{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:43:49Z","timestamp":1729644229009,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/isit.2005.1523691","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T15:51:59Z","timestamp":1160581919000},"page":"1977-1981","source":"Crossref","is-referenced-by-count":28,"title":["Network monitoring in multicast networks using network coding"],"prefix":"10.1109","author":[{"given":"T.","family":"Ho","sequence":"first","affiliation":[]},{"given":"B.","family":"Leong","sequence":"additional","affiliation":[]},{"family":"Yu-Han Chang","sequence":"additional","affiliation":[]},{"family":"Yonggang Wen","sequence":"additional","affiliation":[]},{"given":"R.","family":"Koetter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Toward a random operation of networks","author":"ho","year":"2003","journal-title":"IEEE Transactions on Information Theory"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/18.971737"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/984622.984680"},{"key":"13","article-title":"Passive unicast network tomography using em algorithms","author":"tsang","year":"2001","journal-title":"IEEE Int'l Conference on Acoustics Speech and Signal Processing"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45400-4_37","article-title":"Network delay tomography from end-to-end unicast measurements","volume":"2170","author":"duffield","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948230"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015475"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.844062"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228459"},{"journal-title":"Internet Tomography","year":"2002","author":"coates","key":"10"},{"key":"7","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Proceedings of 41st Annual Allerton Conference on Communication Control and Computing"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228384"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847712"}],"event":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","start":{"date-parts":[[2005,9,4]]},"location":"Adelaide, Australia","end":{"date-parts":[[2005,9,9]]}},"container-title":["Proceedings. International Symposium on Information Theory, 2005. ISIT 2005."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10215\/32581\/01523691.pdf?arnumber=1523691","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T10:08:34Z","timestamp":1497694114000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1523691\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/isit.2005.1523691","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}