{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:38Z","timestamp":1750306658244,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,21]],"date-time":"2014-09-21T00:00:00Z","timestamp":1411257600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["NO.61173158","NO.61101133"],"award-info":[{"award-number":["NO.61173158","NO.61101133"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,21]]},"DOI":"10.1145\/2641798.2641806","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"241-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Space-time efficient wireless network coding"],"prefix":"10.1145","author":[{"given":"Yan","family":"Yan","sequence":"first","affiliation":[{"name":"Research Center of Ubiquitous Sensor Networks, University of Chinese Academy of Sciences, beijing, China"}]},{"given":"Baoxian","family":"Zhang","sequence":"additional","affiliation":[{"name":"Research Center of Ubiquitous Sensor Networks, University of Chinese Academy of Sciences, beijing, China"}]},{"given":"Zheng","family":"Yao","sequence":"additional","affiliation":[{"name":"Research Center of Ubiquitous Sensor Networks, University of Chinese Academy of Sciences, beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2014,9,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-005-1769-9"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/18.850663"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807285"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2003.818197"},{"key":"e_1_3_2_1_5_1","volume-title":"Allerton'03","author":"Ho T.","year":"2003","unstructured":"T. Ho , M. M\u00e9dard , J. Shi , M. Effros , and D. Karger , \" On Randomized Network Coding,\" in Proc . Allerton'03 , Oct. 2003 . T. Ho, M. M\u00e9dard, J. Shi, M. Effros, and D. Karger, \"On Randomized Network Coding,\" in Proc. Allerton'03, Oct. 2003."},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. Allerton'03","author":"Chou P. A.","year":"2003","unstructured":"P. A. Chou , Y. Wu , and K. Jain , \" Practical network coding \", in Proc. Allerton'03 , Oct. 2003 . P. A. Chou, Y. Wu, and K. Jain, \"Practical network coding\", in Proc. Allerton'03, Oct. 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498443"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159942"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2009.080580"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1688345.1688657"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080829.1080849"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2010.120310.100330"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2096430"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Proc. IEEE INFOCOM'10","author":"Kim T.-S.","year":"2010","unstructured":"T.-S. Kim , S. Vural , S. Broustis , D. Syrivelis , S.V. Krishnamurthy , \" A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks ,\" in Proc. IEEE INFOCOM'10 , pp. 1 -- 9 , Mar. 2010 . T.-S. Kim, S. Vural, S. Broustis, D. Syrivelis, S.V. Krishnamurthy, \"A Framework for Joint Network Coding and Transmission Rate Control in Wireless Networks,\" in Proc. IEEE INFOCOM'10, pp. 1--9, Mar. 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2010.5762758"},{"key":"e_1_3_2_1_16_1","volume-title":"Wireless Communications: Principles and Practices","author":"Rappaport T.","year":"1996","unstructured":"T. Rappaport , Wireless Communications: Principles and Practices , Prentice Hall , 1996 . T. Rappaport, Wireless Communications: Principles and Practices, Prentice Hall, 1996."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/8.943314"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2011.82"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2008.51"},{"key":"e_1_3_2_1_20_1","first-page":"153","volume-title":"\"Dynamic source routing in ad hoc wireless networks.\" In Mobile computing","author":"David","year":"1996","unstructured":"Johnson, David B., and David A. Maltz . \"Dynamic source routing in ad hoc wireless networks.\" In Mobile computing , pp. 153 -- 181 . Springer US , 1996 . Johnson, David B., and David A. Maltz. \"Dynamic source routing in ad hoc wireless networks.\" In Mobile computing, pp. 153--181. Springer US, 1996."}],"event":{"name":"MSWiM'14: 17th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"location":"Montreal QC Canada","acronym":"MSWiM'14"},"container-title":["Proceedings of the 17th ACM international conference on Modeling, analysis and simulation of wireless and mobile systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2641798.2641806","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2641798.2641806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:19Z","timestamp":1750229779000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2641798.2641806"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,21]]},"references-count":20,"alternative-id":["10.1145\/2641798.2641806","10.1145\/2641798"],"URL":"https:\/\/doi.org\/10.1145\/2641798.2641806","relation":{},"subject":[],"published":{"date-parts":[[2014,9,21]]},"assertion":[{"value":"2014-09-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}