{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:14:30Z","timestamp":1740100470239,"version":"3.37.3"},"reference-count":29,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T00:00:00Z","timestamp":1638144000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-20-1-0253"],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,11,29]]},"DOI":"10.1109\/milcom52596.2021.9652917","type":"proceedings-article","created":{"date-parts":[[2021,12,30]],"date-time":"2021-12-30T21:06:10Z","timestamp":1640898370000},"page":"243-248","source":"Crossref","is-referenced-by-count":3,"title":["Constrained Resource Allocation Problems in Communications: An Information-assisted Approach"],"prefix":"10.1109","author":[{"given":"I. Zakir","family":"Ahmed","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Sadjadpour","sequence":"additional","affiliation":[]},{"given":"Shahram","family":"Yousefi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/160"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2009.11.005"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0263"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2015.7182655"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2917051"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2018.2850311"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2020.3007313"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2009.071266"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060467"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2964534"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM50620.2020.9282342"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054753"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054855"},{"journal-title":"Numerical Optimization","year":"2006","author":"nocedal","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2881656"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TGCN.2020.3039282"},{"journal-title":"C++ Plus Data Structures","year":"2011","author":"dale","key":"ref29"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-017-4311-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2016.355"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9904-1954-09848-8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.disopt.2016.01.005"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/322276.322287"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-1452-1_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.1981.1102793"},{"journal-title":"Necessary and sufficient conditions for a solution of the bellman equation to be the value function A general principle","year":"2015","author":"kamihigashi","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2174\/1874110X00903010005"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1973.9030"},{"journal-title":"The information bottleneck method","year":"2000","author":"tishby","key":"ref25"}],"event":{"name":"MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)","start":{"date-parts":[[2021,11,29]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2021,12,2]]}},"container-title":["MILCOM 2021 - 2021 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9652874\/9652880\/09652917.pdf?arnumber=9652917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T17:00:03Z","timestamp":1652202003000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9652917\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,29]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/milcom52596.2021.9652917","relation":{},"subject":[],"published":{"date-parts":[[2021,11,29]]}}}