callback( { "result":{ "query":":facetid:toc:\"db/journals/access/access5.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"66.89" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"2341", "@dc":"2341", "@oc":"2341", "@id":"43433443", "text":":facetid:toc:db/journals/access/access5.bht" } }, "hits":{ "@total":"2341", "@computed":"100", "@sent":"30", "@first":"0", "hit":[{ "@score":"1", "@id":"2741156", "info":{"authors":{"author":[{"@pid":"22/846-3","text":"Rahul Sharma 0003"},{"@pid":"184/4648","text":"Firuz Zare"},{"@pid":"15/5246","text":"Dragan Nesic"},{"@pid":"62/10648-1","text":"Arindam Ghosh 0001"}]},"title":"A Hidden Block in a Grid Connected Active Front End System: Modelling, Control and Stability Analysis.","venue":"IEEE Access","volume":"5","pages":"11852-11866","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/0003ZNG17","doi":"10.1109/ACCESS.2017.2719055","ee":"https://doi.org/10.1109/ACCESS.2017.2719055","url":"https://dblp.org/rec/journals/access/0003ZNG17"}, "url":"URL#2741156" }, { "@score":"1", "@id":"2741157", "info":{"authors":{"author":[{"@pid":"23/10801","text":"Sergi Abadal"},{"@pid":"31/8282","text":"Christos Liaskos"},{"@pid":"89/4915","text":"Ageliki Tsioliaridou"},{"@pid":"33/2939","text":"Sotiris Ioannidis"},{"@pid":"37/2147","text":"Andreas Pitsillides"},{"@pid":"49/3767","text":"Josep Solé-Pareta"},{"@pid":"28/6172","text":"Eduard Alarcón"},{"@pid":"42/2223","text":"Albert Cabellos-Aparicio"}]},"title":"Computing and Communications for the Software-Defined Metamaterial Paradigm: A Context Analysis.","venue":"IEEE Access","volume":"5","pages":"6225-6235","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbadalLTIPSAC17","doi":"10.1109/ACCESS.2017.2693267","ee":"https://doi.org/10.1109/ACCESS.2017.2693267","url":"https://dblp.org/rec/journals/access/AbadalLTIPSAC17"}, "url":"URL#2741157" }, { "@score":"1", "@id":"2741158", "info":{"authors":{"author":[{"@pid":"179/3415","text":"Ahmed A. Alabdel Abass"},{"@pid":"x/LiangXiao3","text":"Liang Xiao 0003"},{"@pid":"11/2657","text":"Narayan B. Mandayam"},{"@pid":"22/876","text":"Zoran Gajic"}]},"title":"Evolutionary Game Theoretic Analysis of Advanced Persistent Threats Against Cloud Storage.","venue":"IEEE Access","volume":"5","pages":"8482-8491","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbassXMG17","doi":"10.1109/ACCESS.2017.2691326","ee":"https://doi.org/10.1109/ACCESS.2017.2691326","url":"https://dblp.org/rec/journals/access/AbassXMG17"}, "url":"URL#2741158" }, { "@score":"1", "@id":"2741159", "info":{"authors":{"author":[{"@pid":"09/5961-1","text":"Ghulam Abbas 0001"},{"@pid":"60/955","text":"Jason Gu"},{"@pid":"68/1727-1","text":"Umar Farooq 0001"},{"@pid":"20/241-11","text":"Muhammad Usman Asad"},{"@pid":"20/7483","text":"Mohamed E. El-Hawary"}]},"title":"Solution of an Economic Dispatch Problem Through Particle Swarm Optimization: A Detailed Survey - Part I.","venue":"IEEE Access","volume":"5","pages":"15105-15141","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasGFAE17","doi":"10.1109/ACCESS.2017.2723862","ee":"https://doi.org/10.1109/ACCESS.2017.2723862","url":"https://dblp.org/rec/journals/access/AbbasGFAE17"}, "url":"URL#2741159" }, { "@score":"1", "@id":"2741160", "info":{"authors":{"author":[{"@pid":"09/5961-1","text":"Ghulam Abbas 0001"},{"@pid":"60/955","text":"Jason