{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:56:07Z","timestamp":1773377767788,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834338","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"1584-1589","source":"Crossref","is-referenced-by-count":11,"title":["Packet Size Optimization for Batched Network Coding"],"prefix":"10.1109","author":[{"given":"Hoover H. F.","family":"Yin","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong,N-hop technologies Limited. H. H. F. Yin is also with the Institute of Network Coding"}]},{"given":"Harry W. H.","family":"Wong","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering"}]},{"given":"Mehrdad","family":"Tahernia","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,N-hop technologies Limited. H. H. F. Yin is also with the Institute of Network Coding"}]},{"given":"Jiaxin","family":"Qing","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering"}]}],"member":"263","reference":[{"key":"ref39","article-title":"Loss-resilient protocols for communication networks","author":"yin","year":"2019","journal-title":"U S Patent"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148834"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3126634"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/VTC2020-Spring48590.2020.9128521"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21828"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174517"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3126426"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2891842"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2713813"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ITW48936.2021.9611427"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517910"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/e22070790"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849519"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191397"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261896"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503153"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2884408"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2334315"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2093850"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2989619"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2516819"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/ett.2899"},{"key":"ref11","first-page":"385","article-title":"On the effects of heterogeneous packet lengths on network coding","author":"compta","year":"2014","journal-title":"European Wireless 2014"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972110"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TBC.2019.2892594"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC.2019.8885446"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990879"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638639"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261904"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247260"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3137209"},{"key":"ref19","first-page":"40","article-title":"Practical network coding","volume":"41","author":"chou","year":"2003","journal-title":"Proc Allerton Conf on Comm Control and Comp"},{"key":"ref4","first-page":"368","article-title":"Low complexity optimal algebraic multicast codes","author":"jaggi","year":"2003","journal-title":"Proc ISIT &#x2019;03"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2008.01.006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/777412.777464"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864424"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261636"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028592"},{"key":"ref9","first-page":"72","article-title":"On the impact of zero-padding in network coding efficiency with internet traffic and video traces","author":"taghouti","year":"2016","journal-title":"European Wireless 2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7996708"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518102"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-79278-6"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518091"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541719"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435792"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2765641"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849280"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834338.pdf?arnumber=9834338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:35:06Z","timestamp":1773347706000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834338\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834338","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}