{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T06:10:18Z","timestamp":1730268618982,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1109\/infocom.2019.8737576","type":"proceedings-article","created":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T00:35:56Z","timestamp":1560818156000},"page":"2359-2367","source":"Crossref","is-referenced-by-count":2,"title":["Multisource Rumor Spreading with Network Coding"],"prefix":"10.1109","author":[{"given":"Yerom-David","family":"Bromberg","sequence":"first","affiliation":[]},{"given":"Quentin","family":"Dufour","sequence":"additional","affiliation":[]},{"given":"Davide","family":"Frey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2872518.2890539"},{"key":"ref12","first-page":"43","volume":"3","author":"koldehofe","year":"2004","journal-title":"Simple gossiping with balls and bins"},{"key":"ref13","first-page":"60","article-title":"From epidemics to distributed computing","volume":"37","author":"euster","year":"2004","journal-title":"IEEE Computer"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-011-0110-x"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874532"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1993636.1993676"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2011.04.001"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/43921.43922"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909171"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45172-3_24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2612695"},{"key":"ref3","first-page":"2486","article-title":"Cassandra: A Decentralized Structured Storage System","volume":"14","author":"lakshman","year":"2006","journal-title":"SIGOPS Oper Syst Rev vol 44 no 4 pp 35&#x2013;40 Apr 2010 Transactions on Networking (TON)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1028914"},{"key":"ref5","article-title":"Lifeguard: Swim-ing with situational awareness","volume":"abs 1707 788","author":"dadgar","year":"2017","journal-title":"CoRR"},{"journal-title":"Live Streaming with Gossip","year":"2017","author":"frey","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1082469.1082470"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00062"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270330"},{"key":"ref1","first-page":"1","article-title":"T-man: Gossip-based overlay topology management","author":"jelasity","year":"2005","journal-title":"ESOA 2005 Utrecht The Netherlands July 25 2005 Revised Selected Papers"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-05118-0_13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.901080"},{"key":"ref21","article-title":"Practical Network Coding","author":"chou","year":"2003","journal-title":"Allerton Conference on Communication Control and Computing"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1111322.1111337"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1151659.1159942"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1275517.1275520"}],"event":{"name":"IEEE INFOCOM 2019 - IEEE Conference on Computer Communications","start":{"date-parts":[[2019,4,29]]},"location":"Paris, France","end":{"date-parts":[[2019,5,2]]}},"container-title":["IEEE INFOCOM 2019 - IEEE Conference on Computer Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8732929\/8737365\/08737576.pdf?arnumber=8737576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:09:44Z","timestamp":1657854584000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8737576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/infocom.2019.8737576","relation":{},"subject":[],"published":{"date-parts":[[2019,4]]}}}