{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T10:40:52Z","timestamp":1761648052960},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1007\/s11432-013-4809-6","type":"journal-article","created":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T05:46:17Z","timestamp":1364795177000},"page":"1-10","source":"Crossref","is-referenced-by-count":6,"title":["An extended packetization-aware mapping algorithm for scalable video coding in finite-length fountain codes"],"prefix":"10.1007","volume":"56","author":[{"given":"CongZhe","family":"Cao","sequence":"first","affiliation":[]},{"given":"ZeSong","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"GaiShi","family":"Huang","sequence":"additional","affiliation":[]},{"given":"ChengWen","family":"Xing","sequence":"additional","affiliation":[]},{"given":"JingMing","family":"Kuang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,2]]},"reference":[{"key":"4809_CR1","doi-asserted-by":"crossref","first-page":"851","DOI":"10.1109\/TMM.2007.895676","volume":"9","author":"F W Fu","year":"2007","unstructured":"Fu F W, van der Schaar M. Noncollaborative resource management for wireless multimedia applications using mechanism design. IEEE Trans Multimedia, 2007, 9: 851\u2013868","journal-title":"IEEE Trans Multimedia"},{"key":"4809_CR2","doi-asserted-by":"crossref","first-page":"185","DOI":"10.1109\/TMM.2006.886384","volume":"9","author":"M Schaar Van der","year":"2004","unstructured":"Van der Schaar M, Turaga D S. Cross-layer packetization and retransmission strategies for delay-sensitive wireless multimedia transmission. IEEE Trans Multimedia, 2004, 9: 185\u2013197","journal-title":"IEEE Trans Multimedia"},{"key":"4809_CR3","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1109\/MCOM.2009.5273813","volume":"47","author":"K Etemad","year":"2009","unstructured":"Etemad K, Wang L M. Multicast and broadcast multimedia services in mobile WiMAX networks. IEEE Commun Mag, 2009, 47: 84\u201391","journal-title":"IEEE Commun Mag"},{"key":"4809_CR4","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1109\/TBC.2007.891703","volume":"53","author":"M Luby","year":"2007","unstructured":"Luby M, Gasiba T, Stockhammer T, et al. Reliable multimedia download delivery in cellular broadcast networks. IEEE Trans Broadcast, 2007, 53: 235\u2013246","journal-title":"IEEE Trans Broadcast"},{"key":"4809_CR5","doi-asserted-by":"crossref","first-page":"4375","DOI":"10.1109\/T-WC.2008.070653","volume":"7","author":"Y C Lai","year":"2008","unstructured":"Lai Y C, Lin P, Fang Y G, et al. Channel allocation for UMTS multimedia broadcasting and multicasting. IEEE Trans Wirel Commun, 2008, 7: 4375\u20134383","journal-title":"IEEE Trans Wirel Commun"},{"key":"4809_CR6","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1109\/LCOMM.2010.04.100021","volume":"14","author":"J F Weng","year":"2010","unstructured":"Weng J F, Chen J C. Dynamic rekeying in 3GPP multimedia broadcast\/multicast service (MBMS). IEEE Commun Lett, 2010, 14: 288\u2013290","journal-title":"IEEE Commun Lett"},{"key":"4809_CR7","doi-asserted-by":"crossref","first-page":"702","DOI":"10.1109\/ICCOMTA.2009.5349111","volume-title":"IEEE International Conference on Communications Technology and Applications, Beijing","author":"X Guo","year":"2009","unstructured":"Guo X, Ji X D, Peng M G, et al. A novel virtual hybrid ARQ mechanism for multi-cell MBMS transmission in wireless network. In: IEEE International Conference on Communications Technology and Applications, Beijing, 2009. 702\u2013706"},{"key":"4809_CR8","first-page":"1","volume-title":"International Symposium on Intelligent Signal Processing and Communication Systems, Chengdu","author":"H Wang","year":"2010","unstructured":"Wang H, Ding B, Wang X B, et al. Admission control scheme for MBMS in heterogeneous wireless networks. In: International Symposium on Intelligent Signal Processing and Communication Systems, Chengdu, 2010. 