iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/S00446-006-0014-9
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T02:52:16Z","timestamp":1673491936158},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2006,12,1]],"date-time":"2006-12-01T00:00:00Z","timestamp":1164931200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2007,2,21]]},"DOI":"10.1007\/s00446-006-0014-9","type":"journal-article","created":{"date-parts":[[2006,11,30]],"date-time":"2006-11-30T13:17:01Z","timestamp":1164892621000},"page":"301-311","source":"Crossref","is-referenced-by-count":19,"title":["Building scalable and robust peer-to-peer overlay networks for broadcasting using network coding"],"prefix":"10.1007","volume":"19","author":[{"given":"Kamal","family":"Jain","sequence":"first","affiliation":[]},{"given":"L\u00e1szl\u00f3","family":"Lov\u00e1sz","sequence":"additional","affiliation":[]},{"given":"Philip A.","family":"Chou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,12,1]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","first-page":"1204","DOI":"10.1109\/18.850663","volume":"46","author":"R. Ahlswede","year":"2000","unstructured":"Ahlswede R., Cai N., Li S.-Y.R. Yeung R.W. (2000): Network information flow. IEEE Trans. Inf. Theory IT-46, 1204\u20131216","journal-title":"IEEE Trans. Inf. Theory IT-"},{"key":"14_CR2","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1109\/18.556670","volume":"42","author":"A. Albanese","year":"1996","unstructured":"Albanese A., Bl\u00f6mer J., Edmonds J., Luby M., Sudan M. (1996): Priority encoding transmission. IEEE Trans. Inf. Theory 42, 1737\u20131744","journal-title":"IEEE Trans. Inf. Theory"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Byers, J.W., Considine, J., Mitzenmacher, M., Rost, S.: Informed content delivery across adaptive overlay networks. In: Proc. SIGCOMM, Pittsburg. ACM, (2002)","DOI":"10.1145\/633025.633031"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Castro, M., Druschel, P., Kermarrec, A.-M., Nandi, A., Rowstron, A., Singh, A.: Splitstream: high-bandwidth content distribution in a cooperative environment. In: Proceedings of the International Workshop on Peer-to-Peer Systems (2003)","DOI":"10.1007\/978-3-540-45172-3_27"},{"key":"14_CR5","doi-asserted-by":"crossref","DOI":"10.1109\/CISS.2006.286587","volume-title":"Signature for network coding","author":"D. Charles","year":"2006","unstructured":"Charles D., Jain K., Lauter K. (2006): Signature for network coding. Princeton University, Princeton"},{"key":"14_CR6","unstructured":"Chou, P., Wu, Y., Jain, K.: Practical network coding. In: Proceedings of Allerton Conf. Communications, Control, and Computing, Monticello (2003)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Chu, Y., Rao, S.G., Zhang, H.: A case for end system multicast. In: Joint Int\u2019l Conf. Measurement and Modeling of Computer Systems (SIGMETRICS) (2000)","DOI":"10.1145\/339331.339337"},{"key":"14_CR8","unstructured":"Cohen, B.: Incentives build robustness in BitTorrent. http:\/\/bitconjurer.org\/BitTorrent\/bittorrentecon.pdf (2003)"},{"key":"14_CR9","unstructured":"Edmonds, J.: Edge-disjoint branchings. In: Rustin, R. (eds.) Combinatorial Algorithms. New York Academic, pp. 91\u201396 (1973)"},{"key":"14_CR10","unstructured":"Ho, T., Koetter, R., M\u00e9dard, M., Karger, D.R., Effros, M.: The benefits of coding over routing in a randomized setting. In: Proceedings of the Int\u2019l Symp. Information Theory, Yokohama, IEEE, (2003)"},{"key":"14_CR11","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1109\/TNET.2003.818197","volume":"11","author":"R. Koetter","year":"2003","unstructured":"Koetter R., M\u00e9dard M. (2003): An algebraic approach to network coding. IEEE ACM Trans Netw 11, 782\u2013795","journal-title":"IEEE ACM Trans Netw"},{"key":"14_CR12","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TIT.2002.807285","volume":"49","author":"S.-Y.R. Li","year":"2003","unstructured":"Li S.-Y.R., Yeung R.W., Cai N. (2003): Linear network coding. IEEE Trans. Inf. Theory IT-49, 371\u2013381","journal-title":"IEEE Trans. Inf. Theory IT-"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Wang, H.J., Chou, P.A.: Resilient peer-to-peer streaming. In Proceedings of the Int\u2019l Conf. Network Protocols, Atlanta (2003)","DOI":"10.1109\/ICNP.2003.1249753"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Padmanabhan, V.N., Wang, H.J., Chou, P.A.: Supporting heterogeneity and congestion control in peer-to-peer multicast streaming. In: Proceedings of the Int\u2019l Workshop on Peer-to-Peer Systems, San Diego (2004)","DOI":"10.1007\/978-3-540-30183-7_6"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Rejaie, R., Stafford, S.: A framework for architecting peer-to-peer receiver-driven overlays. In Proceedings of the Int\u2019l Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), Kinsale (2004)","DOI":"10.1145\/1005847.1005858"},{"key":"14_CR16","unstructured":"Rodriguez, P., Gkantsidis, C.: Revolutionising content distribution. In: Proceedings of the Conf. Computer Communications (INFOCOM), Miami. IEEE, (2005) (Submitted)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sander, P., Egner, S., Tolhuizen, L.: Polynomial time algorithms for network information flow. In: Symposium on Parallel Algorithms and Architectures (SPAA), pp. 286\u2013294. San Diego ACM (2003)","DOI":"10.1145\/777412.777464"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-006-0014-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00446-006-0014-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-006-0014-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T13:26:36Z","timestamp":1559136396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00446-006-0014-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,12,1]]},"references-count":17,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,2,21]]}},"alternative-id":["14"],"URL":"http:\/\/dx.doi.org\/10.1007\/s00446-006-0014-9","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"value":"0178-2770","type":"print"},{"value":"1432-0452","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,12,1]]}}}