{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:25:57Z","timestamp":1761398757709,"version":"build-2065373602"},"reference-count":30,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T00:00:00Z","timestamp":1697846400000},"content-version":"am","delay-in-days":324,"URL":"http:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,12,1]],"date-time":"2022-12-01T00:00:00Z","timestamp":1669852800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Computer Networks"],"published-print":{"date-parts":[[2022,12]]},"DOI":"10.1016\/j.comnet.2022.109425","type":"journal-article","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T01:42:44Z","timestamp":1666316564000},"page":"109425","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework"],"prefix":"10.1016","volume":"219","author":[{"given":"Zhao","family":"Li","sequence":"first","affiliation":[]},{"given":"Bigui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chengyu","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhixian","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Kang G.","family":"Shin","sequence":"additional","affiliation":[]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.comnet.2022.109425_b1","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/COMST.2017.2766698","article-title":"Modulation and multiple access for 5G networks","volume":"20","author":"Cai","year":"2018","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"3","key":"10.1016\/j.comnet.2022.109425_b2","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","article-title":"Next generation 5G wireless networks: A comprehensive survey","volume":"18","author":"Agiwal","year":"2016","journal-title":"IEEE Commun. Surveys Tuts."},{"key":"10.1016\/j.comnet.2022.109425_b3","doi-asserted-by":"crossref","unstructured":"D. Zucchetto, A. Zanella, Multi-Rate ALOHA Protocols for Machine-Type Communication, in: Proc. IEEE Intl. Conf. on Computing Networking and Commun, ICNC, 2018, pp. 524\u2013530.","DOI":"10.1109\/ICCNC.2018.8390378"},{"issue":"2","key":"10.1016\/j.comnet.2022.109425_b4","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TNET.2011.2174461","article-title":"CSMA\/CN: Carrier sense multiple access with collision notification","volume":"20","author":"Sen","year":"2012","journal-title":"IEEE Trans. Netw."},{"key":"10.1016\/j.comnet.2022.109425_b5","doi-asserted-by":"crossref","unstructured":"A. Aijaz, A. Hamid\u00a0Aghvami, On the Use and Optimization of PRMA Based Cognitive M2M Communications, in: Proc. IEEE Global Telecommun. Conf, GLOBECOM, 2013, pp. 1265\u20131271.","DOI":"10.1109\/GLOCOM.2013.6831248"},{"issue":"5","key":"10.1016\/j.comnet.2022.109425_b6","doi-asserted-by":"crossref","first-page":"3156","DOI":"10.1109\/TWC.2020.2970910","article-title":"Exploiting time asynchrony in multi-user transmit beamforming","volume":"19","author":"Ganji","year":"2020","journal-title":"IEEE Trans. Wireless Commun."},{"year":"2013","series-title":"802.11ac: A Survial Guide","author":"Gast","key":"10.1016\/j.comnet.2022.109425_b7"},{"year":"2010","series-title":"Further Advancements for E-UTRA, Physical Layer Aspects; Coordinated Multiple Point Transmission and Reception, document 3GPP TR 36.815","key":"10.1016\/j.comnet.2022.109425_b8"},{"key":"10.1016\/j.comnet.2022.109425_b9","doi-asserted-by":"crossref","unstructured":"R. Liu, Z. Li, L. Xiao, Proactive CCI Evaluation and Transmission Gain Based Scheduling for MU-MIMO Broadcast Channel, in: Proc. IEEE Intl. Conf. on Wireless Commun. & Signal Processing, WCSP, 2013, pp. 1\u20136.","DOI":"10.1109\/WCSP.2013.6677188"},{"key":"10.1016\/j.comnet.2022.109425_b10","doi-asserted-by":"crossref","unstructured":"A. Benjebbour, Y. Saito, et