{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T01:15:52Z","timestamp":1745370952093,"version":"3.37.3"},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T00:00:00Z","timestamp":1667520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mobile Netw Appl"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1007\/s11036-022-02043-0","type":"journal-article","created":{"date-parts":[[2022,11,4]],"date-time":"2022-11-04T17:04:06Z","timestamp":1667581446000},"page":"168-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Performance Improvement of K\u00f6tter and Kschischang Codes and Lifted Rank Metric Codes in Random Linear Network Coding"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5111-7087","authenticated-orcid":false,"given":"Aicha","family":"Guefrachi","sequence":"first","affiliation":[]},{"given":"Sarra","family":"Nighaoui","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Zaibi","sequence":"additional","affiliation":[]},{"given":"Ammar","family":"Bouallegue","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,4]]},"reference":[{"key":"2043_CR1","doi-asserted-by":"publisher","first-page":"37","DOI":"10.4310\/CIS.2006.v6.n1.a3","volume":"6","author":"N Cai","year":"2006","unstructured":"Cai N, Yeung RW (2006) Network error correction. part ii: Lower bounds Communications in Information and Systems 6:37\u201354. doi:https:\/\/doi.org\/10.4310\/CIS.2006.v6.n1.a3","journal-title":"part ii: Lower bounds Communications in Information and Systems"},{"key":"2043_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.4310\/CIS.2006.v6.n1.a2","volume":"6","author":"RW Yeung","year":"2006","unstructured":"Yeung RW, Cai N (2006) Network error correction. part i: Basic concepts and upper bounds Communications in Infomation and Systems 6:19\u201336. doi:https:\/\/doi.org\/10.4310\/CIS.2006.v6.n1.a2","journal-title":"part i: Basic concepts and upper bounds Communications in Infomation and Systems"},{"issue":"1","key":"2043_CR3","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1109\/TIT.2007.909139","volume":"54","author":"Z Zhang","year":"2008","unstructured":"Zhang Z (2008) Linear network error correction codes in packet networks. IEEE Trans Inf Theorys 54(1):209\u2013218. doi:https:\/\/doi.org\/10.1109\/TIT.2007.909139","journal-title":"IEEE Trans Inf Theorys"},{"issue":"8","key":"2043_CR4","doi-asserted-by":"publisher","first-page":"3579","DOI":"10.1109\/TIT.2008.926449","volume":"54","author":"R Koetter","year":"2008","unstructured":"Koetter R, Kschischang F (2008) Coding for errors and erasures in random network coding. IEEE Trans Inf Theorys 54(8):3579\u20133591. doi:https:\/\/doi.org\/10.1109\/TIT.2008.926449","journal-title":"IEEE Trans Inf Theorys"},{"issue":"9","key":"2043_CR5","doi-asserted-by":"publisher","first-page":"3951","DOI":"10.1109\/TIT.2008.928291","volume":"54","author":"D Silva","year":"2008","unstructured":"Silva D, Kschischang F, Koetter R (2008) A rank metric approach to error control in random network coding. IEEE Trans Inf Theorys 54(9):3951\u20133967. doi:https:\/\/doi.org\/10.1109\/TIT.2008.928291","journal-title":"IEEE Trans Inf Theorys"},{"issue":"2","key":"2043_CR6","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TVLSI.2010.2096239","volume":"20","author":"N Chen","year":"2012","unstructured":"Chen N, Yan Z, Gadouleau M, Wang Y (2012) .Suter, Rank metric decoder architectures for random linear network coding with error control. IEEE Trans 20(2):296\u2013309. doi:https:\/\/doi.org\/10.1109\/TVLSI.2010.2096239","journal-title":"IEEE Trans"},{"issue":"1","key":"2043_CR7","first-page":"1","volume":"21","author":"EM Gabidulin","year":"1985","unstructured":"Gabidulin EM (1985) Theory of codes with maximum rank distance. Probl Inf Transm 21(1):1\u201312","journal-title":"Probl Inf Transm"},{"key":"2043_CR8","doi-asserted-by":"publisher","unstructured":"Guefrachi A, Zaibi S, Bouallgue A (2016) NCS-EC: Network coding simulator with error control, 16th International Conference on Computational Science and its Applications (ICCSA\u20192016) 9786 of the series LNCS (10) 480\u2013490. doi:https:\/\/doi.org\/10.1007\/978-3-319-42085-1\\_37","DOI":"10.1007\/978-3-319-42085-1\\_37"},{"key":"2043_CR9","unstructured":"Medard M, Sprintson A (2011) Network coding: Fundamentals and applications, Academic Press, 1 edition, Jan."},{"key":"2043_CR10","doi-asserted-by":"publisher","unstructured":"K. C., H. M., K. J., C. D.J., On the optimal block length for joint channel and network coding,Information Theory Workshop (ITW)528\u2013532doi: https:\/\/doi.org\/10.1109\/ITW.2011.6089518","DOI":"10.1109\/ITW.2011.6089518"},{"issue":"10","key":"2043_CR11","doi-asserted-by":"publisher","first-page":"14413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T Ho","year":"2006","unstructured":"Ho T, Koette R, Medard M, Effros M, Shi J, Karger D (2006) A random linear net-work coding approach to multicast. IEEE Trans Inf Theorys 52(10):14413\u201314430. doi:https:\/\/doi.org\/10.1109\/TIT.2006.881746","journal-title":"IEEE Trans Inf Theorys"}],"container-title":["Mobile Networks and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02043-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11036-022-02043-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11036-022-02043-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,7]],"date-time":"2023-09-07T20:47:54Z","timestamp":1694119674000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11036-022-02043-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,4]]},"references-count":11,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,2]]}},"alternative-id":["2043"],"URL":"https:\/\/doi.org\/10.1007\/s11036-022-02043-0","relation":{},"ISSN":["1383-469X","1572-8153"],"issn-type":[{"type":"print","value":"1383-469X"},{"type":"electronic","value":"1572-8153"}],"subject":[],"published":{"date-parts":[[2022,11,4]]},"assertion":[{"value":"15 June 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}