{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T12:57:14Z","timestamp":1725713834300},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/netcod.2013.6570827","type":"proceedings-article","created":{"date-parts":[[2013,8,14]],"date-time":"2013-08-14T15:40:54Z","timestamp":1376494854000},"page":"1-6","source":"Crossref","is-referenced-by-count":73,"title":["Instantly decodable network codes for real-time applications"],"prefix":"10.1109","author":[{"given":"Anh","family":"Le","sequence":"first","affiliation":[]},{"given":"Arash S.","family":"Tehrani","sequence":"additional","affiliation":[]},{"given":"Alexandros G.","family":"Dimakis","sequence":"additional","affiliation":[]},{"given":"Athina","family":"Markopoulou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"678","article-title":"Hiding cliques for cryptographic security","author":"juels","year":"0","journal-title":"SODA '98"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313060"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283912"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/NetCod.2013.6570827"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6283957"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2011.110519"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2009.5205995"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2008.927729"},{"key":"2","first-page":"56","article-title":"A digital fountain approach to reliable distribution of bulk data","author":"byers","year":"0","journal-title":"SIGCOMM '98"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CCNC.2006.1593014"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2011.6139868"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2342480.2342485"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2010.5502758"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2009.5191398"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/NETCOD.2008.4476183"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/icc.2011.5963123"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2010.5683677"}],"event":{"name":"2013 International Symposium on Network Coding (NetCod)","start":{"date-parts":[[2013,6,7]]},"location":"Calgary, AB, Canada","end":{"date-parts":[[2013,6,9]]}},"container-title":["2013 International Symposium on Network Coding (NetCod)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6560497\/6570811\/06570827.pdf?arnumber=6570827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:48:05Z","timestamp":1490215685000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6570827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/netcod.2013.6570827","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}