{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:24Z","timestamp":1750307544623,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,17]],"date-time":"2009-10-17T00:00:00Z","timestamp":1255737600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2009CB320705"],"award-info":[{"award-number":["2009CB320705"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["9.07E+15"],"award-info":[{"award-number":["9.07E+15"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"National Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["SBK200921645"],"award-info":[{"award-number":["SBK200921645"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,17]]},"DOI":"10.1145\/1640206.1640211","type":"proceedings-article","created":{"date-parts":[[2009,10,27]],"date-time":"2009-10-27T13:27:28Z","timestamp":1256650048000},"page":"1-7","update-policy":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Reliable multicast with network coding"],"prefix":"10.1145","author":[{"given":"Kaikai","family":"Chi","sequence":"first","affiliation":[{"name":"Tohoku University, Japan"}]},{"given":"Xiaohong","family":"Jiang","sequence":"additional","affiliation":[{"name":"Tohoku University, Japan and Nanjing University, China"}]},{"given":"Baoliu","family":"Ye","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2009,10,17]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/18.850663"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/1159913.1159942"},{"key":"e_1_3_2_1_3_1","first-page":"3","article-title":"A More Efficient COPE Architecture for Network Coding in Multihop Wireless Networks","volume":"92","author":"Chi K.","year":"2009","journal-title":"IEICE Trans. On Communications"},{"unstructured":"Y. Wu P. A. Chou and S. -Y. Kung \"Information exchange in wireless networks with network coding and physical-layer broadcast \" in CISS 2005.  Y. Wu P. A. Chou and S. -Y. Kung \"Information exchange in wireless networks with network coding and physical-layer broadcast \" in CISS 2005.","key":"e_1_3_2_1_4_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1109\/IZS.2006.1649082"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/1282380.1282425"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/1282380.1282400"},{"doi-asserted-by":"crossref","unstructured":"S. Sengupta S. Rayanchu and S. Banerjee \"An analysis of wireless network coding for unicast sessions: The case for coding-aware routing \" in IEEE INFOCOM 2007.  S. Sengupta S. Rayanchu and S. Banerjee \"An analysis of wireless network coding for unicast sessions: The case for coding-aware routing \" in IEEE INFOCOM 2007.","key":"e_1_3_2_1_8_1","DOI":"10.1109\/INFCOM.2007.124"},{"doi-asserted-by":"crossref","unstructured":"J. Le J. C. S. Lui and D. M. Chiu \"How many packets can we encode? - An analysis of practical wireless network coding \" in IEEE INFOCOM 2008.  J. Le J. C. S. Lui and D. M. Chiu \"How many packets can we encode? - An analysis of practical wireless network coding \" in IEEE INFOCOM 2008.","key":"e_1_3_2_1_9_1","DOI":"10.1109\/INFOCOM.2008.83"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/WIMESH.2006.288636"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1109\/TCOMM.2005.857148"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1109\/TIT.2006.874523"},{"doi-asserted-by":"crossref","unstructured":"J. S. Park D. Lun F. Soldo M. Gerla and M. Medard \"Performance of network coding in ad hoc networks \" in IEEE MILCOM 2006.   J. S. Park D. Lun F. Soldo M. Gerla and M. Medard \"Performance of network coding in ad hoc networks \" in IEEE MILCOM 2006.","key":"e_1_3_2_1_13_1","DOI":"10.1109\/MILCOM.2006.302320"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/TNET.2007.901080"},{"doi-asserted-by":"crossref","unstructured":"L. Li R. Ramjee M. Buddhikot and S. Miller \"Network coding-based broadcast in mobile ad hoc networks \" in IEEE INFOCOM 2007.  L. Li R. Ramjee M. Buddhikot and S. Miller \"Network coding-based broadcast in mobile ad hoc networks \" in IEEE INFOCOM 2007.","key":"e_1_3_2_1_15_1","DOI":"10.1109\/INFCOM.2007.203"},{"unstructured":"J. Nonnenmacher M. Lacher M. Jung G. Carl and E. W. Biersack \"How bad is reliable multicast without local recovery?