{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:40:52Z","timestamp":1729622452265,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/itw.2004.1405306","type":"proceedings-article","created":{"date-parts":[[2005,4,6]],"date-time":"2005-04-06T11:20:51Z","timestamp":1112786451000},"page":"236-241","source":"Crossref","is-referenced-by-count":6,"title":["RT oblivious erasure correcting"],"prefix":"10.1109","author":[{"given":"A.","family":"Beimel","sequence":"first","affiliation":[]},{"given":"S.","family":"Dolev","sequence":"additional","affiliation":[]},{"given":"N.","family":"Singer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Raptor codes","volume":"df2003 6 1","author":"shokrollahi","year":"2003","journal-title":"Tech Rep"},{"journal-title":"Computer Networks","year":"2000","author":"tanenbaum","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/263876.263881"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/HPCS.1997.864033"},{"key":"13","article-title":"Rateless codes and big downloads","author":"maymounkov","year":"2003","journal-title":"1st International Workshop on Peer-to-Peer Systems (IPTPS 2002)"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/0108018"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258573"},{"key":"12","article-title":"Online codes","volume":"tr2002 833","author":"maymounkov","year":"2002","journal-title":"Technical Report"},{"key":"3","article-title":"An XOR-based erasure-resilient coding scheme","volume":"95","author":"blo?mer","year":"1995","journal-title":"Technical Report"},{"key":"2","article-title":"RT oblivious erasure correcting","volume":"2003","author":"beimel","year":"2003","journal-title":"Technical Report"},{"year":"0","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/18.910575"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00168-2"},{"key":"5","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1145\/285243.285258","article-title":"Digital fountain approach to reliable distribution of bulk data","author":"byers","year":"1998","journal-title":"SIGCOMM"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1999.749293"},{"key":"9","first-page":"364","article-title":"Analysis of random processes via and-or tree evaluation","author":"luby","year":"1998","journal-title":"Proc 5th ACM-SIAM Annu Symp on Discrete Algorithms"},{"key":"8","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1109\/SFCS.2002.1181950","author":"luby","year":"2002","journal-title":"Proc of the 43rd Annu IEEE Symp on Foundations of Computer Science"}],"event":{"name":"2004 IEEE Information Theory Workshop","acronym":"ITW-04","location":"San Antonio, TX, USA"},"container-title":["Manufacturing Engineer"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9641\/30470\/01405306.pdf?arnumber=1405306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T14:02:20Z","timestamp":1497621740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1405306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/itw.2004.1405306","relation":{},"subject":[]}}