{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:27:07Z","timestamp":1726003627204},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030058876"},{"type":"electronic","value":"9783030058883"}],"license":[{"start":{"date-parts":[[2018,12,19]],"date-time":"2018-12-19T00:00:00Z","timestamp":1545177600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05888-3_25","type":"book-chapter","created":{"date-parts":[[2018,12,18]],"date-time":"2018-12-18T18:38:33Z","timestamp":1545158313000},"page":"272-281","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Repairable Fountain Codes with Unequal Repairing Locality in D2D Storage System"],"prefix":"10.1007","author":[{"given":"Yue","family":"Li","sequence":"first","affiliation":[]},{"given":"Shushi","family":"Gu","sequence":"additional","affiliation":[]},{"given":"Ye","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Juan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qinyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,19]]},"reference":[{"key":"25_CR1","doi-asserted-by":"publisher","first-page":"1971","DOI":"10.1109\/ACCESS.2016.2546685","volume":"4","author":"L Wang","year":"2017","unstructured":"Wang, L., Wu, H., Han, Z.: Wireless distributed storage in socially enabled D2D communications. IEEE Access 4, 1971\u20131984 (2017)","journal-title":"IEEE Access"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"P\u00e4\u00e4kk\u00f6nen, J., Hollanti, C., Tirkkonen, O.: Device-to-device data storage for mobile cellular systems, pp. 671\u2013676 (2013)","DOI":"10.1109\/GLOCOMW.2013.6825065"},{"key":"25_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-23440-3_5","volume-title":"Multiple Access Communications","author":"J P\u00e4\u00e4kk\u00f6nen","year":"2015","unstructured":"P\u00e4\u00e4kk\u00f6nen, J., Hollanti, C., Tirkkonen, O.: Device-to-device data storage with regenerating codes. In: Jonsson, M., Vinel, A., Bellalta, B., Tirkkonen, O. (eds.) MACOM 2015. LNCS, vol. 9305, pp. 57\u201369. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23440-3_5"},{"issue":"11","key":"25_CR4","doi-asserted-by":"publisher","first-page":"4862","DOI":"10.1109\/TCOMM.2016.2605681","volume":"64","author":"J Pedersen","year":"2016","unstructured":"Pedersen, J., Amat, A.G.I., Andriyanova, I., Br\u00e4nnstr\u00f6m, F.: Distributed storage in mobile wireless networks with device-to-device communication. IEEE Trans. Commun. 64(11), 4862\u20134878 (2016)","journal-title":"IEEE Trans. Commun."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Pedersen, J., Amat, A.G.I., Andriyanova, I., Br\u00e4nnstr\u00f6m, F.: Optimizing MDS coded caching in wireless networks with device-to-device communication (2018)","DOI":"10.1109\/TWC.2018.2879358"},{"issue":"5","key":"25_CR6","doi-asserted-by":"publisher","first-page":"1037","DOI":"10.1109\/JSAC.2014.140522","volume":"32","author":"M Asteris","year":"2014","unstructured":"Asteris, M., Dimakis, A.G.: Repairable fountain codes. IEEE J. Sel. Areas Commun. 32(5), 1037\u20131047 (2014)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"8","key":"25_CR7","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.1109\/TMM.2013.2280561","volume":"15","author":"Z Luo","year":"2013","unstructured":"Luo, Z., Song, L., Zheng, S., Ling, N.: Raptor codes based unequal protection for compressed video according to packet priority. IEEE Trans. Multimedia 15(8), 2208\u20132213 (2013)","journal-title":"IEEE Trans. Multimedia"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Chen, Z., Xu, M., Yin, L., Lu, L.: Unequal error protected jpeg 2000 broadcast scheme with progressive fountain codes, pp. 1\u20135 (2012)","DOI":"10.1109\/WCSP.2011.6096843"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Hu, Y., et al.: Unequal failure protection coding technique for distributed cloud storage systems. IEEE Trans. Cloud Comput. PP(99), 1 (2017)","DOI":"10.1109\/TCC.2017.2785396"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1016\/B978-0-12-386981-4.50011-4","volume-title":"Probability and Random Processes","author":"Scott L. Miller","year":"2012","unstructured":"Miller, S., Childers, D.: Probability and Random Processes, 2nd edn (2012)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Ad Hoc Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05888-3_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,12]],"date-time":"2019-11-12T17:16:51Z","timestamp":1573579011000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05888-3_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,19]]},"ISBN":["9783030058876","9783030058883"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05888-3_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018,12,19]]},"assertion":[{"value":"ADHOCNETS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Ad Hoc Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cairns, QLD","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"adhocnets2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/adhocnets.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}