{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:41:23Z","timestamp":1773376883192,"version":"3.50.1"},"reference-count":55,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,7]],"date-time":"2024-07-07T00:00:00Z","timestamp":1720310400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,7]]},"DOI":"10.1109\/isit57864.2024.10619460","type":"proceedings-article","created":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T13:25:01Z","timestamp":1724073901000},"page":"1315-1320","source":"Crossref","is-referenced-by-count":2,"title":["Distributionally Robust Degree Optimization for BATS Codes"],"prefix":"10.1109","author":[{"given":"Hoover H.","family":"F. Yin","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering"}]},{"given":"Jie","family":"Wang","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology,H. Milton Stewart School of Industrial and Systems Engineering"}]},{"given":"Sherman S.","family":"M. Chow","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong,Department of Information Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2456027"},{"key":"ref5","first-page":"40","article-title":"Practical network coding","volume-title":"Allerton Conf. on Communication, Control, and Computing","author":"Chou","year":"2003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2757241"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638639"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261904"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2015.7247260"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191397"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503153"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095111"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283956"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261896"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2787726"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2334315"},{"key":"ref17","volume-title":"BATS Codes: Theory and Practice, ser. Synthesis Lectures on Communication Networks","year":"2017"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2016.2594051"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2016.2516819"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ITW54588.2022.9965849"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3934\/naco.2021057"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2022.1275"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1287\/moor.2018.0936"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1017\/jpr.2019.49"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1287\/opre.2023.0135"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10107-017-1224-6"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2023.3271434"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCSYS.2022.3184921"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874390"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT50566.2022.9834338"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.001.21828"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3390\/e22070790"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028592"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2017.2713813"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849519"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT44484.2020.9174517"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2891842"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541719"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435792"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2765641"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/JSAIT.2021.3126634"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.3390\/e25071054"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518091"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/IEEECONF59524.2023.10476945"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1561\/0100000060"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2326976"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2499192"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2019.2895867"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2017.2742699"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICCS.2016.7833563"},{"key":"ref52","article-title":"Efficient binary batched network coding employing partial recovery","author":"Mao","year":"2024","journal-title":"ISIT"},{"key":"ref53","article-title":"Estimating probability distributions and their properties","volume-title":"Carnegie Mellon University","author":"Singh","year":"2019"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1111\/rssb.12236"},{"key":"ref55","author":"Canonne","year":"2020","journal-title":"A short note on learning discrete distributions"}],"event":{"name":"2024 IEEE International Symposium on Information Theory (ISIT)","location":"Athens, Greece","start":{"date-parts":[[2024,7,7]]},"end":{"date-parts":[[2024,7,12]]}},"container-title":["2024 IEEE International Symposium on Information Theory (ISIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10619013\/10619074\/10619460.pdf?arnumber=10619460","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T20:28:58Z","timestamp":1773347338000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10619460\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,7]]},"references-count":55,"URL":"https:\/\/doi.org\/10.1109\/isit57864.2024.10619460","relation":{},"subject":[],"published":{"date-parts":[[2024,7,7]]}}}