Gu"},{"@pid":"68/1727-1","text":"Umar Farooq 0001"},{"@pid":"28/9187-2","text":"Ali Raza 0002"},{"@pid":"20/241-11","text":"Muhammad Usman Asad"},{"@pid":"20/7483","text":"Mohamed E. El-Hawary"}]},"title":"Solution of an Economic Dispatch Problem Through Particle Swarm Optimization: A Detailed Survey - Part II.","venue":"IEEE Access","volume":"5","pages":"24426-24445","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasGFRAE17","doi":"10.1109/ACCESS.2017.2768522","ee":"https://doi.org/10.1109/ACCESS.2017.2768522","url":"https://dblp.org/rec/journals/access/AbbasGFRAE17"}, "url":"URL#2741160" }, { "@score":"1", "@id":"2741161", "info":{"authors":{"author":[{"@pid":"26/10701","text":"Ziaul Haq Abbas"},{"@pid":"189/9868","text":"Fazal Muhammad"},{"@pid":"47/91-1","text":"Lei Jiao 0001"}]},"title":"Analysis of Load Balancing and Interference Management in Heterogeneous Cellular Networks.","venue":"IEEE Access","volume":"5","pages":"14690-14705","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasMJ17","doi":"10.1109/ACCESS.2017.2732498","ee":"https://doi.org/10.1109/ACCESS.2017.2732498","url":"https://dblp.org/rec/journals/access/AbbasMJ17"}, "url":"URL#2741161" }, { "@score":"1", "@id":"2741162", "info":{"authors":{"author":[{"@pid":"84/9633","text":"Nasir Abbas"},{"@pid":"40/487-1","text":"Muhammad Riaz 0001"},{"@pid":"22/9200-1","text":"Tahir Mahmood 0001"}]},"title":"An Improved S2 Control Chart for Cost and Efficiency Optimization.","venue":"IEEE Access","volume":"5","pages":"19486-19493","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasRM17","doi":"10.1109/ACCESS.2017.2755440","ee":"https://doi.org/10.1109/ACCESS.2017.2755440","url":"https://dblp.org/rec/journals/access/AbbasRM17"}, "url":"URL#2741162" }, { "@score":"1", "@id":"2741163", "info":{"authors":{"author":[{"@pid":"131/2566","text":"Asad Abbas"},{"@pid":"199/0193","text":"Isma Farah Siddiqui"},{"@pid":"71/2905","text":"Scott Uk-Jin Lee"},{"@pid":"55/3719","text":"Ali Kashif Bashir"}]},"title":"Binary Pattern for Nested Cardinality Constraints for Software Product Line of IoT-Based Feature Models.","venue":"IEEE Access","volume":"5","pages":"3971-3980","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasSLB17","doi":"10.1109/ACCESS.2017.2680470","ee":"https://doi.org/10.1109/ACCESS.2017.2680470","url":"https://dblp.org/rec/journals/access/AbbasSLB17"}, "url":"URL#2741163" }, { "@score":"1", "@id":"2741164", "info":{"authors":{"author":[{"@pid":"42/10077","text":"Qammer H. Abbasi"},{"@pid":"60/9874","text":"Ali Arshad Nasir"},{"@pid":"80/4136-1","text":"Ke Yang 0001"},{"@pid":"11/6615","text":"Khalid A. Qaraqe"},{"@pid":"75/10077","text":"Akram Alomainy"}]},"title":"Cooperative In-Vivo Nano-Network Communication at Terahertz Frequencies.","venue":"IEEE Access","volume":"5","pages":"8642-8647","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbbasiNYQA17","doi":"10.1109/ACCESS.2017.2677498","ee":"https://doi.org/10.1109/ACCESS.2017.2677498","url":"https://dblp.org/rec/journals/access/AbbasiNYQA17"}, "url":"URL#2741164" }, { "@score":"1", "@id":"2741165", "info":{"authors":{"author":[{"@pid":"189/7633","text":"Moloud Abdar"},{"@pid":"20/6973","text":"Neil Y. Yen"}]},"title":"Design of A Universal User Model for Dynamic Crowd Preference Sensing and Decision-Making Behavior