{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:22:45Z","timestamp":1743013365155,"version":"3.37.3"},"reference-count":42,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T00:00:00Z","timestamp":1688169600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62271514"],"award-info":[{"award-number":["62271514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100010877","name":"Science, Technology and Innovation Commission of Shenzhen Municipality","doi-asserted-by":"publisher","award":["JCYJ20210324120002007","JCYJ20190807155617099","ZDSYS20210623091807023"],"award-info":[{"award-number":["JCYJ20210324120002007","JCYJ20190807155617099","ZDSYS20210623091807023"]}],"id":[{"id":"10.13039\/501100010877","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100014959","name":"Research Fund of Guangxi Key Laboratory of Multi-source Information Mining & Security","doi-asserted-by":"publisher","award":["MIMS20-01"],"award-info":[{"award-number":["MIMS20-01"]}],"id":[{"id":"10.13039\/501100014959","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education, Singapore, under its Academic Research Fund","doi-asserted-by":"publisher","award":["022307","AcRF RG91\/22"],"award-info":[{"award-number":["022307","AcRF RG91\/22"]}],"id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Commun."],"published-print":{"date-parts":[[2023,7]]},"DOI":"10.1109\/tcomm.2023.3275166","type":"journal-article","created":{"date-parts":[[2023,5,11]],"date-time":"2023-05-11T17:30:34Z","timestamp":1683826234000},"page":"3847-3860","source":"Crossref","is-referenced-by-count":5,"title":["Fault-Tolerant Computation Meets Network Coding: Optimal Scheduling in Parallel Computing"],"prefix":"10.1109","volume":"71","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0495-332X","authenticated-orcid":false,"given":"Congduan","family":"Li","sequence":"first","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6021-5802","authenticated-orcid":false,"given":"Yiqian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Electronics and Communication Engineering, Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6624-9752","authenticated-orcid":false,"given":"Chee Wei","family":"Tan","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Nanyang Technological University, Jurong West, Singapore"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2013.08.013"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539795288490"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2014.2362745"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2306938"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2015.7447112"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.09.023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566958"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1137\/S009753970444435X"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-2013-02787-1"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/10722028_31"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2019.2946464"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/BF01939515"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2591971.2592042"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054863"},{"key":"ref2","first-page":"137","article-title":"MapReduce: Simplified data processing on large clusters","author":"dean","year":"2004","journal-title":"Proc OSDI 6th Symp Operating Syst Design Implement"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM46510.2021.9685369"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref39","first-page":"191","article-title":"When and how n choose k","author":"pak","year":"1997","journal-title":"Randomization Methods in Algorithm Design"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2019.2963864"},{"key":"ref38","article-title":"Balanced offline allocation of weighted balls into bins","author":"demirel","year":"2013","journal-title":"arXiv 1304 2881"},{"journal-title":"Elementary Number Theory and Its Applications","year":"2000","author":"rosen","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2010.2054295"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"journal-title":"Chinese Remainder Theorem Applications in Computing Coding Cryptography","year":"1996","author":"pei","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2018.2846228"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301309"},{"key":"ref20","volume":"2","author":"knuth","year":"1997","journal-title":"The Art of Computer Programming Seminumerical Algorithms"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(76)80043-8"},{"key":"ref41","first-page":"169","article-title":"The complexity of computations","volume":"211","author":"karatsuba","year":"1995","journal-title":"Proc Steklov Inst Math"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4007\/annals.2021.193.2.4"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1007\/BF02242355","article-title":"Schnelle multiplikation gro&#x00DF;er zahlen","volume":"7","author":"strassen","year":"1971","journal-title":"Computing"},{"key":"ref28","first-page":"209","article-title":"An upper bound in Goldbach&#x2019;s problem","volume":"61","author":"deshouillers","year":"1993","journal-title":"Math Comput"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2012.2216937"},{"key":"ref29","first-page":"423","article-title":"Checking the Goldbach conjecture on a vector computer","volume":"265","author":"granville","year":"1988","journal-title":"Applied Number Theory"},{"key":"ref8","article-title":"A possible new quantum algorithm: Arithmetic with large integers via the Chinese remainder theorem","author":"fulling","year":"1999","journal-title":"arXiv quant-ph\/9910059vl"},{"key":"ref7","first-page":"414","article-title":"The great prime number record races","volume":"51","author":"ziegler","year":"2004","journal-title":"Notices AMS"},{"key":"ref9","article-title":"Fast multiplication of large integers: Implementation and analysis of the DKSS algorithm","author":"l\u00fcders","year":"2015","journal-title":"arXiv 1503 04955"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2934664"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2331684.2331693"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.86.21.8178"},{"journal-title":"James Stirling's Methodus Differentials An Annotated Translation of Stirling's Text","year":"2003","author":"tweddle","key":"ref40"}],"container-title":["IEEE Transactions on Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/26\/10184153\/10123063.pdf?arnumber=10123063","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,7]],"date-time":"2023-08-07T18:03:08Z","timestamp":1691431388000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10123063\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,7]]},"references-count":42,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tcomm.2023.3275166","relation":{},"ISSN":["0090-6778","1558-0857"],"issn-type":[{"type":"print","value":"0090-6778"},{"type":"electronic","value":"1558-0857"}],"subject":[],"published":{"date-parts":[[2023,7]]}}}