{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T17:57:09Z","timestamp":1743271029156,"version":"3.37.3"},"reference-count":24,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2018,5,1]],"date-time":"2018-05-01T00:00:00Z","timestamp":1525132800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61771259"],"award-info":[{"award-number":["61771259"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong Scholars Program","award":["XJ2016028"],"award-info":[{"award-number":["XJ2016028"]}]},{"name":"University Grants Committee of the Hong Kong SAR, China","award":["AoE\/E-02\/08"],"award-info":[{"award-number":["AoE\/E-02\/08"]}]},{"name":"Vice-Chancellor\u2019s One-off Discretionary Fund of CUHK","award":["VCF2014030","VCF2015007"],"award-info":[{"award-number":["VCF2014030","VCF2015007"]}]},{"name":"Research Grants Council of Hong Kong","award":["11207615"],"award-info":[{"award-number":["11207615"]}]},{"name":"Science, Technology and Innovation Commission of Shenzhen Municipality","award":["JCYJ20160229165220746"],"award-info":[{"award-number":["JCYJ20160229165220746"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/tcomm.2017.2787991","type":"journal-article","created":{"date-parts":[[2017,12,29]],"date-time":"2017-12-29T19:10:53Z","timestamp":1514574653000},"page":"2009-2021","source":"Crossref","is-referenced-by-count":8,"title":["Hierarchical Performance Analysis on Random Linear Network Coding"],"prefix":"10.1109","volume":"66","author":[{"given":"Dan","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0928-421X","authenticated-orcid":false,"given":"Xuan","family":"Guang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4269-5173","authenticated-orcid":false,"given":"Zhiheng","family":"Zhou","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0495-332X","authenticated-orcid":false,"given":"Congduan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chee Wei","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2015.2509503"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2018173"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E99.A.1255"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1587\/transfun.E94.A.1991"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2222344"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1561\/0100000007I"},{"journal-title":"Information Theory and Network Coding","year":"2008","author":"yeung","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875347"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2373","DOI":"10.1109\/TIT.2006.874432","article-title":"An outer bound for multisource multisink network coding with minimum cost consideration","volume":"52","author":"yan","year":"2006","journal-title":"IEEE Trans Inf Theory"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.896862"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.847712"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref6","first-page":"40","article-title":"Practical network coding","author":"chou","year":"2003","journal-title":"Proc Allerton Conf Commun Control Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2007.071205"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1109\/JPROC.2010.2091930","article-title":"Random network coding in peer-to-peer networks: From theory to practice","volume":"99","author":"li","year":"2011","journal-title":"Proc IEEE"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2012.6504016"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2201340"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2017.2745620"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875347"},{"key":"ref24","first-page":"283","article-title":"On random linear network coding for butterfly network","volume":"20","author":"guang","year":"2011","journal-title":"Chin J Electron"},{"journal-title":"Network Flows Theory Algorithms and Applications","year":"1993","author":"ahuja","key":"ref23"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/8359223\/08241802.pdf?arnumber=8241802","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:22:38Z","timestamp":1642004558000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8241802\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":24,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2017.2787991","relation":{},"ISSN":["0090-6778"],"issn-type":[{"type":"print","value":"0090-6778"}],"subject":[],"published":{"date-parts":[[2018,5]]}}}