\" in IEEE INFOCOM 1998.  J. Nonnenmacher M. Lacher M. Jung G. Carl and E. W. Biersack \"How bad is reliable multicast without local recovery?\" in IEEE INFOCOM 1998.","key":"e_1_3_2_1_16_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1109\/49.564138"},{"unstructured":"D. Nguyen T. Nguyen and B. Bose \"Wireless broadcasting using network coding \" in Third Workshop on Network Coding Theory and Applications Jan. 2007.  D. Nguyen T. Nguyen and B. Bose \"Wireless broadcasting using network coding \" in Third Workshop on Network Coding Theory and Applications Jan. 2007.","key":"e_1_3_2_1_18_1"},{"issue":"2","key":"e_1_3_2_1_19_1","article-title":"Wireless broadcast using network coding","volume":"58","author":"Nguyen D.","year":"2009","journal-title":"IEEE Transactions of Vehicular Technology"},{"volume-title":"IEEE Military Communications Conference (MILCOM)","year":"2007","author":"Sagduyu Y. E.","key":"e_1_3_2_1_20_1"},{"unstructured":"K. Chi X. Jiang and S. Horiguchi \"Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks \" Submitted.  K. Chi X. Jiang and S. Horiguchi \"Efficient Network Coding-Based Loss Recovery for Reliable Multicast in Wireless Networks \" Submitted.","key":"e_1_3_2_1_21_1"},{"unstructured":"K. Chi X. Jiang and S. Horiguchi \"Network Coding-Based Reliable Multicast in Wireless Networks \" Submitted.  K. Chi X. Jiang and S. Horiguchi \"Network Coding-Based Reliable Multicast in Wireless Networks \" Submitted.","key":"e_1_3_2_1_22_1"},{"doi-asserted-by":"crossref","unstructured":"J. K. Sundararajan D. Shah M. Medard \"Online network coding for optimal throughput and delay - the three-receiver case \" in Proc. of International Symposium on Information Theory and its Applications (ISITA) Dec. 2008.  J. K. Sundararajan D. Shah M. Medard \"Online network coding for optimal throughput and delay - the three-receiver case \" in Proc. of International Symposium on Information Theory and its Applications (ISITA) Dec. 2008.","key":"e_1_3_2_1_23_1","DOI":"10.1109\/ISITA.2008.4895447"},{"volume-title":"Fourth Workshop on Network Coding, Theory and Applications","year":"2008","author":"Tran T.","key":"e_1_3_2_1_24_1"},{"volume-title":"Orlando","year":"2007","author":"Ghaderi M.","key":"e_1_3_2_1_25_1"},{"doi-asserted-by":"crossref","unstructured":"M. Ghaderi D. Towsley and J. Kurose \"Reliability gain of network coding in lossy wireless networks \" in IEEE INFOCOM 2008.  M. Ghaderi D. Towsley and J. Kurose \"Reliability gain of network coding in lossy wireless networks \" in IEEE INFOCOM 2008.","key":"e_1_3_2_1_26_1","DOI":"10.1109\/INFOCOM.2008.284"},{"doi-asserted-by":"crossref","unstructured":"A. Fujimura S. Y. Oh and M. Gerla \"Network Coding vs. Erasure Coding: Reliable Multicast in Ad hoc Networks \" in IEEE MILCOM 2008.  A. Fujimura S. Y. Oh and M. Gerla \"Network Coding vs. Erasure Coding: Reliable Multicast in Ad hoc Networks \" in IEEE MILCOM 2008.","key":"e_1_3_2_1_27_1","DOI":"10.1109\/MILCOM.2008.4753100"},{"volume-title":"Shanghai","year":"2009","author":"Chi K.","key":"e_1_3_2_1_28_1"}],"event":{"sponsor":["CCF China Computer Federation","SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"Internetware '09","name":"Internetware '09: First Asia-Pacific Symposium on Internetware","location":"Beijing China"},"container-title":["Proceedings of the First Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/1640206.1640211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/1640206.1640211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:29Z","timestamp":1750249409000},"score":1,"resource":{"primary":{"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/1640206.1640211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,17]]},"references-count":28,"alternative-id":["10.1145\/1640206.1640211","10.1145\/1640206"],"URL":"https:\/\/summer-heart-0930.chufeiyun1688.workers.dev:443\/https\/doi.org\/10.1145\/1640206.1640211","relation":{},"subject":[],"published":{"date-parts":[[2009,10,17]]},"assertion":[{"value":"2009-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}