Analysis.","venue":"IEEE Access","volume":"5","pages":"24842-24852","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbdarY17","doi":"10.1109/ACCESS.2017.2735242","ee":"https://doi.org/10.1109/ACCESS.2017.2735242","url":"https://dblp.org/rec/journals/access/AbdarY17"}, "url":"URL#2741165" }, { "@score":"1", "@id":"2741166", "info":{"authors":{"author":[{"@pid":"86/8105","text":"Wadood Abdul"},{"@pid":"88/10035-1","text":"Zulfiqar Ali 0001"},{"@pid":"95/1173","text":"Sanaa Ghouzali"},{"@pid":"199/9839","text":"Budour Alfawaz"},{"@pid":"49/10239","text":"Ghulam Muhammad"},{"@pid":"66/5574","text":"M. Shamim Hossain"}]},"title":"Biometric Security Through Visual Encryption for Fog Edge Computing.","venue":"IEEE Access","volume":"5","pages":"5531-5538","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbdulAGAMH17","doi":"10.1109/ACCESS.2017.2693438","ee":"https://doi.org/10.1109/ACCESS.2017.2693438","url":"https://dblp.org/rec/journals/access/AbdulAGAMH17"}, "url":"URL#2741166" }, { "@score":"1", "@id":"2741167", "info":{"authors":{"author":[{"@pid":"142/2607","text":"Shafii Muhammad Abdulhamid"},{"@pid":"93/6052","text":"Muhammad Shafie Abdul Latif"},{"@pid":"124/2904","text":"Haruna Chiroma"},{"@pid":"177/9370","text":"Oluwafemi Osho"},{"@pid":"173/8379","text":"Gaddafi Abdul-Salaam"},{"@pid":"53/10767","text":"Adamu I. Abubakar"},{"@pid":"67/7386","text":"Tutut Herawan"}]},"title":"A Review on Mobile SMS Spam Filtering Techniques.","venue":"IEEE Access","volume":"5","pages":"15650-15666","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbdulhamidLCOAA17","doi":"10.1109/ACCESS.2017.2666785","ee":"https://doi.org/10.1109/ACCESS.2017.2666785","url":"https://dblp.org/rec/journals/access/AbdulhamidLCOAA17"}, "url":"URL#2741167" }, { "@score":"1", "@id":"2741168", "info":{"authors":{"author":[{"@pid":"197/6398","text":"Sadiq H. Abdulhussain"},{"@pid":"48/8899","text":"Abd. Rahman Ramli"},{"@pid":"169/2966","text":"Syed Abdul Rahman Al-Haddad"},{"@pid":"197/6418","text":"Basheera M. Mahmmod"},{"@pid":"125/2940","text":"Wissam A. Jassim"}]},"title":"On Computational Aspects of Tchebichef Polynomials for Higher Polynomial Order.","venue":"IEEE Access","volume":"5","pages":"2470-2478","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbdulhussainRAM17","doi":"10.1109/ACCESS.2017.2669218","ee":"https://doi.org/10.1109/ACCESS.2017.2669218","url":"https://dblp.org/rec/journals/access/AbdulhussainRAM17"}, "url":"URL#2741168" }, { "@score":"1", "@id":"2741169", "info":{"authors":{"author":[{"@pid":"202/1586","text":"Jaideep Abichandani"},{"@pid":"164/4648","text":"Jeff Baenke"},{"@pid":"164/4564","text":"Michael S. Irizarry"},{"@pid":"202/1548","text":"Narothum Saxena"},{"@pid":"202/1526","text":"Purva Vyas"},{"@pid":"71/4622","text":"Sanjay Prasad"},{"@pid":"202/1498","text":"Shruti Mada"},{"@pid":"70/10821","text":"Yohannes Tafesse"}]},"title":"A Comparative Study of Voice Quality and Coverage for Voice over Long Term Evolution Calls Using Different Codec Mode-sets.","venue":"IEEE Access","volume":"5","pages":"10315-10322","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbichandaniBISV17","doi":"10.1109/ACCESS.2017.2707080","ee":"https://doi.org/10.1109/ACCESS.2017.2707080","url":"https://dblp.org/rec/journals/access/AbichandaniBISV17"}, "url":"URL#2741169" }, { "@score":"1", "@id":"2741170", "info":{"authors":{"author":[{"@pid":"203/7812","text":"Mohamed