{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:07Z","timestamp":1759133347659,"version":"3.37.3"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["CNS-1017234"],"award-info":[{"award-number":["CNS-1017234"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"2013 Information Theory and Applications Workshop"},{"name":"2014 IEEE International Symposium on Information Theory"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Wireless Commun."],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/twc.2015.2468729","type":"journal-article","created":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T16:26:31Z","timestamp":1439569591000},"page":"176-190","source":"Crossref","is-referenced-by-count":11,"title":["Wireless Network Compression Via Memory-Enabled Overhearing Helpers"],"prefix":"10.1109","volume":"15","author":[{"given":"Ahmad","family":"Beirami","sequence":"first","affiliation":[]},{"given":"Mohsen","family":"Sardari","sequence":"additional","affiliation":[]},{"given":"Faramarz","family":"Fekri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Network Simulator ns-2","year":"1997","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1147\/rd.282.0135"},{"article-title":"Fast parallel algorithms for universal lossless source coding","year":"2003","author":"baron","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4643.001.0001","author":"grunwald","year":"2007","journal-title":"The Minimum Description Length Principle"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/18.782149"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/18.54897"},{"article-title":"Source coding with side information and universal coding","year":"1979","author":"gallager","key":"ref35"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2014.6875228"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195842"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2011.6089506"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/18.382017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033793"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/JSTSP.2015.2403800"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.2012.19"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ITA.2013.6502934"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6566774"},{"article-title":"Universal compression of a mixture of parametric sources with side information","year":"2014","author":"beirami","key":"ref18"},{"journal-title":"Elements of Information Theory","year":"2006","author":"cover","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195469"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592580"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6495773"},{"article-title":"Curing the amnesia: Network memory for the internet","year":"2009","author":"zhuang","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879179"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2012.6284253"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1555349.1555355"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2348543.2348565"},{"key":"ref7","article-title":"Refactoring content overhearing to improve wireless performance","author":"hsiang-shen","year":"0","journal-title":"Proc Mobicom"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402984"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2418296"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/347057.347408","article-title":"A protocol-independent technique for eliminating redundant network traffic","volume":"30","author":"spring","year":"0","journal-title":"Proc SIGCOMM"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.86996"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/18.720554"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.930912"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972387"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/18.481776"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4623708"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159942"}],"container-title":["IEEE Transactions on Wireless Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7693\/7374774\/7202903.pdf?arnumber=7202903","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:46:27Z","timestamp":1641987987000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7202903\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":37,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/twc.2015.2468729","relation":{},"ISSN":["1536-1276"],"issn-type":[{"type":"print","value":"1536-1276"}],"subject":[],"published":{"date-parts":[[2016,1]]}}}