A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus. Huang, J., Xiong, Z., Li, J., Chen, Q., Duan, Q., & Zhao, Y. In Cai, Z., Wang, C., Cheng, S., Wang, H., & Gao, H., editors, WASA, volume 8491, of Lecture Notes in Computer Science, pages 613-623, 2014. Springer. Link Paper bibtex @inproceedings{conf/wasa/HuangXLCDZ14,
added-at = {2019-09-25T00:00:00.000+0200},
author = {Huang, Jun and Xiong, Zi and Li, Jibi and Chen, Qianbin and Duan, Qiang and Zhao, Yanxiao},
biburl = {https://www.bibsonomy.org/bibtex/2e8fd7ef487456e5c6d75207265fdb950/dblp},
booktitle = {WASA},
crossref = {conf/wasa/2014},
editor = {Cai, Zhipeng and Wang, Chaokun and Cheng, Siyao and Wang, Hongzhi and Gao, Hong},
ee = {https://doi.org/10.1007/978-3-319-07782-6_55},
interhash = {e57b9d5f22e83058097c76c93328f6d3},
intrahash = {e8fd7ef487456e5c6d75207265fdb950},
isbn = {978-3-319-07781-9},
keywords = {dblp},
pages = {613-623},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
timestamp = {2020-09-09T13:49:16.000+0200},
title = {A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus.},
url = {http://dblp.uni-trier.de/db/conf/wasa/wasa2014.html#HuangXLCDZ14},
volume = 8491,
year = 2014
}
Downloads: 0
{"_id":"uLvv9hshv5KBaN8is","bibbaseid":"huang-xiong-li-chen-duan-zhao-aprioritybasedaccesscontrolmodelfordevicetodevicecommunicationsunderlayingcellularnetworkusingnetworkcalculus-2014","author_short":["Huang, J.","Xiong, Z.","Li, J.","Chen, Q.","Duan, Q.","Zhao, Y."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2019-09-25T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Huang"],"firstnames":["Jun"],"suffixes":[]},{"propositions":[],"lastnames":["Xiong"],"firstnames":["Zi"],"suffixes":[]},{"propositions":[],"lastnames":["Li"],"firstnames":["Jibi"],"suffixes":[]},{"propositions":[],"lastnames":["Chen"],"firstnames":["Qianbin"],"suffixes":[]},{"propositions":[],"lastnames":["Duan"],"firstnames":["Qiang"],"suffixes":[]},{"propositions":[],"lastnames":["Zhao"],"firstnames":["Yanxiao"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/2e8fd7ef487456e5c6d75207265fdb950/dblp","booktitle":"WASA","crossref":"conf/wasa/2014","editor":[{"propositions":[],"lastnames":["Cai"],"firstnames":["Zhipeng"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Chaokun"],"suffixes":[]},{"propositions":[],"lastnames":["Cheng"],"firstnames":["Siyao"],"suffixes":[]},{"propositions":[],"lastnames":["Wang"],"firstnames":["Hongzhi"],"suffixes":[]},{"propositions":[],"lastnames":["Gao"],"firstnames":["Hong"],"suffixes":[]}],"ee":"https://doi.org/10.1007/978-3-319-07782-6_55","interhash":"e57b9d5f22e83058097c76c93328f6d3","intrahash":"e8fd7ef487456e5c6d75207265fdb950","isbn":"978-3-319-07781-9","keywords":"dblp","pages":"613-623","publisher":"Springer","series":"Lecture Notes in Computer Science","timestamp":"2020-09-09T13:49:16.000+0200","title":"A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus.","url":"http://dblp.uni-trier.de/db/conf/wasa/wasa2014.html#HuangXLCDZ14","volume":"8491","year":"2014","bibtex":"@inproceedings{conf/wasa/HuangXLCDZ14,\n added-at = {2019-09-25T00:00:00.000+0200},\n author = {Huang, Jun and Xiong, Zi and Li, Jibi and Chen, Qianbin and Duan, Qiang and Zhao, Yanxiao},\n biburl = {https://www.bibsonomy.org/bibtex/2e8fd7ef487456e5c6d75207265fdb950/dblp},\n booktitle = {WASA},\n crossref = {conf/wasa/2014},\n editor = {Cai, Zhipeng and Wang, Chaokun and Cheng, Siyao and Wang, Hongzhi and Gao, Hong},\n ee = {https://doi.org/10.1007/978-3-319-07782-6_55},\n interhash = {e57b9d5f22e83058097c76c93328f6d3},\n intrahash = {e8fd7ef487456e5c6d75207265fdb950},\n isbn = {978-3-319-07781-9},\n keywords = {dblp},\n pages = {613-623},\n publisher = {Springer},\n series = {Lecture Notes in Computer Science},\n timestamp = {2020-09-09T13:49:16.000+0200},\n title = {A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus.},\n url = {http://dblp.uni-trier.de/db/conf/wasa/wasa2014.html#HuangXLCDZ14},\n volume = 8491,\n year = 2014\n}\n\n","author_short":["Huang, J.","Xiong, Z.","Li, J.","Chen, Q.","Duan, Q.","Zhao, Y."],"editor_short":["Cai, Z.","Wang, C.","Cheng, S.","Wang, H.","Gao, H."],"key":"conf/wasa/HuangXLCDZ14","id":"conf/wasa/HuangXLCDZ14","bibbaseid":"huang-xiong-li-chen-duan-zhao-aprioritybasedaccesscontrolmodelfordevicetodevicecommunicationsunderlayingcellularnetworkusingnetworkcalculus-2014","role":"author","urls":{"Link":"https://doi.org/10.1007/978-3-319-07782-6_55","Paper":"http://dblp.uni-trier.de/db/conf/wasa/wasa2014.html#HuangXLCDZ14"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Jun Huang?items=1000","dataSources":["kKjiz9fhhP8BQoHNk"],"keywords":["dblp"],"search_terms":["priority","based","access","control","model","device","device","communications","underlaying","cellular","network","using","network","calculus","huang","xiong","li","chen","duan","zhao"],"title":"A Priority-Based Access Control Model for Device-to-Device Communications Underlaying Cellular Network Using Network Calculus.","year":2014}