{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T12:16:18Z","timestamp":1648901778564},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,3,17]],"date-time":"2016-03-17T00:00:00Z","timestamp":1458172800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Wireless Pers Commun"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11277-016-3234-8","type":"journal-article","created":{"date-parts":[[2016,3,18]],"date-time":"2016-03-18T11:20:54Z","timestamp":1458300054000},"page":"1-13","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Design of (4, 8) Binary Code with MDS and Zigzag-Decodable Property"],"prefix":"10.1007","volume":"89","author":[{"given":"Mingjun","family":"Dai","sequence":"first","affiliation":[]},{"given":"Zexin","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Shen","sequence":"additional","affiliation":[]},{"given":"Hui","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xiaohui","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Shengli","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Li","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hongwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,17]]},"reference":[{"key":"3234_CR1","doi-asserted-by":"crossref","unstructured":"Fukayama, A., Iwamoto, H., Motegi, M., Sato, H., Takenaka, H., Tsuchikawa, M., et al. (2013). Designing carrier\u2019s online storage family cloud for enhancing telecom home services. In Proceedings of the IEEE 17th international conference intelligence in next generation networks (ICIN) (pp. 75\u201385). Venice, Italy.","DOI":"10.1109\/ICIN.2013.6670897"},{"issue":"9","key":"3234_CR2","doi-asserted-by":"crossref","first-page":"4539","DOI":"10.1109\/TIT.2010.2054295","volume":"56","author":"AG Dimakis","year":"2010","unstructured":"Dimakis, A. G., Godfrey, P. B., Wu, Y., Wainwright, M. J., & Ramchandran, K. (2010). Network coding for distributed storage systems. IEEE Transactions on Information Theory, 56(9), 4539\u20134551.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3234_CR3","doi-asserted-by":"crossref","unstructured":"Ghemawat, S., Gobioff, H., Leung, S.T. (2003). The Google file system. In SOSP \u201903 Proceedings of the nineteenth ACM symposium on operating systems principles (pp. 29\u201343). New York, USA.","DOI":"10.1145\/945445.945450"},{"key":"3234_CR4","doi-asserted-by":"crossref","unstructured":"Jones, T., Koniges, A., Yates, R. K. (2000). Performance of the IBM general parallel file system. In Proceedings of the IEEE international conference parallel and distributed processing symposium.(IPDPS) (pp. 673\u2013681). Cancun, Mexico.","DOI":"10.1109\/IPDPS.2000.846052"},{"key":"3234_CR5","unstructured":"Zhao, T. Z., March, V., Dong, S. B., & See, S. (2010). Evaluation of a performance model of lustre file system, the fifth annual chinagrid conference (ChinaGrid) (pp. 191\u2013196). China: Guangzho."},{"issue":"4","key":"3234_CR6","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.-Y. R., & Yeung, R. W. (2000). Network information flow. IEEE Transactions on Information Theory, 46(4), 1204\u20131216.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3234_CR7","doi-asserted-by":"crossref","unstructured":"Papailiopoulos, D. S., Luo, J., & Dimakis, A. G. (2012). Simple regenerating codes: Network coding for cloud storage. In Proceedings of the IEEE INFOCOM (pp. 2801\u20132805). Orlando, USA.","DOI":"10.1109\/INFCOM.2012.6195703"},{"key":"3234_CR8","doi-asserted-by":"crossref","unstructured":"Cadambe, V. R., Huang, C., & Li, J. (2011). Permutation code: Optimal exact-repair of a single failed node in MDS code based distributed storage systems. In Proceedings of the IEEE ISIT (pp. 1225\u20131229). St. Petersburg, Russia.","DOI":"10.1109\/ISIT.2011.6033730"},{"issue":"3","key":"3234_CR9","doi-asserted-by":"crossref","first-page":"476","DOI":"10.1109\/JPROC.2010.2096170","volume":"99","author":"AG Dimakis","year":"2011","unstructured":"Dimakis, A. G., Ramchandran, K., Wu, Y., & Changho, S. (2011). A survey on