{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:14:37Z","timestamp":1764936877493},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319513751"},{"type":"electronic","value":"9783319513768"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-51376-8_10","type":"book-chapter","created":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T12:21:23Z","timestamp":1482150083000},"page":"126-135","source":"Crossref","is-referenced-by-count":4,"title":["An Analytical Model for Perpetual Network Codes in Packet Erasure Channels"],"prefix":"10.1007","author":[{"given":"Peyman","family":"Pahlevani","sequence":"first","affiliation":[]},{"given":"S\u00e9rgio","family":"Cris\u00f3stomo","sequence":"additional","affiliation":[]},{"given":"Daniel E.","family":"Lucani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,12,20]]},"reference":[{"issue":"4","key":"10_CR1","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R Ahlswede","year":"2000","unstructured":"Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204\u20131216 (2000)","journal-title":"IEEE Trans. Inf. Theor."},{"doi-asserted-by":"crossref","unstructured":"Heide, J., Pedersen, M.V., Fitzek, F.H.P., Medard, M.: A perpetual code for network coding. In: 2014 IEEE 79th Vehicular Technology Conference (VTC Spring), pp. 1\u20136, May 2014","key":"10_CR2","DOI":"10.1109\/VTCSpring.2014.7022790"},{"key":"10_CR3","first-page":"87","volume-title":"Network Coding in the Real World","author":"J Heide","year":"2011","unstructured":"Heide, J., Pedersen, M., Fitzek, F., Larsen, T.: Network Coding in the Real World, 1st edn, pp. 87\u2013114. Academic Press, Cambridge (2011)","edition":"1"},{"issue":"10","key":"10_CR4","doi-asserted-by":"crossref","first-page":"4413","DOI":"10.1109\/TIT.2006.881746","volume":"52","author":"T Ho","year":"2006","unstructured":"Ho, T., Medard, M., Koetter, R., Karger, D.R., Effros, M., Shi, J., Leong, B.: A random linear network coding approach to multicast. IEEE Trans. Inf. Theor. 52(10), 4413\u20134430 (2006)","journal-title":"IEEE Trans. Inf. Theor."},{"issue":"2","key":"10_CR5","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"SYR Li","year":"2003","unstructured":"Li, S.Y.R., Yeung, R.W., Cai, N.: Linear network coding. IEEE Trans. Inf. Theor. 49(2), 371\u2013381 (2003)","journal-title":"IEEE Trans. Inf. Theor."},{"doi-asserted-by":"crossref","unstructured":"Luby, M.: Lt codes. In: Proceedings of the 43rd Annual IEEE Symposium on Foundations of Computer Science, pp. 271\u2013280 (2002)","key":"10_CR6","DOI":"10.1109\/SFCS.2002.1181950"},{"unstructured":"Maymounkov., P.: Perpetual codes: cachefriendly coding. Unpublished draft. http:\/\/pdos.csail.mit.edu\/?petar\/papers\/maymounkov-perpetual.ps","key":"10_CR7"},{"issue":"3","key":"10_CR8","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1109\/TNET.2014.2310171","volume":"23","author":"M Nistor","year":"2015","unstructured":"Nistor, M., Lucani, D.E., Barros, J.: Hardware abstraction and protocol optimization for coded sensor networks. IEEE\/ACM Trans. Netw. 23(3), 866\u2013879 (2015)","journal-title":"IEEE\/ACM Trans. Netw."},{"doi-asserted-by":"crossref","unstructured":"Pedersen, M.V., Heide, J., Fitzek, F.H.: KODO: an open and research oriented network coding library. In: Workshop on Network Coding Applications and Protocols (NC-Pro), Spain (2011)","key":"10_CR9","DOI":"10.1007\/978-3-642-23041-7_15"},{"issue":"6","key":"10_CR10","doi-asserted-by":"crossref","first-page":"2551","DOI":"10.1109\/TIT.2006.874390","volume":"52","author":"A Shokrollahi","year":"2006","unstructured":"Shokrollahi, A.: Raptor codes. IEEE Trans. Inf. Theor. 52(6), 2551\u20132567 (2006)","journal-title":"IEEE Trans. Inf. Theor."}],"container-title":["Lecture Notes in Computer Science","Multiple Access Communications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-51376-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T06:14:30Z","timestamp":1498371270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-51376-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319513751","9783319513768"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-51376-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}