{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T02:38:33Z","timestamp":1648953513723},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"12","license":[{"start":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T00:00:00Z","timestamp":1291161600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2010,12]]},"DOI":"10.1109\/tit.2010.2080610","type":"journal-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T21:08:54Z","timestamp":1291151334000},"page":"6317-6331","source":"Crossref","is-referenced-by-count":1,"title":["Maximal Recovery Network Coding Under Topology Constraint"],"prefix":"10.1109","volume":"56","author":[{"given":"Kiran","family":"Misra","sequence":"first","affiliation":[]},{"given":"Shirish","family":"Karande","sequence":"additional","affiliation":[]},{"given":"Hayder","family":"Radha","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/18.825799"},{"key":"ref32","article-title":"design of efficient erasure codes with differential evolution","author":"shokrollahi","year":"2000","journal-title":"Proc IEEE Int Symp Information Theory"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008202821328"},{"key":"ref30","first-page":"175","author":"shokrollahi","year":"2002","journal-title":"An Introduction to Low-Density Parity-Check Codes"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.184"},{"key":"ref34","article-title":"lt codes from an arranged encoder matrix and degree distribution design with dense rows","author":"lee","year":"2007","journal-title":"Proc Allerton Conf Communication Control and Computing"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2002.1181950"},{"key":"ref11","first-page":"324","article-title":"INPoD: In-network Processing based on code Design","author":"misra","year":"2007","journal-title":"Proc 4th Annu IEEE Communications Society Conf Sensor Mesh and Ad Hoc Communications and Networks"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref15","author":"pearl","year":"1988","journal-title":"Probabilistic Reasoning in Intelligent Systems Networks of Plausible Inference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2008.4558584"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2008.4595354"},{"key":"ref18","first-page":"115","article-title":"network coding for distributed storage in wireless networks","author":"dimakis","year":"2007","journal-title":"Networked Sensing Information and Control"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MMSP.2002.1203332"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/18.910577"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874535"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/18.910578"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.923722"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2009.5168948"},{"key":"ref5","first-page":"266","article-title":"growth codes: maximizing sensor network data persistence","author":"kamra","year":"2006","journal-title":"Proc 2006 Conf on Applications Technologies Architectures and Protocols for Computer Communications"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/18.910578"},{"key":"ref8","article-title":"How good is random linear coding based distributed networked storage?","author":"acedanski","year":"2005","journal-title":"Workshop on Network Coding Theory and Applications"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.194"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4347.001.0001","author":"gallager","year":"1963","journal-title":"Low-Density Parity-Check Codes"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.282"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2008.060439"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2007.4313121"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2006.262139"},{"key":"ref21","first-page":"122","article-title":"boundary recognition in sensor networks by topological methods","author":"wang","year":"2006","journal-title":"Proc 1st Annu Int Conf Mobile Computing and Networking"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1214\/105051604000000567","author":"darling","year":"2005","journal-title":"Ann Appl Probabil"},{"key":"ref23","author":"darling","year":"2002","journal-title":"Fluid Limits of Pure Jump Markov Processes A Practical Guide"},{"key":"ref26","article-title":"Connections between network coding and stochastic network theory","author":"hajek","year":"2006","journal-title":"Conf Stochastic Networks"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511803888","author":"cameron","year":"1994","journal-title":"Combinatorics Topics Techniques Algorithms"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/5625612\/05625625.pdf?arnumber=5625625","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:45:52Z","timestamp":1633913152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5625625\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12]]},"references-count":35,"journal-issue":{"issue":"12"},"URL":"https:\/\/doi.org\/10.1109\/tit.2010.2080610","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,12]]}}}