Nezar Abourraja"},{"@pid":"166/0582","text":"Mustapha Oudani"},{"@pid":"203/9205","text":"Mohamed Yassine Samiri"},{"@pid":"147/0826","text":"Dalila Boudebous"},{"@pid":"15/4171","text":"Abdelaziz El Fazziki"},{"@pid":"147/0954","text":"Mehdi Najib"},{"@pid":"152/8255","text":"Abdelhadi Bouain"},{"@pid":"203/9208","text":"Naoufal Rouky"}]},"title":"A Multi-Agent Based Simulation Model for Rail-Rail Transshipment: An Engineering Approach for Gantry Crane Scheduling.","venue":"IEEE Access","volume":"5","pages":"13142-13156","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbourrajaOSBFNB17","doi":"10.1109/ACCESS.2017.2713246","ee":"https://doi.org/10.1109/ACCESS.2017.2713246","url":"https://dblp.org/rec/journals/access/AbourrajaOSBFNB17"}, "url":"URL#2741170" }, { "@score":"1", "@id":"2741171", "info":{"authors":{"author":[{"@pid":"76/2942","text":"Taufik Abrão"},{"@pid":"03/10239","text":"Shaoshi Yang"},{"@pid":"20/8910","text":"Lucas Dias Hiera Sampaio"},{"@pid":"98/2638","text":"Paul Jean Etienne Jeszensky"},{"@pid":"92/5955","text":"Lajos Hanzo"}]},"title":"Achieving Maximum Effective Capacity in OFDMA Networks Operating Under Statistical Delay Guarantee.","venue":"IEEE Access","volume":"5","pages":"14333-14346","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbraoYSJH17","doi":"10.1109/ACCESS.2017.2731851","ee":"https://doi.org/10.1109/ACCESS.2017.2731851","url":"https://dblp.org/rec/journals/access/AbraoYSJH17"}, "url":"URL#2741171" }, { "@score":"1", "@id":"2741172", "info":{"authors":{"author":[{"@pid":"154/3517","text":"Adnan M. Abu-Mahfouz"},{"@pid":"44/2703-2","text":"Gerhard P. Hancke 0002"}]},"title":"ALWadHA Localization Algorithm: Yet More Energy Efficient.","venue":"IEEE Access","volume":"5","pages":"6661-6667","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/Abu-MahfouzH17","doi":"10.1109/ACCESS.2017.2687619","ee":"https://doi.org/10.1109/ACCESS.2017.2687619","url":"https://dblp.org/rec/journals/access/Abu-MahfouzH17"}, "url":"URL#2741172" }, { "@score":"1", "@id":"2741173", "info":{"authors":{"author":[{"@pid":"186/4762","text":"Ahmad Abuashour"},{"@pid":"36/2183","text":"Michel Kadoch"}]},"title":"Performance Improvement of Cluster-Based Routing Protocol in VANET.","venue":"IEEE Access","volume":"5","pages":"15354-15371","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbuashourK17","doi":"10.1109/ACCESS.2017.2733380","ee":"https://doi.org/10.1109/ACCESS.2017.2733380","url":"https://dblp.org/rec/journals/access/AbuashourK17"}, "url":"URL#2741173" }, { "@score":"1", "@id":"2741174", "info":{"authors":{"author":[{"@pid":"53/10767","text":"Adamu I. Abubakar"},{"@pid":"199/0203","text":"Elbara Eldaw Elnour Mohamed"},{"@pid":"74/7486","text":"Akram M. Zeki"}]},"title":"The Dynamics of Data Packet in Transmission Session.","venue":"IEEE Access","volume":"5","pages":"4329-4339","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbubakarMZ17","doi":"10.1109/ACCESS.2017.2682108","ee":"https://doi.org/10.1109/ACCESS.2017.2682108","url":"https://dblp.org/rec/journals/access/AbubakarMZ17"}, "url":"URL#2741174" }, { "@score":"1", "@id":"2741175", "info":{"authors":{"author":{"@pid":"137/6732","text":"Mu'azu Ramat Abujiya"}},"title":"New Cumulative Sum Control Chart for