{"id":"https://openalex.org/W4285047824","doi":"https://doi.org/10.1109/iccworkshops53468.2022.9814631","title":"Achieving Two-Level Age by Free-Ride Coding in Preemptive Mission-Critical Networks","display_name":"Achieving Two-Level Age by Free-Ride Coding in Preemptive Mission-Critical Networks","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4285047824","doi":"https://doi.org/10.1109/iccworkshops53468.2022.9814631"},"language":"en","primary_location":{"id":"doi:10.1109/iccworkshops53468.2022.9814631","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops53468.2022.9814631","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5086876197","display_name":"Mangang Xie","orcid":"https://orcid.org/0000-0001-6523-1043"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Mangang Xie","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018643965","display_name":"Jie Gong","orcid":"https://orcid.org/0000-0002-9670-6336"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Gong","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5036629344","display_name":"Qianfan Wang","orcid":"https://orcid.org/0000-0002-9913-3043"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianfan Wang","raw_affiliation_strings":["School of Electronics and Communications Engineering, Sun Yat-sen University,Guangzhou,China,510006","Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Electronics and Communications Engineering, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5057620799","display_name":"Xiao Ma","orcid":"https://orcid.org/0000-0001-6617-1978"},"institutions":[{"id":"https://openalex.org/I157773358","display_name":"Sun Yat-sen University","ror":"https://ror.org/0064kty71","country_code":"CN","type":"education","lineage":["https://openalex.org/I157773358"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiao Ma","raw_affiliation_strings":["School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Sun Yat-sen University,Guangzhou,China,510006","institution_ids":["https://openalex.org/I157773358"]},{"raw_affiliation_string":"Guangdong Key Laboratory of Information Security Technology, Sun Yat-sen University, Guangzhou, China","institution_ids":["https://openalex.org/I157773358"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5086876197"],"corresponding_institution_ids":["https://openalex.org/I157773358"],"apc_list":null,"apc_paid":null,"fwci":0.4325,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.45084133,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13553","display_name":"Age of Information Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12079","display_name":"IoT Networks and Protocols","score":0.9887999892234802,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10300","display_name":"Congenital Heart Disease Studies","score":0.9679999947547913,"subfield":{"id":"https://openalex.org/subfields/2713","display_name":"Epidemiology"},"field":{"id":"https://openalex.org/fields/27","display_name":"Medicine"},"domain":{"id":"https://openalex.org/domains/4","display_name":"Health Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.8275973796844482},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6818775534629822},{"id":"https://openalex.org/keywords/coding","display_name":"Coding (social sciences)","score":0.6007506847381592},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5052085518836975},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.4549732208251953},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32411548495292664},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.19291844964027405},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1674153208732605},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.13927993178367615}],"concepts":[{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.8275973796844482},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6818775534629822},{"id":"https://openalex.org/C179518139","wikidata":"https://www.wikidata.org/wiki/Q5140297","display_name":"Coding (social sciences)","level":2,"score":0.6007506847381592},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5052085518836975},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.4549732208251953},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32411548495292664},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.19291844964027405},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1674153208732605},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.13927993178367615},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iccworkshops53468.2022.9814631","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iccworkshops53468.2022.9814631","pdf_url":null,"source":{"id":"https://openalex.org/S4363608034","display_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE International Conference on Communications Workshops (ICC Workshops)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1993918491","https://openalex.org/W2069689609","https://openalex.org/W2106864314","https://openalex.org/W2768771208","https://openalex.org/W2996238281","https://openalex.org/W3019935896","https://openalex.org/W3037154440","https://openalex.org/W3081808596","https://openalex.org/W3135424908","https://openalex.org/W3152620862","https://openalex.org/W3177175347","https://openalex.org/W3184052143","https://openalex.org/W3188554269","https://openalex.org/W3192880923","https://openalex.org/W3197044794","https://openalex.org/W3209686944","https://openalex.org/W4297905184","https://openalex.org/W6797554170"],"related_works":["https://openalex.org/W1535080110","https://openalex.org/W306312984","https://openalex.org/W857189463","https://openalex.org/W2979675132","https://openalex.org/W2790520092","https://openalex.org/W4306309337","https://openalex.org/W20648474","https://openalex.org/W2109516765","https://openalex.org/W4288094128","https://openalex.org/W4313563004"],"abstract_inverted_index":{"Age":[0],"of":[1,8,11,16,27,46,96,115,151,161,174],"information":[2],"(AoI),":[3],"which":[4,55,165],"characterizes":[5],"the":[6,24,28,33,56,64,81,93,105,112,136,147,159,162,179],"freshness":[7],"information,":[9],"is":[10,52,60],"significance":[12],"to":[13,169],"real-time":[14],"Internet":[15],"Things":[17],"(IoT)":[18],"applications.":[19],"This":[20],"paper":[21],"focuses":[22],"on":[23],"timely":[25],"transmission":[26],"payload":[29,69,117,163,181],"as":[30,32],"well":[31],"extra":[34,58,74,78,119,152,176],"data":[35,47,59,153],"in":[36,54,130],"mission-critical":[37],"networks,":[38],"e.g.,":[39],"vehicular":[40],"networks.":[41],"To":[42],"transmit":[43,75],"both":[44,116],"kinds":[45],"simultaneously,":[48],"a":[49,171],"free-ride":[50,125,142],"code":[51,126,143],"applied,":[53],"encoded":[57],"transmitted":[61],"along":[62],"with":[63,85,135],"low-density":[65],"parity-check":[66],"(LDPC)":[67],"coded":[68],"by":[70,101],"superposition,":[71],"consuming":[72],"neither":[73],"power":[76],"nor":[77],"bandwidth.":[79],"Under":[80],"preemptive":[82],"status":[83,106,131],"update":[84,107,132],"truncated":[86],"automatic":[87],"repeat":[88],"request":[89],"(ARQ),":[90],"we":[91],"derive":[92],"closed-form":[94],"expression":[95],"average":[97,113,149],"peak":[98],"AoI":[99],"(PAoI)":[100],"taking":[102],"into":[103],"account":[104],"generation":[108],"time,":[109],"and":[110,118],"evaluate":[111],"PAoI":[114,129,150],"data.":[120,182],"Numerical":[121],"simulations":[122],"show":[123,140],"that":[124,141],"achieves":[127],"two-level":[128],"systems.":[133],"Comparisons":[134],"traditional":[137],"coding":[138],"scheme":[139],"not":[144,157],"only":[145],"attains":[146],"smaller":[148],"but":[154],"also":[155],"does":[156],"impair":[158],"performance":[160],"data,":[164],"can":[166],"be":[167],"used":[168],"piggyback":[170],"small":[172],"amount":[173],"important":[175],"bits":[177],"over":[178],"existing":[180]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
