{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:27:28Z","timestamp":1725550048712},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/afrcon.2011.6072159","type":"proceedings-article","created":{"date-parts":[[2011,11,11]],"date-time":"2011-11-11T18:56:18Z","timestamp":1321037778000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Error correction for resource limited random network coding networks"],"prefix":"10.1109","author":[{"given":"Sune","family":"von Solms","sequence":"first","affiliation":[]},{"given":"Sarel J.","family":"de Wet","sequence":"additional","affiliation":[]},{"given":"Albert S. J.","family":"Helberg","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Allerton Conference on Commmication Control and Computing"},{"key":"ref11","article-title":"First Report on Test-Bed Fuictionalities and Implementation of Network Coding Schemes","author":"broustis","year":"2009","journal-title":"FP7-ICT-215252 NCRAVE &#x201C;Network Coding for Robust Architectures in Volatile Environments&#x201D;"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/ISIT.2009.5206041"},{"key":"ref13","first-page":"7","article-title":"Topological Arrangement of Nodes in Wireless Networks Suitable for the Implementation of Network Coding","author":"b\u00f6ning","year":"2010","journal-title":"Proc the Southern Africa Telecommunication Networks and Applications Conference (SATNAC)"},{"year":"2010","author":"b\u00f6ning","article-title":"Topological arrangement of nodes in wireless networks suitable for the implementation of network coding","key":"ref14"},{"year":"2010","author":"van wyk","article-title":"Comparing network coding implementations on different OSI layers","key":"ref15"},{"year":"1983","author":"lin","article-title":"Error control coding: Fundamentals and applications","key":"ref16"},{"year":"2003","author":"mackay","article-title":"Information Theory, Inference, and Learning Algorithms","key":"ref17"},{"year":"1998","author":"pretzel","article-title":"Error-Correcting codes and Finite Fields","key":"ref18"},{"key":"ref19","article-title":"Data obfuscation with network coding","author":"hessler","year":"2010","journal-title":"Computer Commmications"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ISIT.2003.1228459"},{"key":"ref3","article-title":"Performance of Implicit Error Correction of Network Coding networks in the presence of Link Errors","author":"von solms","year":"2009","journal-title":"Proceedings of the 2009 Annual Conference of the South African Institute of Computer Scientists and Information Technologists SAICSIT Conf 2009"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ITWITWN.2007.4318069"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/NETCOD.2009.5191396"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TIT.2008.926449"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.4310\/CIS.2006.v6.n1.a3"},{"year":"2009","author":"von solms","article-title":"Exploiting the implicit error correcting ability of networks that use random network coding","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1007\/978-3-642-11723-7_48"},{"year":"2009","author":"wang","article-title":"Network coded flooding","key":"ref9"},{"year":"2006","author":"tirronen","article-title":"Optimizing the Degree Distribution of LT codes","key":"ref20"}],"event":{"name":"AFRICON 2011","start":{"date-parts":[[2011,9,13]]},"location":"Victoria Falls, Livingstone, Zambia","end":{"date-parts":[[2011,9,15]]}},"container-title":["IEEE Africon '11"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6062325\/6071956\/06072159.pdf?arnumber=6072159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T16:57:55Z","timestamp":1490115475000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6072159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/afrcon.2011.6072159","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}