network codes for distributed storage. Proceedings of the IEEE, 99(3), 476\u2013489.","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"3234_CR10","doi-asserted-by":"crossref","first-page":"660","DOI":"10.1109\/LCOMM.2014.030114.132694","volume":"18","author":"B Zhu","year":"2014","unstructured":"Zhu, B., Shum, K. W., Li, H., & Hou, H. X. (2014). General fractional repetition codes for distributed storage systems. IEEE Communications Letters, 18(4), 660\u2013663.","journal-title":"IEEE Communications Letters"},{"key":"3234_CR11","doi-asserted-by":"crossref","unstructured":"Cadambe, V. R., Huang, C., Li, J., & Mehrotra, S. (2011). Polynomial length MDS codes with optimal repair in distributed storage. In Procedings of IEEE ASILOMAR (pp. 1850\u20131854). Pacific Grove, CA, USA.","DOI":"10.1109\/ACSSC.2011.6190343"},{"key":"3234_CR12","doi-asserted-by":"crossref","unstructured":"Thangaraj, A., & Sankar, C. (2011). Quasicyclic MDS codes for distributed storage with efficient exact repair. IEEE information theory workshop (pp. 45\u201349). Paraty, Brazil.","DOI":"10.1109\/ITW.2011.6089502"},{"issue":"1","key":"3234_CR13","doi-asserted-by":"crossref","first-page":"218","DOI":"10.1109\/TWC.2012.120412.112266","volume":"12","author":"M Dai","year":"2013","unstructured":"Dai, M., Kwan, H. Y., & Sung, C. W. (2013). Linear network coding strategies for the multiple-access relay channel with packet erasures. IEEE Transactions on Wireless Communications, 12(1), 218\u2013227.","journal-title":"IEEE Transactions on Wireless Communications"},{"issue":"3","key":"3234_CR14","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1109\/TIT.1986.1057188","volume":"32","author":"G Seroussi","year":"1986","unstructured":"Seroussi, G., & Roth, R. M. (1986). On MDS extensions of generalized Reed-Solomon codes. IEEE Transactions on Information Theory, 32(3), 349\u2013354.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3234_CR15","doi-asserted-by":"crossref","unstructured":"Vingelmann, P., Pedersen, M. V., Fitzek, F. H. P., & Heide, J. (Oct. 2010). Multimedia distribution using network coding on the iPhone platform. In Proceedings of the ACM multimedia workshop on moobile cloud media computing ( pp. 1\u20135). Firenze, Italy.","DOI":"10.1145\/1877953.1877957"},{"issue":"8","key":"3234_CR16","doi-asserted-by":"crossref","first-page":"1287","DOI":"10.1109\/LCOMM.2014.2332491","volume":"18","author":"M Shahabinejad","year":"2014","unstructured":"Shahabinejad, M., Khabbazian, M., & Ardakani, M. (2014). An efficient binary locally repairable code for Hadoop distributed file system. IEEE Communications Letters, 18(8), 1287\u20131290.","journal-title":"IEEE Communications Letters"},{"key":"3234_CR17","doi-asserted-by":"crossref","unstructured":"Heide, J., Pedersen, M. V., Fitzek, F. H. P., & Medard, M. (2011). On the code parameters and coding vector representation for practical RLNC. In Proceedings of the IEEE international conference in communications (pp. 1\u20135). Kyoto, Japan.","DOI":"10.1109\/icc.2011.5963013"},{"key":"3234_CR18","doi-asserted-by":"crossref","unstructured":"Vingelmann, P., Zanaty, P., Fitzek, F. H. P., Charaf, H. (2009). Implementation of random linear network coding on OpenGL-enabled graphics cards. In Proceedings of the IEEE EW (pp. 1\u20135). Aalborg, Denmark.","DOI":"10.1109\/EW.2009.5357971"},{"issue":"4","key":"3234_CR19","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1002\/ett.4460120407","volume":"12","author":"MS Hwang","year":"2001","unstructured":"Hwang, M. S., & Lee, C. H. (2001). Secure access schemes in mobile database systems. Transactions on Emerging Telecommunications Communications Technology, 12(4), 303\u2013310.","journal-title":"Transactions on Emerging Telecommunications Communications Technology"},{"issue":"4","key":"3234_CR20","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1002\/ett.2741","volume":"25","author":"G Piro","year":"2014","unstructured":"Piro, G., Grieco, L. A., Boggia, G., & Chatzimisios, P. (2014). Information-centric