{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:07:10Z","timestamp":1725746830826},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642405518"},{"type":"electronic","value":"9783642405525"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40552-5_15","type":"book-chapter","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T05:21:28Z","timestamp":1377667288000},"page":"161-172","source":"Crossref","is-referenced-by-count":3,"title":["Balanced XOR-ed Coding"],"prefix":"10.1007","author":[{"given":"Katina","family":"Kralevska","sequence":"first","affiliation":[]},{"given":"Danilo","family":"Gligoroski","sequence":"additional","affiliation":[]},{"given":"Harald","family":"\u00d8verby","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R. Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.Y.R., Yeung, R.W.: Network information flow. IEEE Transactions on Information Theory\u00a046, 1204\u20131216 (2000)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR2","unstructured":"Bhattad, K., Narayanan, K.R.: Weakly secure network coding. In: Proc. First Workshop on Network Coding, Theory, and Applications, NetCod (2005)"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J., Dinitz, J.H.: Handbook of Combinatorial Designs. Chapman, Hall\/CRC (2006)","DOI":"10.1201\/9781420010541"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Colbourn, C.J., Dinitz, J.H., Stinson, D.R.: Applications of combinatorial designs to communications, cryptography, and networking (1999)","DOI":"10.1201\/9781439832905.ch12"},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1112\/jlms\/s1-10.37.26","volume":"37","author":"P. Hall","year":"1935","unstructured":"Hall, P.: On representatives of subsets. J. London Math. Soc.\u00a037, 26\u201330 (1935)","journal-title":"J. London Math. Soc."},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T. Ho","year":"2006","unstructured":"Ho, T., M\u00e9dard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A random linear network coding approach to multicast. IEEE Transactions on Information Theory\u00a052, 4413\u20134430 (2006)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR7","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1002\/(SICI)1520-6610(1996)4:6<405::AID-JCD3>3.0.CO;2-J","volume":"6","author":"M.T. Jacobson","year":"1996","unstructured":"Jacobson, M.T., Matthews, P.: Generating uniformly distributed random latin squares. Journal of Combinatorial Designs\u00a06, 405\u2013437 (1996)","journal-title":"Journal of Combinatorial Designs"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Jaggi, S., Cassuto, Y., Effros, M.: Low complexity encoding for network codes. In: IEEE International Symposium on Information Theory, pp. 40\u201344 (2006)","DOI":"10.1109\/ISIT.2006.261594"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1109\/TNET.2008.923722","volume":"3","author":"S. Katti","year":"2008","unstructured":"Katti, S., Rahul, H., Hu, W., Katabi, D., M\u00e9dard, M., Crowcroft, J.: XORs in the air: Practical wireless network coding. IEEE\/ACM Trans. Netw.\u00a03, 497\u2013510 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"15_CR10","doi-asserted-by":"publisher","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"5","author":"R. Koetter","year":"2003","unstructured":"Koetter, R., M\u00e9dard, M.: An algebraic approach to network coding. IEEE\/ACM Trans. Netw.\u00a05, 782\u2013795 (2003)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"15_CR11","unstructured":"Lawler, E.: Combinatorial Optimization: Networks and Matroids. Dover Publications (2001)"},{"key":"15_CR12","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"2","author":"S.Y.R. Li","year":"2003","unstructured":"Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Transactions on Information Theory\u00a02, 371\u2013381 (2003)","journal-title":"IEEE Transactions on Information Theory"},{"key":"15_CR13","unstructured":"M\u00e9dard, M., Sprintson, A.: Network coding. Fundamentals and Applications. Academic Press (2012)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Pedersen, M.V., Fitzek, F.H.P., Larsen, T.: Implementation and performance evaluation of network coding for cooperative mobile devices. In: IEEE Cognitive and Cooperative Wireless Networks Workshop (2008)","DOI":"10.1109\/ICCW.2008.22"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Qureshi, J., Foh, C.H., Cai, J.: Optimal solution for the index coding problem using network coding over gf(2). In: IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 209\u2013217 (2012)","DOI":"10.1109\/SECON.2012.6275780"},{"key":"15_CR16","unstructured":"Riis, S.: Linear versus nonlinear boolean functions in network flow. In: CISS (2004)"},{"key":"15_CR17","unstructured":"Rouayheb, S.Y.E., Sprintson, A., Georghiades, C.N.: On the index coding problem and its relation to network coding and matroid theory. Submitted to IEEE Transactions on Information Theory (2008)"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Shojania, H., Li, B.: Random network coding on the iphone: fact or fiction? In: NOSSDAV (2009)","DOI":"10.1145\/1542245.1542255"},{"key":"15_CR19","unstructured":"Stinson, D.R.: Combinatorial Designs: Constructions and Analysis. Springer (2003)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Vingelmann, P., Pedersen, M.V., Fitzek, F.H.P., Heide, J.: Multimedia distribution using network coding on the iphone platform. In: Proceedings of the 2010 ACM Multimedia Workshop on Mobile Cloud Media Computing (2010)","DOI":"10.1145\/1877953.1877957"}],"container-title":["Lecture Notes in Computer Science","Advances in Communication Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40552-5_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T06:03:00Z","timestamp":1563775380000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40552-5_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642405518","9783642405525"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40552-5_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}