{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:36:18Z","timestamp":1725701778053},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328077"},{"type":"electronic","value":"9783642328084"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_37","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T15:11:33Z","timestamp":1346771493000},"page":"408-411","source":"Crossref","is-referenced-by-count":0,"title":["Simulating Network Coding for Accelerating Tit-for-Tat in Peer-to-Peer Content Sharing"],"prefix":"10.1007","author":[{"given":"\u00c1kos","family":"Lud\u00e1nyi","sequence":"first","affiliation":[]},{"given":"Tam\u00e1s","family":"Lukovszki","sequence":"additional","affiliation":[]},{"given":"P\u00e9ter","family":"Ekler","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Locher, T., Schmid, S., Wattenhofer, R.: Rescuing Tit-for-Tat with Source Coding. In: Seventh IEEE International Conference on Peer-to-Peer Computing, P2P 2007, September 2-5, pp. 3\u201310 (2007), doi:10.1109\/P2P.2007.10","key":"37_CR1","DOI":"10.1109\/P2P.2007.10"},{"doi-asserted-by":"crossref","unstructured":"Balaton, A., Lukovszki, T., Agocs, A.: A new deterministic source coding method in peer-to-peer systems. In: 2011 IEEE 12th International Symposium on Computational Intelligence and Informatics (CINTI), November 21-22, pp. 403\u2013408 (2011)","key":"37_CR2","DOI":"10.1109\/CINTI.2011.6108539"},{"key":"37_CR3","volume-title":"The Theory of Error-Correcting Codes","author":"F.J. McWilliams","year":"1977","unstructured":"McWilliams, F.J., Sloane, N.J.A.: The Theory of Error-Correcting Codes. North-Holland, Amsterdam (1977)"},{"unstructured":"Chou, P.A., Wu, Y., Jain, K.: Practical Network Coding. Microsoft Research (2003)","key":"37_CR4"},{"issue":"5","key":"37_CR5","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R. Roetter","year":"2003","unstructured":"Roetter, R., Medard, M.: An algebraic approach to network coding. IEEE\/ACM Transactions on Networking\u00a011(5), 782\u2013795 (2003)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"2","key":"37_CR6","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"S.-Y.R. Li","year":"2003","unstructured":"Li, S.-Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Transactions on Information Theory\u00a049(2), 371\u2013381 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"doi-asserted-by":"crossref","unstructured":"Fitzek, F.H.P., Katz, M.D.: Cooperation in Wireless Networks: Principles and Applications. Springer (2006) ISBN 978-1-4020-4710-7","key":"37_CR7","DOI":"10.1007\/1-4020-4711-8"},{"unstructured":"PeerSim, http:\/\/peersim.sourceforge.net\/","key":"37_CR8"},{"doi-asserted-by":"crossref","unstructured":"Ekler, P., Lukovszki, T., Nurminen, J.K.: Extending mobile BitTorrent environment with network coding. In: 2011 IEEE Consumer Communications and Networking Conference (CCNC), January 9-12, pp. 529\u2013530 (2011)","key":"37_CR9","DOI":"10.1109\/CCNC.2011.5766532"},{"issue":"10","key":"37_CR10","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T. Ho","year":"2006","unstructured":"Ho, T., Medard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A Random Linear Network Coding Approach to Multicast. IEEE Transactions on Information Theory\u00a052(10), 4413\u20134430 (2006)","journal-title":"IEEE Transactions on Information Theory"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_37","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T07:00:42Z","timestamp":1562137242000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_37"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_37","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}