{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:44:14Z","timestamp":1729640654516,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/isit.2010.5513777","type":"proceedings-article","created":{"date-parts":[[2010,8,19]],"date-time":"2010-08-19T19:57:25Z","timestamp":1282247845000},"page":"2423-2427","source":"Crossref","is-referenced-by-count":14,"title":["Polytope codes against adversaries in networks"],"prefix":"10.1109","author":[{"given":"Oliver","family":"Kosut","sequence":"first","affiliation":[]},{"given":"Lang","family":"Tong","sequence":"additional","affiliation":[]},{"given":"David","family":"Tse","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5206004"},{"key":"ref11","article-title":"When watchdog meets coding","author":"liang","year":"2009","journal-title":"Technical Report"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394512"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513777"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"19","DOI":"10.4310\/CIS.2006.v6.n1.a2","article-title":"Network error correction, part I: Basic concepts and upper bounds","volume":"6","author":"yeung","year":"2006","journal-title":"Comm in Inf and Syst"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0196-6774(82)90004-9"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2009.5394912"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4310\/CIS.2006.v6.n1.a3","article-title":"Network error correction, part II: Lower bounds","volume":"6","author":"cai","year":"2006","journal-title":"Comm in Inf and Syst"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.78"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365180"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.926449"}],"event":{"name":"2010 IEEE International Symposium on Information Theory - ISIT","start":{"date-parts":[[2010,6,13]]},"location":"Austin, TX, USA","end":{"date-parts":[[2010,6,18]]}},"container-title":["2010 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5508195\/5513230\/05513777.pdf?arnumber=5513777","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T18:54:10Z","timestamp":1711738450000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5513777\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/isit.2010.5513777","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}