{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T18:45:30Z","timestamp":1771699530584,"version":"3.50.1"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1109\/tit.2013.2287498","type":"journal-article","created":{"date-parts":[[2013,11,19]],"date-time":"2013-11-19T18:47:37Z","timestamp":1384886857000},"page":"443-460","source":"Crossref","is-referenced-by-count":14,"title":["A Polymatroid Flow Model for Network Coded Multicast in Wireless Networks"],"prefix":"10.1109","volume":"60","author":[{"given":"Maximilian","family":"Riemensberger","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Utschick","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-76796-1_5"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/WIOPT.2011.5930001"},{"key":"ref33","author":"hassin","year":"1978","journal-title":"On Network Flows"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2010.5513678"},{"key":"ref31","first-page":"196","article-title":"An iterative framework for optimizing multicast throughput in wireless networks","author":"wan","year":"2008","journal-title":"Proc IEEE ISIT"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-0673-1_12"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2109010"},{"key":"ref36","first-page":"69","author":"edmonds","year":"1970","journal-title":"Combinatorial Structures and Their Applications"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1287\/moor.7.3.334"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230120102"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2008.ECP.96"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2180736"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2009.5360767"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/509506.509517"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832232"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/702036"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.2009809"},{"key":"ref21","doi-asserted-by":"crossref","first-page":"379","DOI":"10.1109\/TNET.2009.2026275","article-title":"Distributed algorithms for minimum cost multicast with network coding","volume":"18","author":"xi","year":"2010","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCNW.2009.5172934"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2004.1405319"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.phycom.2008.01.006"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2010.04.080564"},{"key":"ref50","first-page":"321","author":"mccormick","year":"2006","journal-title":"Handbook on Discrete Optimization"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.872983"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874431"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2005.864424"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"1872","DOI":"10.1109\/TIT.2011.2110110","article-title":"Wireless network information flow: A deterministic approach","volume":"57","author":"avestimehr","year":"2011","journal-title":"IEEE Trans Inf Theory"},{"key":"ref14","author":"cover","year":"2006","journal-title":"Elements of Information Theory"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904980"},{"key":"ref16","first-page":"1","article-title":"Distributed utility maximization for network coding based multicasting: A critical cut approach","author":"wu","year":"2006","journal-title":"Proc 3rd Int Symp Modeling and Optimization in Mobile Ad Hoc Wireless Netw"},{"key":"ref17","author":"ford","year":"1962","journal-title":"Flows in Networks"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2092","DOI":"10.1109\/JSAC.2006.881617","article-title":"A cross-layer optimization framework for multihop multicast in wireless mesh networks","volume":"24","author":"yuan","year":"2006","journal-title":"IEEE J Sel Areas Commun"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.139"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.874523"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2004.837362(410) 23"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2007.904978"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.07.009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)91063-X"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2006.881746"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/7693.975444"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1002\/0471787779"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1972.1054727"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/26.52656"},{"key":"ref42","first-page":"387","article-title":"Optimal slotted random access in coded wireless packet networks","author":"riemensberger","year":"2010","journal-title":"Proc IEEE Workshop Resource Allocation Wireless Netw"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2007.4557185"},{"key":"ref44","author":"schrijver","year":"1986","journal-title":"Theory of Linear and Integer Programming"},{"key":"ref43","author":"fujishige","year":"2005","journal-title":"Submodular Functions and Optimization"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6690264\/06648386.pdf?arnumber=6648386","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:47:54Z","timestamp":1638218874000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6648386\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,1]]},"references-count":50,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2013.2287498","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,1]]}}}