al., Concept and Practical Considerations of Non-Orthogonal Multiple Access (NOMA) for Future Radio Access, in: Proc. Intl. Symp. Intell. Signal Proc. Commun. Syst, ISPACS, 2013, pp. 770\u2013774.","DOI":"10.1109\/ISPACS.2013.6704653"},{"key":"10.1016\/j.comnet.2022.109425_b11","doi-asserted-by":"crossref","unstructured":"H. Nikopour, H. Baligh, Sparse Code Multiple Access, in: Proc. IEEE Intl. Symp. Personal Indoor Mobile Radio Commun, PIMRC, 2013, pp. 332\u2013336.","DOI":"10.1109\/PIMRC.2013.6666156"},{"issue":"4","key":"10.1016\/j.comnet.2022.109425_b12","doi-asserted-by":"crossref","first-page":"3185","DOI":"10.1109\/TVT.2016.2596438","article-title":"Pattern division multiple access \u2014 A novel nonorthogonal multiple access for fifth-generation radio networks","volume":"66","author":"Chen","year":"2017","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"10","key":"10.1016\/j.comnet.2022.109425_b13","doi-asserted-by":"crossref","first-page":"2181","DOI":"10.1109\/JSAC.2017.2725519","article-title":"A survey on Non-Orthogonal Multiple Access for 5G networks: Research challenges and future trends","volume":"35","author":"Ding","year":"2017","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"10.1016\/j.comnet.2022.109425_b14","doi-asserted-by":"crossref","unstructured":"C. Pan, J. Geng, et al., Linear Detection and Precoding for Physical Network Coding in Two-Way MIMO Relay Channels, in: Proc. IEEE Veh. Technol. Conf, VTC Fall, 2011, pp. 1\u20134.","DOI":"10.1109\/VETECF.2011.6092827"},{"year":"2005","series-title":"Fundamentals of Wireless Communication, Cambridge, U.K","author":"Tse","key":"10.1016\/j.comnet.2022.109425_b15"},{"issue":"2","key":"10.1016\/j.comnet.2022.109425_b16","doi-asserted-by":"crossref","first-page":"1534","DOI":"10.1109\/TVT.2018.2888480","article-title":"Millimeter wave SDMA with limited feedback: RF-only beamforming can outperform hybrid beamforming","volume":"68","author":"Kwon","year":"2019","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"9","key":"10.1016\/j.comnet.2022.109425_b17","doi-asserted-by":"crossref","first-page":"4771","DOI":"10.1109\/TSP.2010.2050480","article-title":"On feasibility of interference alignment in MIMO interference networks","volume":"58","author":"Yetis","year":"2010","journal-title":"IEEE Trans. Signal Process."},{"issue":"6","key":"10.1016\/j.comnet.2022.109425_b18","doi-asserted-by":"crossref","first-page":"10458","DOI":"10.1109\/JIOT.2019.2939255","article-title":"Interference steering to manage interference in IoT","volume":"6","author":"Li","year":"2019","journal-title":"IEEE Internet Things J."},{"key":"10.1016\/j.comnet.2022.109425_b19","doi-asserted-by":"crossref","unstructured":"Y. Saito, A. Benjebbour, et al., System-Level Performance Evaluation of Downlink Non-Orthogonal Multiple Access (NOMA), in: Proc. IEEE Intl. Symp. Personal Indoor Mobile Radio Commun, PIMRC, 2013, pp. 611\u2013615.","DOI":"10.1109\/PIMRC.2013.6666209"},{"issue":"9","key":"10.1016\/j.comnet.2022.109425_b20","doi-asserted-by":"crossref","first-page":"6360","DOI":"10.1109\/TCOMM.2019.2919547","article-title":"Dynamic Non-Orthogonal Multiple Access and orthogonal multiple access in 5G wireless networks","volume":"67","author":"Baghani","year":"2019","journal-title":"IEEE Trans. Commun."},{"issue":"12","key":"10.1016\/j.comnet.2022.109425_b21","doi-asserted-by":"crossref","first-page":"10160","DOI":"10.1109\/JIOT.2021.3050990","article-title":"Sum rate and reliability analysis for power-domain nonorthogonal multiple access (PD-NOMA)","volume":"8","author":"Park","year":"2021","journal-title":"IEEE Internet Things J."