1\u20134"},{"key":"4809_CR9","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1109\/TCSVT.2007.905532","volume":"17","author":"H Schwarz","year":"2007","unstructured":"Schwarz H, Marpe D, Wiegand T. Overview of the scalable video coding extension of the H.264\/AVC standard. IEEE Trans Circuits Syst Video Technol, 2007, 17: 1103\u20131120","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4809_CR10","doi-asserted-by":"crossref","first-page":"1136","DOI":"10.1109\/TCSVT.2007.905515","volume":"17","author":"E Francois","year":"2007","unstructured":"Francois E, Viron J, Bottreau V. Interlaced coding in SVC. IEEE Trans Circuits Syst Video Technol, 2007, 17: 1136\u20131148","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"key":"4809_CR11","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1109\/JCN.2011.6157415","volume":"13","author":"K D Lee","year":"2011","unstructured":"Lee K D, Kim S G, Yi B K. Packet-level scheduling for implant communications using forward error correction in an erasure correction mode for reliable u-healthcare service. J Commun Netw, 2011, 13: 160\u2013166","journal-title":"J Commun Netw"},{"key":"4809_CR12","doi-asserted-by":"crossref","first-page":"1066","DOI":"10.1109\/TCE.2008.4637589","volume":"54","author":"Y C Chang","year":"2008","unstructured":"Chang Y C, Lee S W, Komyia R. A fast forward error correction allocation algorithm for unequal error protection of video transmission over wireless channels. IEEE Trans Consum Electron, 2008, 54: 1066\u20131073","journal-title":"IEEE Trans Consum Electron"},{"key":"4809_CR13","first-page":"271","volume-title":"IEEE Symposium on Foundations of Computer Science, Vancouver","author":"M Luby","year":"2002","unstructured":"Luby M. LT codes. In: IEEE Symposium on Foundations of Computer Science, Vancouver, 2002. 271\u2013280"},{"key":"4809_CR14","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi A. Raptor codes. IEEE Trans Inf Theory, 2006, 52: 2551\u20132567","journal-title":"IEEE Trans Inf Theory"},{"key":"4809_CR15","first-page":"1","volume-title":"IEEE Global Telecommunications Conference, Honolulu","author":"A Talari","year":"2009","unstructured":"Talari A, Rahnavard N. Rateless codes with optimum intermediate performance. In: IEEE Global Telecommunications Conference, Honolulu, 2009. 1\u20136"},{"key":"4809_CR16","first-page":"478","volume-title":"IEEE Information Theory Workshop, Tahoe City","author":"S Sanghavi","year":"2007","unstructured":"Sanghavi S. Intermediate performance of rateless codes. In: IEEE Information Theory Workshop, Tahoe City, 2007. 478\u2013482"},{"key":"4809_CR17","doi-asserted-by":"crossref","first-page":"1032","DOI":"10.1109\/JSAC.2011.110513","volume":"29","author":"S C Han","year":"2011","unstructured":"Han S C, Joo H, Lee D, et al. An end-to-end virtual path construction system for stable live video streaming over heterogeneous wireless networks. IEEE J Sel Areas Commun, 2011, 29: 1032\u20131041","journal-title":"IEEE J Sel Areas Commun"},{"key":"4809_CR18","first-page":"364","volume-title":"Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms","author":"M G Luby","year":"1998","unstructured":"Luby M G, Mitzenmacher M, Shokrollahi M A. Analysis of random processes via And-Or tree evaluation. In: Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms. Philadelphia: Society for Industrial and Applied Mathematics, 1998. 364\u2013373"},{"key":"4809_CR19","first-page":"523","volume-title":"IEEE International Symposium on Information Theory (ISIT), Seattle","author":"N Rahnavard","year":"2006","unstructured":"Rahnavard N, Fekri F. Generalization of rateless codes for unequal error protection and recovery time: asymptotic analysis. In: IEEE International Symposium on Information Theory (ISIT), Seattle, 2006. 523\u2013527"},{"key":"4809_CR20","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1109\/ITWNIT.2009.5158583","volume-title":"IEEE Information Theory Workshop on Networking and Information Theory, Volos","author":"D Sejdinovic","year":"2009","unstructured":"Sejdinovic D, Piechocki R J, Doufexi A. And-Or tree analysis of distributed LT codes. In: IEEE Information Theory Workshop on Networking and Information Theory, Volos, 2009. 261\u2013265"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4809-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-013-4809-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-013-4809-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:37:51Z","timestamp":1559403471000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-013-4809-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["4809"],"URL":"https:\/\/doi.org\/10.1007\/s11432-013-4809-6","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4]]}}}