Monitoring Poisson Processes.","venue":"IEEE Access","volume":"5","pages":"14298-14308","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/Abujiya17","doi":"10.1109/ACCESS.2017.2733520","ee":"https://doi.org/10.1109/ACCESS.2017.2733520","url":"https://dblp.org/rec/journals/access/Abujiya17"}, "url":"URL#2741175" }, { "@score":"1", "@id":"2741176", "info":{"authors":{"author":[{"@pid":"213/3303","text":"Abdulbast A. Abushgra"},{"@pid":"04/3246","text":"Khaled M. Elleithy"}]},"title":"A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels.","venue":"IEEE Access","volume":"5","pages":"17753-17763","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AbushgraE17","doi":"10.1109/ACCESS.2017.2741899","ee":"https://doi.org/10.1109/ACCESS.2017.2741899","url":"https://dblp.org/rec/journals/access/AbushgraE17"}, "url":"URL#2741176" }, { "@score":"1", "@id":"2741177", "info":{"authors":{"author":[{"@pid":"208/7768","text":"Kazeem B. Adedeji"},{"@pid":"83/4705","text":"Yskandar Hamam"},{"@pid":"168/0184","text":"Bolanle Tolulope Abe"},{"@pid":"154/3517","text":"Adnan M. Abu-Mahfouz"}]},"title":"Towards Achieving a Reliable Leakage Detection and Localization Algorithm for Application in Water Piping Networks: An Overview.","venue":"IEEE Access","volume":"5","pages":"20272-20285","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AdedejiHAA17","doi":"10.1109/ACCESS.2017.2752802","ee":"https://doi.org/10.1109/ACCESS.2017.2752802","url":"https://dblp.org/rec/journals/access/AdedejiHAA17"}, "url":"URL#2741177" }, { "@score":"1", "@id":"2741178", "info":{"authors":{"author":[{"@pid":"04/8223-10","text":"Muhammad Adnan 0010"},{"@pid":"49/4911","text":"Muhammad Afzal"}]},"title":"Ontology Based Multiagent Effort Estimation System for Scrum Agile Method.","venue":"IEEE Access","volume":"5","pages":"25993-26005","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AdnanA17","doi":"10.1109/ACCESS.2017.2771257","ee":"https://doi.org/10.1109/ACCESS.2017.2771257","url":"https://dblp.org/rec/journals/access/AdnanA17"}, "url":"URL#2741178" }, { "@score":"1", "@id":"2741179", "info":{"authors":{"author":[{"@pid":"182/2569","text":"Farooq Aftab"},{"@pid":"12/4711","text":"Zhongshan Zhang"},{"@pid":"39/3324","text":"Adeel Ahmad"}]},"title":"Self-Organization Based Clustering in MANETs Using Zone Based Group Mobility.","venue":"IEEE Access","volume":"5","pages":"27464-27476","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AftabZA17","doi":"10.1109/ACCESS.2017.2778019","ee":"https://doi.org/10.1109/ACCESS.2017.2778019","url":"https://dblp.org/rec/journals/access/AftabZA17"}, "url":"URL#2741179" }, { "@score":"1", "@id":"2741180", "info":{"authors":{"author":[{"@pid":"120/8326","text":"Muhammad Khalil Afzal"},{"@pid":"48/8318","text":"Mubashir Husain Rehmani"},{"@pid":"58/1789","text":"Antonio Pescapè"},{"@pid":"41/3038","text":"Sung Won Kim"},{"@pid":"10/7465","text":"Waleed Ejaz"}]},"title":"IEEE Access Special Section Editorial: The New Era of Smart Cities: Sensors, Communication Technologies, and Applications.","venue":"IEEE Access","volume":"5","pages":"27836-27840","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AfzalRPKE17","doi":"10.1109/ACCESS.2017.2783079","ee":"https://doi.org/10.1109/ACCESS.2017.2783079","url":"https://dblp.org/rec/journals/access/AfzalRPKE17"}, "url":"URL#2741180" }, { "@score":"1", "@id":"2741181", "info":{"authors":{"author":[{"@pid":"153/4319","text":"Parag