},{"issue":"2","key":"10.1016\/j.comnet.2022.109425_b22","doi-asserted-by":"crossref","first-page":"968","DOI":"10.1109\/TWC.2013.010214.130724","article-title":"Block-diagonalization precoding in a multiuser multicell MIMO system: Competition and coordination","volume":"13","author":"Nguyen","year":"2014","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"1","key":"10.1016\/j.comnet.2022.109425_b23","doi-asserted-by":"crossref","first-page":"239","DOI":"10.1109\/COMST.2016.2618870","article-title":"An overview on resource allocation techniques for multi-user MIMO systems","volume":"19","author":"Casta\u00f1eda","year":"2017","journal-title":"IEEE Commun. Surv. Tut."},{"year":"2017","series-title":"Matrix Analysis and Applications","author":"Zhang","key":"10.1016\/j.comnet.2022.109425_b24"},{"issue":"4","key":"10.1016\/j.comnet.2022.109425_b25","doi-asserted-by":"crossref","first-page":"3109","DOI":"10.1109\/COMST.2019.2935810","article-title":"Massive MIMO detection techniques: A survey","volume":"21","author":"Albreem","year":"2019","journal-title":"IEEE Commun. Surveys Tuts."},{"issue":"4","key":"10.1016\/j.comnet.2022.109425_b26","doi-asserted-by":"crossref","first-page":"1250","DOI":"10.1109\/TWC.2004.830826","article-title":"Convergence of proportional-fair sharing algorithms under general conditions","volume":"3","author":"Kushner","year":"2004","journal-title":"IEEE Trans. Wireless Commun."},{"key":"10.1016\/j.comnet.2022.109425_b27","doi-asserted-by":"crossref","first-page":"1326","DOI":"10.1109\/TWC.2010.04.080749","article-title":"Optimal energy management policies for energy harvesting sensor nodes","volume":"9","author":"Sharma","year":"2008","journal-title":"IEEE Trans. Wireless Commun."},{"issue":"8","key":"10.1016\/j.comnet.2022.109425_b28","doi-asserted-by":"crossref","first-page":"1732","DOI":"10.1109\/JSAC.2011.110921","article-title":"Transmission with energy harvesting nodes in fading wireless channels: Optimal policies","volume":"29","author":"Ozel","year":"2011","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"7","key":"10.1016\/j.comnet.2022.109425_b29","doi-asserted-by":"crossref","first-page":"3347","DOI":"10.1109\/TWC.2019.2908159","article-title":"Coordinated multi-point transmissions based on interference alignment and neutralization","volume":"18","author":"Li","year":"2019","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"10.1016\/j.comnet.2022.109425_b30","doi-asserted-by":"crossref","unstructured":"J.H. Lee, W. Choi, Interference Alignment by Opportunistic User Selection in 3-User MIMO Interference Channels, in: Proc. IEEE Intl. Conf. Commun, ICC, 2011, pp. 1\u20135.","DOI":"10.1109\/icc.2011.5962830"}],"container-title":["Computer Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622004595?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1389128622004595?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T13:23:37Z","timestamp":1761398617000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1389128622004595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12]]},"references-count":30,"alternative-id":["S1389128622004595"],"URL":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109425","relation":{},"ISSN":["1389-1286"],"issn-type":[{"type":"print","value":"1389-1286"}],"subject":[],"published":{"date-parts":[[2022,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Framed Fidelity MAC: Losslessly packing multi-user transmissions in a virtual point-to-point framework","name":"articletitle","label":"Article Title"},{"value":"Computer Networks","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.comnet.2022.109425","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"109425"}}