networking and multimedia services: Present and future challenges. Transactions on Emerging Telecommunications Communications Technology, 25(4), 392\u2013406.","journal-title":"Transactions on Emerging Telecommunications Communications Technology"},{"key":"3234_CR21","doi-asserted-by":"crossref","unstructured":"Shibli, M.A., Masood, R., Ghazi, Y., Muftic , S. (2013). MagicNET: Mobile agents data protection system. In Transactions on Emerging Telecommunications Communications Technology, 26(5), 813\u2013835.","DOI":"10.1002\/ett.2742"},{"key":"3234_CR22","doi-asserted-by":"crossref","unstructured":"Gollakota, S., Katabi, D. (2008). Zigzag decoding: Combating hidden terminals in wireless networks. In Proceedings of SIGCOM (pp. 159\u2013170). New York, USA.","DOI":"10.1145\/1402958.1402977"},{"issue":"2","key":"3234_CR23","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/18.485722","volume":"42","author":"M Blaum","year":"1996","unstructured":"Blaum, M., Bruck, J., & Vardy, A. (1996). MDS array codes with independent parity symbols. IEEE Transactions on Information Theory, 42(2), 529\u2013542.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"3","key":"3234_CR24","doi-asserted-by":"crossref","first-page":"1597","DOI":"10.1109\/TIT.2012.2227110","volume":"59","author":"I Tamo","year":"2013","unstructured":"Tamo, I., Wang, Z., & Bruck, J. (2013). Zigzag codes: MDS array codes with optimal rebuilding. IEEE Transactions on Information Theory, 59(3), 1597\u20131616.","journal-title":"IEEE Transactions on Information Theory"},{"key":"3234_CR25","doi-asserted-by":"crossref","unstructured":"En Gad, E., Mateescu, R., Blagojevic, F., Guyot, C., & Bandic, Z. (Jul. 2013). Repair-optimal MDS array codes over GF(2). In Proceedings of the IEEE ISIT (pp. 887\u2013891), Istanbul, Turkey.","DOI":"10.1109\/ISIT.2013.6620354"},{"key":"3234_CR26","doi-asserted-by":"crossref","unstructured":"Xiao, M., Medard, M., & Aulin, T. (2007). A binary coding approach for combination networks and general erasure networks. In Proceedings of the IEEE ISIT, (pp. 786\u2013790). Nice, France.","DOI":"10.1109\/ISIT.2007.4557320"},{"issue":"3","key":"3234_CR27","doi-asserted-by":"crossref","first-page":"1346","DOI":"10.1109\/TVT.2012.2185966","volume":"61","author":"J Li","year":"2012","unstructured":"Li, J., Yuan, J., Malaney, R., Xiao, M., & Chen, W. (2012). Full-diversity binary frame-wise network coding for multiple-source multiple-relay networks over slow-fading channels. IEEE Transactions on Vehicular Technology, 61(3), 1346\u20131360.","journal-title":"IEEE Transactions on Vehicular Technology"},{"key":"3234_CR28","doi-asserted-by":"crossref","unstructured":"Sung, C. W., & Gong, X. (2013). A ZigZag-decodable code with the MDS property for distributed storage systems. In Proceedings of the IEEE ISIT (pp. 341\u2013345). Istanbul, Turkey.","DOI":"10.1109\/ISIT.2013.6620244"},{"key":"3234_CR29","doi-asserted-by":"crossref","unstructured":"Hou, H., Shum, K. W., & Li, H. (2013). Construction of exact-basic codes for distributed storage systems at the MSR point. In Proceedings of the IEEE international conference on big data (pp. 33\u201338). Santa Clara, USA. .","DOI":"10.1109\/BigData.2013.6691659"}],"container-title":["Wireless Personal Communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3234-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11277-016-3234-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11277-016-3234-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T13:50:53Z","timestamp":1567691453000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11277-016-3234-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,3,17]]},"references-count":29,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["3234"],"URL":"https:\/\/doi.org\/10.1007\/s11277-016-3234-8","relation":{},"ISSN":["0929-6212","1572-834X"],"issn-type":[{"value":"0929-6212","type":"print"},{"value":"1572-834X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,3,17]]}}}