{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:23:54Z","timestamp":1742912634112,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642152900"},{"type":"electronic","value":"9783642152917"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15291-7_44","type":"book-chapter","created":{"date-parts":[[2010,8,30]],"date-time":"2010-08-30T15:56:39Z","timestamp":1283183799000},"page":"466-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Maximizing Growth Codes Utility in Large-Scale Wireless Sensor Networks"],"prefix":"10.1007","author":[{"given":"Yao","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiangyang","family":"Xue","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Acedanski, S., Deb, S., Medard, M., Koetter, R.: How good is random linear coding based distributed networked storage. In: NetCod (2005)","key":"44_CR1"},{"issue":"4","key":"44_CR2","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R. Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.: Network information flow. IEEE Transactions on Information Theory\u00a046(4), 1204\u20131216 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"44_CR3","first-page":"171","volume-title":"IPSN 2008: Proceedings of the 7th international conference on Information processing in sensor networks","author":"S.A. Aly","year":"2008","unstructured":"Aly, S.A., Kong, Z., Soljanin, E.: Fountain codes based distributed storage algorithms for large-scale wireless sensor networks. In: IPSN 2008: Proceedings of the 7th international conference on Information processing in sensor networks, pp. 171\u2013182. IEEE Computer Society, Washington (2008)"},{"key":"44_CR4","first-page":"303","volume-title":"HICSS 2003: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS 2003) - Track 9","author":"J. Cartigny","year":"2003","unstructured":"Cartigny, J., Simplot, D.: Border node retransmission based probabilistic broadcast protocols in ad-hoc networks. In: HICSS 2003: Proceedings of the 36th Annual Hawaii International Conference on System Sciences (HICSS 2003) - Track 9, p. 303. IEEE Computer Society, Washington (2003)"},{"issue":"6","key":"44_CR5","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.1109\/TIT.2006.874535","volume":"52","author":"A. Dimakis","year":"2006","unstructured":"Dimakis, A., Prabhakaran, V., Ramchandran, K.: Decentralized erasure codes for distributed networked storage. IEEE Transactions on Information Theory\u00a052(6), 2809\u20132816 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"key":"44_CR6","volume-title":"The theory of splines and their applcations","author":"J.H. Ahlberg","year":"1967","unstructured":"Ahlberg, J.H., Nilson, E.N., Walsh, J.L.: The theory of splines and their applcations. Academic Press, New York (1967)"},{"key":"44_CR7","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1145\/1159913.1159943","volume-title":"SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications","author":"A. Kamra","year":"2006","unstructured":"Kamra, A., Misra, V., Feldman, J., Rubenstein, D.: Growth codes: maximizing sensor network data persistence. In: SIGCOMM 2006: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, pp. 255\u2013266. ACM, New York (2006)"},{"doi-asserted-by":"crossref","unstructured":"Lin, Y., Liang, B., Li, B.: Data persistence in large-scale sensor networks with decentralized fountain codes. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 1658\u20131666. IEEE, Los Alamitos (May 2007)","key":"44_CR8","DOI":"10.1109\/INFCOM.2007.194"},{"key":"44_CR9","first-page":"244","volume-title":"IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks","author":"J. Liu","year":"2007","unstructured":"Liu, J., Liu, Z., Towsley, D., Xia, C.H.: Maximizing the data utility of a data archiving & querying system through joint coding and scheduling. In: IPSN 2007: Proceedings of the 6th international conference on Information processing in sensor networks, pp. 244\u2013253. ACM, New York (2007)"},{"key":"44_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-540-77690-1_10","volume-title":"Wireless Sensor Networks","author":"D. Munaretto","year":"2008","unstructured":"Munaretto, D., Widmer, J., Rossi, M., Zorzi, M.: Resilient coding algorithms for sensor network data persistence. In: Verdone, R. (ed.) EWSN 2008. LNCS, vol.\u00a04913, pp. 156\u2013170. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Euro-Par 2010 - Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15291-7_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T14:31:00Z","timestamp":1589898660000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15291-7_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642152900","9783642152917"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15291-7_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}