{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:33:27Z","timestamp":1742398407012},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,6]]},"DOI":"10.1109\/isit.2007.4557101","type":"proceedings-article","created":{"date-parts":[[2008,7,9]],"date-time":"2008-07-09T00:17:12Z","timestamp":1215562632000},"page":"626-630","source":"Crossref","is-referenced-by-count":18,"title":["On Distributed Computation in Noisy Random Planar Networks"],"prefix":"10.1109","author":[{"given":"Yashodhan","family":"Kanoria","sequence":"first","affiliation":[]},{"given":"D.","family":"Manjunath","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/18.2626"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498546"},{"key":"ref10","first-page":"236","article-title":"Computation in noisy radio networks","author":"kushilevitz","year":"1998","journal-title":"Proc SODA"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.48"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1023\/B:WINE.0000013081.09837.c0"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CCC.2004.1313813"},{"key":"ref12","article-title":"Strategy in Ulam's game and tree code give error-resistant protocols","author":"peczarski","year":"2004","journal-title":"Arxiv preprint cs DC\/0410043"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/195058.195462"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.843543"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00002-8"},{"key":"ref1","article-title":"Distributed symmetric function computation in noisy wireless sensor networks with binary data","author":"ying","year":"2006","journal-title":"Proc WiOpt"}],"event":{"name":"2007 IEEE International Symposium on Information Theory","start":{"date-parts":[[2007,6,24]]},"location":"Nice","end":{"date-parts":[[2007,6,29]]}},"container-title":["2007 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4497218\/4557062\/04557101.pdf?arnumber=4557101","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T12:32:55Z","timestamp":1489667575000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4557101\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isit.2007.4557101","relation":{},"subject":[],"published":{"date-parts":[[2007,6]]}}}