transcom\/E102.B\/9\/E102.B_2018EBP3233\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,1]]},"references-count":36,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2019]]}},"URL":"https:\/\/doi.org\/10.1587\/transcom.2018ebp3233","relation":{},"ISSN":["0916-8516","1745-1345"],"issn-type":[{"value":"0916-8516","type":"print"},{"value":"1745-1345","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,1]]}}}