{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:15:31Z","timestamp":1725567331545},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/wcins.2010.5541877","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T11:51:40Z","timestamp":1281441100000},"page":"17-21","source":"Crossref","is-referenced-by-count":1,"title":["Network joint coding-aware routing for wireless ad hoc networks"],"prefix":"10.1109","author":[{"family":"Zhiheng Zhou","sequence":"first","affiliation":[]},{"family":"Liang Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SAHCN.2007.4292812"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.124"},{"key":"ref12","first-page":"1","article-title":"Active Network Coding based High-Throughput Optimization Routing for Wireless Ad Hoc Networks","author":"jiao","year":"2008","journal-title":"WiCOM '08"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.84"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061920"},{"key":"ref15","first-page":"1","article-title":"Network Coding-Aware Flow Control in Wireless Ad-hoc Networks","author":"zhang","year":"2008","journal-title":"Proc IEEE WCNC '09"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1766-z"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MCSA.1999.749281"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"ref5","article-title":"Practical network coding","author":"chou","year":"0","journal-title":"Allerton Conference on Communications"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.45"},{"key":"ref7","article-title":"Network coding: The case for multiple unicast sessions","author":"li","year":"0","journal-title":"Allerton Conference on Communications"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159942"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"ref9","article-title":"How Many Packets CanWe Encode? An Analysis of Practical Wireless Network Coding","author":"le","year":"0","journal-title":"Proc IEEE INFOCOM'08"}],"event":{"name":"2010 IEEE International Conference on Wireless Communications, Networking and Information Security (WCNIS)","start":{"date-parts":[[2010,6,25]]},"location":"Beijing, China","end":{"date-parts":[[2010,6,27]]}},"container-title":["2010 IEEE International Conference on Wireless Communications, Networking and Information Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5524730\/5541718\/05541877.pdf?arnumber=5541877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,19]],"date-time":"2017-03-19T01:37:20Z","timestamp":1489887440000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5541877\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wcins.2010.5541877","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}