{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T14:44:05Z","timestamp":1776955445929,"version":"3.51.4"},"reference-count":53,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,26]],"date-time":"2022-06-26T00:00:00Z","timestamp":1656201600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,26]]},"DOI":"10.1109\/isit50566.2022.9834557","type":"proceedings-article","created":{"date-parts":[[2022,8,3]],"date-time":"2022-08-03T15:34:22Z","timestamp":1659540862000},"page":"928-933","source":"Crossref","is-referenced-by-count":24,"title":["Timely Gossiping with File Slicing and Network Coding"],"prefix":"10.1109","author":[{"given":"Priyanka","family":"Kaswan","sequence":"first","affiliation":[{"name":"University of Maryland,Department of Electrical and Computer Engineering,College Park,MD,20742"}]},{"given":"Sennur","family":"Ulukus","sequence":"additional","affiliation":[{"name":"University of Maryland,Department of Electrical and Computer Engineering,College Park,MD,20742"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3091493"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP40776.2020.9053740"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162726"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2018.8619768"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS51825.2021.9484504"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006542"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322412"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.3001873"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2021.3059871"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2926160"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8762021"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000032"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162995"},{"key":"ref2","article-title":"Spreading Rumors Cheaply, Quickly, and Reliably","author":"minsky","year":"2002","journal-title":"PhD thesis"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"ref20","article-title":"Age-optimal trajectory planning for UAVassisted data collection","author":"liu","year":"2018","journal-title":"IEEE INFOCOM"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JCN.2019.000034"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2018.2885871"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2871079"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CISS50987.2021.9400248"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3323679.3326510"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3042169"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488731"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006505"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2019.2920351"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065060"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/GCWkshps52748.2021.9682174"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006504"},{"key":"ref40","article-title":"Age-ofinformation vs","author":"ayan","year":"2019","journal-title":"ICCPS ACM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2021.3095823"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331241"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2018.8406846"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2018.8437496"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCCN.2019.2916097"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2938969"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2991992"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2018.8580701"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/0147013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892324"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.261654"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874532"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517796"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.909171"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CISS48834.2020.1570629110"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SPAWC51858.2021.9593192"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518003"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF51394.2020.9443435"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.63"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/WCSP.2018.8555643"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2017.8006506"},{"key":"ref41","article-title":"Fundamental limits of ageof-information in stationary and non-stationary environments","author":"banerjee","year":"2020","journal-title":"IEEE ISIT"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2020.3037144"},{"key":"ref43","article-title":"Age of information aware cache updating with file- and age-dependent update durations","author":"tang","year":"2020","journal-title":"IEEE WIOPT"}],"event":{"name":"2022 IEEE International Symposium on Information Theory (ISIT)","location":"Espoo, Finland","start":{"date-parts":[[2022,6,26]]},"end":{"date-parts":[[2022,7,1]]}},"container-title":["2022 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9834325\/9834269\/09834557.pdf?arnumber=9834557","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:36:17Z","timestamp":1773347777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9834557\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,26]]},"references-count":53,"URL":"https:\/\/doi.org\/10.1109\/isit50566.2022.9834557","relation":{},"subject":[],"published":{"date-parts":[[2022,6,26]]}}}