{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:49:09Z","timestamp":1770842949034,"version":"3.50.1"},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Committee","doi-asserted-by":"publisher","award":["JCYJ20180508162604311"],"award-info":[{"award-number":["JCYJ20180508162604311"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Shenzhen Science and Technology Innovation Committee","doi-asserted-by":"publisher","award":["ZDSYS20170725140921348"],"award-info":[{"award-number":["ZDSYS20170725140921348"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Inf. Theory"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/jsait.2021.3126426","type":"journal-article","created":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T20:14:34Z","timestamp":1637957674000},"page":"1120-1134","source":"Crossref","is-referenced-by-count":10,"title":["Utility Maximization for Multihop Wireless Networks Employing BATS Codes"],"prefix":"10.1109","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6161-3455","authenticated-orcid":false,"given":"Yanyan","family":"Dong","sequence":"first","affiliation":[]},{"given":"Sheng","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Yanzuo","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-5643","authenticated-orcid":false,"given":"Shenghao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Hoover H. F.","family":"Yin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972110"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2019.2891842"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2632951.2632965"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.2200\/S00794ED1V01Y201708CNT019"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2334315"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511109"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.3390\/e22070790"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3291940.3291981"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2015.2512584"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2014.7028592"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2012.6261896"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6034050"},{"key":"ref29","article-title":"Overhead-optimized gamma network codes","author":"mahdaviani","year":"2013","journal-title":"arXiv 1309 4651"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/90.811451"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1038\/sj.jors.2600523"},{"key":"ref20","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Proc Allerton Conf Commun Control Comput"},{"key":"ref22","first-page":"10","article-title":"Methods for efficient network coding","author":"maymounkov","year":"2006","journal-title":"Proc Allerton Conf Commun Control Comput"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498511"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191397"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-015-0297-8"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2095111"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ITWKSPS.2010.5503153"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1963.tb00955.x"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9148834"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-8176-8216-3"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.2200\/S00778ED1V01Y201705CNT018"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4460080106"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/26.52656"},{"key":"ref55","author":"shakkottai","year":"2008","journal-title":"Network Optimization and Control"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1632478"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513770"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2435792"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2003.1228459"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864424"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2008.01.006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2006.879356"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.139"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.25"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2009.090605"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2180736"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2008.4753381"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1452","DOI":"10.1109\/JSAC.2006.879351","article-title":"A tutorial on cross-layer optimization in wireless networks","volume":"24","author":"lin","year":"2006","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/26.771345"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/26.668727"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080604"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.858939"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1960.tb03959.x"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2017.2765641"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518091"},{"key":"ref48","article-title":"Recoding optimizations in batched sparse codes","author":"yin","year":"2019"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2016.7541719"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849280"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2019.8849277"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9518102"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT45174.2021.9517910"}],"container-title":["IEEE Journal on Selected Areas in Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8700143\/9660395\/09627725.pdf?arnumber=9627725","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T21:05:14Z","timestamp":1648501514000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9627725\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":59,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/jsait.2021.3126426","relation":{},"ISSN":["2641-8770"],"issn-type":[{"value":"2641-8770","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12]]}}}