{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:29:57Z","timestamp":1729639797938,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/isit.2014.6875097","type":"proceedings-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T21:50:30Z","timestamp":1408485030000},"page":"1568-1572","source":"Crossref","is-referenced-by-count":2,"title":["Protocol sequences for multiple-packet reception: Throughput invariance and user irrepressibility"],"prefix":"10.1109","author":[{"given":"Yijin","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Yuan-Hsun","family":"Lo","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Shu","sequence":"additional","affiliation":[]},{"given":"Wing Shing","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2048508"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1137\/06067852X"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-009-9345-4"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2009.081993"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2070550"},{"key":"13","doi-asserted-by":"crossref","first-page":"940","DOI":"10.1109\/18.135636","article-title":"Constructions of binary constantweight cyclic codes and cyclically permutable codes","volume":"38","author":"gyo?rfi","year":"1992","journal-title":"IEEE Trans Inform Theory"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.896867"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205912"},{"key":"12","doi-asserted-by":"crossref","first-page":"3312","DOI":"10.1109\/TIT.2009.2021335","article-title":"Shift-invariant protocol sequences for the collision channel without feedback","volume":"55","author":"shum","year":"2009","journal-title":"IEEE Trans Inform Theory"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.169"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.850060"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057010"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.855600"},{"key":"7","first-page":"1393","article-title":"Multi packet reception and network coding","author":"rezaee","year":"2010","journal-title":"IEEE MILCOM 2010"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2013.032513.120429"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2012.120512.110285"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.06.090186"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2012.120213"}],"event":{"name":"2014 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2014,6,29]]},"location":"Honolulu, HI, USA","end":{"date-parts":[[2014,7,4]]}},"container-title":["2014 IEEE International Symposium on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6867217\/6874773\/06875097.pdf?arnumber=6875097","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:24:48Z","timestamp":1602689088000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6875097"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/isit.2014.6875097","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}