{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T04:26:40Z","timestamp":1742012800172,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":9,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642271915"},{"type":"electronic","value":"9783642271922"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-27192-2_27","type":"book-chapter","created":{"date-parts":[[2011,12,2]],"date-time":"2011-12-02T21:46:13Z","timestamp":1322862373000},"page":"227-235","source":"Crossref","is-referenced-by-count":2,"title":["The Performance Analysis of LT Codes"],"prefix":"10.1007","author":[{"given":"Ling","family":"Yang","sequence":"first","affiliation":[]},{"given":"ShiLi","family":"Song","sequence":"additional","affiliation":[]},{"given":"Wei Wei","family":"Su","sequence":"additional","affiliation":[]},{"given":"Yi Fan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"Mackay, D.J.C.: Fountain codes. In: IEEE Workshop on Discrete Event Systems, pp. 26\u201328 (1998)"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Luby, M.: LT Codes. In: Proceedings of the ACM Symposium on Foundations of Computer Science (FOCS), vol.\u00a01, pp. 6\u20137 (2002)","DOI":"10.1109\/SFCS.2002.1181950"},{"issue":"6","key":"27_CR3","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A. Shokrollahi","year":"2006","unstructured":"Shokrollahi, A.: Raptor Codes. IEEE Transactions on Information Theory\u00a052(6), 2551\u20132555 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Finamore, W.A., Ramos, M.C.: Improving the Performance of LT Codes. In: 7th International Symposium on Wireless Communication Systems (ISWCS), pp. 566\u2013570 (2010)","DOI":"10.1109\/ISWCS.2010.5624533"},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Zhu, H., Zhang, C., Lu, J.: Designing of Fountain Codes with Short Code-Length. In: Proceedings of 3rd International Workshop on Signal Design and Its Applications in Communications (IWSDA), pp. 65\u201368 (2007)","DOI":"10.1109\/IWSDA.2007.4408410"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, F., Xu, L., Pan, X.: Comparison of BP and Gauss code base on Fountain Code Measuring. In: Third International Conference on Measuring Technology and Mechatronics Automation (ICMTMA), vol.\u00a01, pp. 737\u2013740 (2011)","DOI":"10.1109\/ICMTMA.2011.186"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Chen, C.-M., Shen, T.-C., Zao, J.K.: Optimizing Degree Distributions in LT Codes by Using The Multiobjective Evolutionary Algorithm Based on Decomposition. In: IEEE Congresson on Evolutionary Computation (CEC), pp. 1\u20138 (2010)","DOI":"10.1109\/CEC.2010.5586340"},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1109\/CISP.2008.59","volume":"2","author":"W. Yao","year":"2008","unstructured":"Yao, W., Chen, L., Li, H., Xu, H.: Research on Fountain Codes in Deep Space Communication. Congress on Image and Signal Processing\u00a02, 219\u2013224 (2008)","journal-title":"Congress on Image and Signal Processing"},{"key":"27_CR9","doi-asserted-by":"crossref","unstructured":"Li, L., Zhao, J.: LT Codes with a New Degree Distribution. In: International Conference on Multimedia Information Networking and Security (MINES), pp. 531\u2013535 (2010)","DOI":"10.1109\/MINES.2010.118"}],"container-title":["Communications in Computer and Information Science","Communication and Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27192-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,14]],"date-time":"2025-03-14T19:24:22Z","timestamp":1741980262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27192-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642271915","9783642271922"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27192-2_27","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}