{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:00:14Z","timestamp":1772283614534,"version":"3.50.1"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/isit.2008.4595148","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T22:33:52Z","timestamp":1218666832000},"page":"1053-1057","source":"Crossref","is-referenced-by-count":13,"title":["Coding over an erasure channel with a large alphabet size"],"prefix":"10.1109","author":[{"given":"Shervan","family":"Fashandi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shahab Oveis","family":"Gharan","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Amir K.","family":"Khandani","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"19","article-title":"practical network coding","author":"chou","year":"2003","journal-title":"51st Allerton Conference on Communication Control and Computing"},{"key":"22","first-page":"284","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2007.354"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1023\/A:1027358511882"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/18.910575"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492581"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055516"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808968.007"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.12.023"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/76.911162"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1049\/ip-com:20050291"},{"key":"7","first-page":"157","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"6","first-page":"135","author":"gallager","year":"1968","journal-title":"Information Theory and Reliable Communication"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91200-4"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.2307\/2319442"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511808968.012"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1968.1054129"}],"event":{"name":"2008 IEEE International Symposium on Information Theory - ISIT","location":"Toronto, ON, Canada","start":{"date-parts":[[2008,7,6]]},"end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586217\/4594928\/04595148.pdf?arnumber=4595148","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T20:36:39Z","timestamp":1489696599000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4595148\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/isit.2008.4595148","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}