{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:19:23Z","timestamp":1742966363008,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662469804"},{"type":"electronic","value":"9783662469811"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46981-1_41","type":"book-chapter","created":{"date-parts":[[2015,5,15]],"date-time":"2015-05-15T04:58:52Z","timestamp":1431665932000},"page":"423-434","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptive Payload Length Algorithm for Video Transmission Over Wireless Multi-hop Networks"],"prefix":"10.1007","author":[{"given":"Pengrui","family":"Duan","sequence":"first","affiliation":[]},{"given":"Huadong","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Le","family":"Qian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,16]]},"reference":[{"key":"41_CR1","unstructured":"Luby, M.: LT Codes. In: Proceeding 43rd Annual IEEE Symposium Foundations of Computer Science, Vancover, pp. 271\u2013280 (2002)"},{"key":"41_CR2","doi-asserted-by":"crossref","unstructured":"Palma, V., Mammi, E., Vegni, A.M., Neri, A.: A fountain codes-based data dissemination technique in vehicular Ad-hoc networks. ITS Telecommunications, pp. 750\u2013755 (2011)","DOI":"10.1109\/ITST.2011.6060154"},{"key":"41_CR3","doi-asserted-by":"crossref","unstructured":"Chen, H., Maunder, R., Hanzo, L.: Fountain-code aided file transfer in 802.11 WLANs. In: Vehicular Technology Conference, pp. 1\u20135 (2009)","DOI":"10.1109\/VETECF.2009.5379109"},{"issue":"5","key":"41_CR4","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1109\/MCOM.2012.6194403","volume":"50","author":"A Cattaneo","year":"2012","unstructured":"Cattaneo, A., Sentinelli, A., Vitali, A., Celetto, L., Marfia, G., Roccetti, M., Gerla, M.: Using digital fountains in future IPTV streaming platforms: a future perspective. Commun. Mag. 50(5), 202\u2013207 (2012)","journal-title":"Commun. Mag."},{"key":"41_CR5","doi-asserted-by":"crossref","unstructured":"Wang, X.J., Chen, W., Cao, Z.G.: Throughput-efficient rateless coding with packet length optimization for practical wireless communication systems. In: Global Telecommunications Conference, pp. 1\u20135 (2010)","DOI":"10.1109\/GLOCOM.2010.5684359"},{"key":"41_CR6","doi-asserted-by":"crossref","unstructured":"Bodine, E.A., Cheng, M.K.: Characterization of Luby Transform Codes with Small Message Size for Low-Latency Decoding. Communications ICC, pp. 1195 \u2013 1199 (2008)","DOI":"10.1109\/ICC.2008.233"},{"issue":"5","key":"41_CR7","first-page":"84","volume":"27","author":"Y Xi","year":"2006","unstructured":"Xi, Y., Wei, J.B., Zhuang, Z.W.: Analysis of optimum frame length in IEEE 802.11 DCF under error-prone channel and the channel adaptive strategy. J. Commun. 27(5), 84\u201394 (2006)","journal-title":"J. Commun."},{"key":"41_CR8","doi-asserted-by":"crossref","unstructured":"Choudhury, S., Sheriff, I., Gibson, J.D., Belding-Royer, E.: Effect of payload length variation and retransmissions on multimedia in 802.11a WLANs. International Conference on Wireless communications and mobile computing, pp. 377\u2013382 (2006)","DOI":"10.1145\/1143549.1143625"},{"issue":"6","key":"41_CR9","first-page":"101","volume":"32","author":"F Zhu","year":"2011","unstructured":"Zhu, F., Wu, L.S., Gu, Y.T.: Optimal payload lengths of reliable multicast schemes. J. Commun. 32(6), 101\u2013106 (2011)","journal-title":"J. Commun."},{"key":"41_CR10","doi-asserted-by":"crossref","unstructured":"MacKay, D.J.C.: Fountain codes. In: Communications, IEE Proceedings, pp. 1062\u20131068 (2005)","DOI":"10.1049\/ip-com:20050237"},{"issue":"1","key":"41_CR11","first-page":"6","volume":"27","author":"HP Zhu","year":"2009","unstructured":"Zhu, H.P., Zhang, G.X., Xie, Z.D.: Suboptimal degree distribution algorithm of LT codes of digital fountain. J. Appl. Sci. 27(1), 6\u201311 (2009)","journal-title":"J. Appl. Sci."},{"key":"41_CR12","unstructured":"IEEE Computer Society.: Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2007)"}],"container-title":["Communications in Computer and Information Science","Advances in Wireless Sensor Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46981-1_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,21]],"date-time":"2023-02-21T03:35:52Z","timestamp":1676950552000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-46981-1_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662469804","9783662469811"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46981-1_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"16 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}