{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:09:34Z","timestamp":1729663774432,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1109\/isit.2015.7283006","type":"proceedings-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T18:09:52Z","timestamp":1443722992000},"page":"2994-2998","source":"Crossref","is-referenced-by-count":0,"title":["On unequal missing protection of the grouping of RFID tags"],"prefix":"10.1109","author":[{"given":"Yi-Sheng","family":"Su","sequence":"first","affiliation":[]},{"given":"Chung-Hsuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Huei-Yun","family":"Siao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/AINA.2005.197"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/PERCOMW.2004.1276920"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TIT.1962.1057683"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/RFID.2012.6193063"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TIT.2007.915923"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/TASE.2012.2193125"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1109\/TIT.2002.1003839","article-title":"Finite-length analysis of low-density parity-check codes on the binary erasure channel","volume":"48","author":"di","year":"2002","journal-title":"IEEE Trans Inf Theory"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2013.101113.130216"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1120","DOI":"10.1109\/LCOMM.2013.051313.130068","article-title":"Grouping of RFID tags via strongly selective families","volume":"17","author":"su","year":"2013","journal-title":"IEEE Commun Lett"},{"year":"1992","author":"pargett","journal-title":"What is EDI? A Guide to Electronic Data Interchange","key":"ref2"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/LSP.2014.2306264"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1002\/9780470665251"}],"event":{"name":"2015 IEEE International Symposium on Information Theory (ISIT)","start":{"date-parts":[[2015,6,14]]},"location":"Hong Kong, Hong Kong","end":{"date-parts":[[2015,6,19]]}},"container-title":["2015 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7270906\/7282397\/07283006.pdf?arnumber=7283006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T16:37:53Z","timestamp":1498235873000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7283006\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,6]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/isit.2015.7283006","relation":{},"subject":[],"published":{"date-parts":[[2015,6]]}}}