Aggarwal"},{"@pid":"89/3598","text":"Vivek Ashok Bohara"}]},"title":"On the Multiband Carrier Aggregated Nonlinear LTE-A System.","venue":"IEEE Access","volume":"5","pages":"16930-16943","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AggarwalB17","doi":"10.1109/ACCESS.2017.2740498","ee":"https://doi.org/10.1109/ACCESS.2017.2740498","url":"https://dblp.org/rec/journals/access/AggarwalB17"}, "url":"URL#2741181" }, { "@score":"1", "@id":"2741182", "info":{"authors":{"author":[{"@pid":"149/1178","text":"Erfan Aghasian"},{"@pid":"04/883","text":"Saurabh Kumar Garg 0001"},{"@pid":"44/7500","text":"Longxiang Gao"},{"@pid":"90/3575-1","text":"Shui Yu 0001"},{"@pid":"00/1024","text":"James Montgomery 0001"}]},"title":"Scoring Users' Privacy Disclosure Across Multiple Online Social Networks.","venue":"IEEE Access","volume":"5","pages":"13118-13130","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AghasianGGYM17","doi":"10.1109/ACCESS.2017.2720187","ee":"https://doi.org/10.1109/ACCESS.2017.2720187","url":"https://dblp.org/rec/journals/access/AghasianGGYM17"}, "url":"URL#2741182" }, { "@score":"1", "@id":"2741183", "info":{"authors":{"author":[{"@pid":"202/0575","text":"Ayush Agrawal"},{"@pid":"183/7715","text":"Omar Harib"},{"@pid":"135/8367","text":"Ayonga Hereid"},{"@pid":"175/9435","text":"Sylvain Finet"},{"@pid":"202/0632","text":"Matthieu Masselin"},{"@pid":"70/1430","text":"Laurent Praly"},{"@pid":"39/1463","text":"Aaron D. Ames"},{"@pid":"20/3046","text":"Koushil Sreenath"},{"@pid":"63/2595","text":"Jessy W. Grizzle"}]},"title":"First Steps Towards Translating HZD Control of Bipedal Robots to Decentralized Control of Exoskeletons.","venue":"IEEE Access","volume":"5","pages":"9919-9934","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AgrawalHHFMPASG17","doi":"10.1109/ACCESS.2017.2690407","ee":"https://doi.org/10.1109/ACCESS.2017.2690407","url":"https://dblp.org/rec/journals/access/AgrawalHHFMPASG17"}, "url":"URL#2741183" }, { "@score":"1", "@id":"2741184", "info":{"authors":{"author":[{"@pid":"49/5815-3","text":"Riaz Ahmad 0003"},{"@pid":"17/954","text":"Muhammad Tanvir Afzal"},{"@pid":"76/4642","text":"Muhammad Abdul Qadir 0001"}]},"title":"Pattern Analysis of Citation-Anchors in Citing Documents for Accurate Identification of In-Text Citations.","venue":"IEEE Access","volume":"5","pages":"5819-5828","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AhmadAQ17","doi":"10.1109/ACCESS.2017.2689925","ee":"https://doi.org/10.1109/ACCESS.2017.2689925","url":"https://dblp.org/rec/journals/access/AhmadAQ17"}, "url":"URL#2741184" }, { "@score":"1", "@id":"2741185", "info":{"authors":{"author":[{"@pid":"121/0726","text":"Ishtiaq Ahmad"},{"@pid":"79/622","text":"Wan Chen"},{"@pid":"82/1422","text":"KyungHi Chang"}]},"title":"LTE-Railway User Priority-Based Cooperative Resource Allocation Schemes for Coexisting Public Safety and Railway Networks.","venue":"IEEE Access","volume":"5","pages":"7985-8000","year":"2017","type":"Journal Articles","access":"open","key":"journals/access/AhmadCC17","doi":"10.1109/ACCESS.2017.2698098","ee":"https://doi.org/10.1109/ACCESS.2017.2698098","url":"https://dblp.org/rec/journals/access/AhmadCC17"}, "url":"URL#2741185" } ] } } } )