{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:36:29Z","timestamp":1725496589282},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1109\/ita.2013.6502934","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T17:30:12Z","timestamp":1366997412000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Wireless network compression: Code design and trade offs"],"prefix":"10.1109","author":[{"given":"M.","family":"Sardari","sequence":"first","affiliation":[]},{"given":"A.","family":"Beirami","sequence":"additional","affiliation":[]},{"given":"F.","family":"Fekri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Network Simulator ns-2","year":"0","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/18.930912"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033793"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/18.86996"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4623708"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4643.001.0001","author":"grunwald","year":"2007","journal-title":"The Minimum Description Length Principle"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195842"},{"key":"2","article-title":"Refactoring content overhearing to improve wireless performance","author":"hsiang-shen","year":"0","journal-title":"MobiCom Las Vegas NV 2011"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879179"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592580"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283020"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089506"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/347057.347408"},{"journal-title":"Curing the Amnesia Network Memory for the Internet","year":"2009","author":"zhuang","key":"8"}],"event":{"name":"2013 Information Theory and Applications Workshop (ITA 2013)","start":{"date-parts":[[2013,2,10]]},"location":"San Diego, CA","end":{"date-parts":[[2013,2,15]]}},"container-title":["2013 Information Theory and Applications Workshop (ITA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6495586\/6502916\/06502934.pdf?arnumber=6502934","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,12]],"date-time":"2019-07-12T21:53:08Z","timestamp":1562968388000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6502934\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,2]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/ita.2013.6502934","relation":{},"subject":[],"published":{"date-parts":[[2013,2]]}}}